<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Aspectmichelle</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Aspectmichelle"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Aspectmichelle"/>
		<updated>2026-04-25T14:03:05Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=40082</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=40082"/>
				<updated>2008-09-15T18:46:22Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008 ] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
= 2008 OWASP USA, NYC =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This conference has tracks for management, security, audit and development professionals interested in the state of the appsec industry and its trends. Presented by some of the brightest people in the industry, this event is a must attend for anyone looking to improve their information security posture and threat awareness. With assistance from: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net NYC ISACA], [http://www.nymissa.org NYC ISSA] and our event co-sponsors you are invited to (2) days of hardcore hands-on training and (2) full days of Seminars and Technology Pavilion from the world's best application security technology minds, all held in the New York City, Midtown. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/6/61/Banner2_irfan.jpg]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;Scroll down to see event agenda and training options&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;When/Where&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sept 22nd - 25th 2008&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;&amp;lt;b&amp;gt;[http://www.parkcentralny.com/location/location.cfm The Park Central Hotel - 870 Seventh Avenue at 56th Street New York, NY 10019-4038]&amp;lt;/b&amp;gt;&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;How Much?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Seminar Fees: $350 [https://www.owasp.org/index.php/Membership#Categories_of_Membership OWASP Members] / $400 Non-Members (includes 1 year OWASP individual membership) / $200 for Students (with student ID).  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#OWASP_NYC_AppSec_2008_Training_Courses_-_September_22nd_and_23rd.2C_2008 2 days of hands on training classes] are also available.&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Diamond Sponsor] - [http://www.imperva.com http://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Platinum Sponsor]  - [http://www.cenzic.com https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]  - [http://www.whitehatsec.com http://www.owasp.org/images/archive/4/4d/20080703021901%21Whitehat.gif] -  [http://www-935.ibm.com/services/us/gbs/app/html/gbs_applicationservices.html?cm_re=masthead-_-business-_-apps-allappserv https://www.owasp.org/images/4/47/Ibm.jpg] &amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Gold, Silver &amp;amp; Other Sponsors] - [http://www.isc2.org http://www.owasp.org/images/4/45/Isc2logo.gif] - [http://www.f5.com http://www.owasp.org/images/7/7e/50px-F5_50px.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.foundstone.com/us/education-overview.asp http://www.owasp.org/images/2/26/Foundstone.jpg] - [http://www.qualys.com https://www.owasp.org/images/a/ae/Qualys.gif] - [http://www.ouncelabs.com https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.acunetix.com https://www.owasp.org/images/e/eb/Acuneti.gif] - [http://www.denimgroup.com http://www.owasp.org/images/5/56/Denimgroup.jpg] - [http://www.accessitgroup.com https://www.owasp.org/images/6/6d/Accessit.JPG] - &lt;br /&gt;
[http://www.fishnetsecurity.com https://www.owasp.org/images/4/4a/Fishnet_security.png] - [http://www.arctecgroup.net http://www.owasp.org/images/b/bf/Arctec.jpg] - [http://www.airtightnetworks.net https://www.owasp.org/images/8/8b/Airtight.gif] - &lt;br /&gt;
[http://www.artofdefence.com https://www.owasp.org/images/d/dc/AOD_Logo.gif] - &lt;br /&gt;
[http://www.securityuniversity.net https://www.owasp.org/images/0/0d/Security_university.jpg] - &lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif] - [http://www.armorize.com https://www.owasp.org/images/c/ce/Armorize_Logo.png] -[http://www.barracudanetworks.com/ https://www.owasp.org/images/a/a2/Barracuda_Color_Logo.jpg]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities] -- [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-PRESS Press Registration] -- [http://www.owasp.org/index.php/Member_Offers Other OWASP Member Offers] &amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th ==&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;h2&amp;gt;[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/speakeragreement OWASP Speaker Agreement]&amp;lt;/h2&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | &amp;lt;h2&amp;gt;Day 1 – Sept 24th, 2008 &amp;lt;/h2&amp;gt; &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: BALLROOM&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: SKYLINE&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: TIMESQUARE&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:50 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Doors Open for Attendee/Speaker Registration &lt;br /&gt;
''avoid lines come early get your caffeine fix and use free wifi''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Version 3.0 who we are, how we got here and where we are going?&lt;br /&gt;
''OWASP Foundation: [http://www.owasp.org/index.php/Contact Jeff Williams], [http://www.owasp.org/index.php/Contact Dinis Cruz], [http://www.owasp.org/index.php/Contact Dave Wichers], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.owasp.org/index.php/Contact Sebastien Deleersnyder], [http://www.owasp.org/index.php/Contact Paulo Coimbra], [http://www.owasp.org/index.php/Contact Kate Hartmann], [http://www.owasp.org/index.php/Contact Alison Shrader] &amp;amp; [http://www.owasp.org/index.php/Category:OWASP_Chapter#Chapter_Support_Materials all local chapter leaders]&lt;br /&gt;
'' &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  [http://www.owasp.org/index.php/AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 Analysis of the Web Hacking Incidents Database (WHID)]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.webappsecroadmap.com Web Application Security Road Map]  &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] &amp;amp; [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Http Bot Research&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP &amp;quot;Google Hacking&amp;quot; Project &lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | MalSpam Research &lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Get Rich or Die Trying - Making Money on The Web, The Black Hat Way&lt;br /&gt;
''[http://www.linkedin.com/in/treyford Trey Ford], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.linkedin.com/pub/0/205/77a Jeremiah Grossman]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Framework-level Threat Analysis: Adding Science to the Art of Source-code review&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-rohit-sethi Rohit Sethi] &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni Sahba Kazerooni]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Automated Web-based Malware Behavioral Analysis &lt;br /&gt;
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | New 0-Day Browser Exploits: Clickjacking - yea, this is bad...&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] &amp;amp; [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WAF ModSecurity&lt;br /&gt;
''[http://www.breach.com/company/executive-team/ Ivan Ristic]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Using Layer 8 and OWASP to Secure Web Applications&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern] &amp;amp; [http://www.linkedin.com/in/romangarber Roman Garber]''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Industry Outlook Panel: ''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, [http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, [http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, [http://www.linkedin.com/pub/0/1ba/4a9 Warren Axelrod] SVP Bank of America, [http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS,[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant &amp;amp; [http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs, [http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers, [http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital, &amp;lt;br&amp;gt; [http://www.linkedin.com/in/mahidontamsetti   Mahi Dontamsetti] Moderator''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Security_Assessing_Java_RMI Security Assessing Java RMI] &lt;br /&gt;
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web &lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |OWASP Testing Guide - Offensive Assessing Financial Applications&lt;br /&gt;
'' [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert Daniel Cuthbert]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho w3af - A Framework to own the web]&lt;br /&gt;
''Andres Riancho''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API [http://www.owasp.org/index.php/ESAPI (ESAPI) Project]&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Case Studies: Exploiting application testing tool deficiencies via &amp;quot;out of band&amp;quot; injection&lt;br /&gt;
''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] &amp;amp; [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Threading the Needle:&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks&lt;br /&gt;
'' [http://www.linkedin.com/in/arianevans Arian Evans]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann Multidisciplinary Bank Attacks]&lt;br /&gt;
''Gunter Ollmann''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD]&lt;br /&gt;
'' [http://www.linkedin.com/in/packetfocus Joshua Perrymon]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Coding Secure w/PHP&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Payment_Card_Data_Security_and_the_new_Enterprise_Java Payment Card Data Security and the new Enterprise Java]&lt;br /&gt;
''[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar Dr. B. V. Kumar] &amp;amp; [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav Mr. Abhay Bhargav]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:00-20:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Chapter Leader / Project Leader working session&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;lt;b&amp;gt;(ISC)2 Cocktail Hour&amp;lt;/b&amp;gt; all welcome to attend for special announcement &amp;lt;br&amp;gt; presented by: [https://www.isc2.org/cgi-bin/content.cgi?page=351 W. Hord Tipton, Executive Director of (ISC)2]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Technology Movie Night ''[http://www.youtube.com/watch?v=LlKDkTbUFhU&amp;amp;feature=related Sneakers], [http://www.youtube.com/watch?v=tAcEzhQ7oqA WarGames], [http://hackersarepeopletoo.com HackersArePeopleToo], [http://www.youtube.com/watch?v=4Be-ZzcXVLw TigerTeam]'' from 19:00 - 23:00&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00-23:00+ || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Event Party/Reception &amp;lt;br&amp;gt;Event badge required for admission &amp;lt;br&amp;gt;[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Food, Drinks w/ New &amp;amp; Old Friends - break out the laptop and play capture the flag for fun and prizes.] &amp;lt;br&amp;gt;''Location: HOTEL BALLROOM''&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Day 2 – Sept 25th, 2008 &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Software Development: The Last Security Frontier&lt;br /&gt;
''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior&lt;br /&gt;
Executive Director and member of the Board of Directors, (ISC)²''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls Best Practices Guide: Web Application Firewalls]&lt;br /&gt;
''Alexander Meisel''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]'' &amp;amp; ''[http://www.linkedin.com/in/steveantoniewicz Steve Antoniewicz]''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Web Services Top Ten&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html Tiger Team - APPSEC Projects]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | OpenSource Tools ''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Help Wanted&amp;quot; [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Industry Analyst with Forrester Research&lt;br /&gt;
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''[http://www.owasp.org/index.php/User:Wichers Dave Wichers]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Secure Software Impact&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms &lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]'' &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security of Software-as-a-Service (SaaS)&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[NIST SAMATE Static Analysis Tool Exposition (SATE)]]&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-vadim-okun Vadim Okun]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [https://www.owasp.org/index.php/User_talk:Jian Lotus Notes/Domino Web Application Security]&lt;br /&gt;
''[https://www.owasp.org/index.php/User_talk:Jian Jian Hui Wang]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Shootout @ Blackbox Corral&lt;br /&gt;
''Larry Suto ''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The Owasp Orizon Project: towards version 1.0]&lt;br /&gt;
[https://www.owasp.org/index.php/User:Thesp0nge Paolo Perego]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Building_Usable_Security Building Usable Security]&lt;br /&gt;
[http://www.owasp.org/index.php/Zed_Abbadi Zed Abbadi]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Off-shoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani'' &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 OWASP EU Summit Portugal]&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Code Secrets&lt;br /&gt;
''[http://johanpeeters.com Johan Peeters]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Vulnerabilities in application interpreters and runtimes&lt;br /&gt;
''Erik Cabetas''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Detecting User Disposition - Polar Bears in a Whiteout [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen]''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Special Guest&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Event Wrap-Up / Speaker &amp;amp; CTF Awards and Sponsor Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Technology Pavilion - September 24th and 25th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from technology product and service firms worldwide? Stop by the Technology Pavilion/TechExpo on September 24th and 25th. &lt;br /&gt;
&lt;br /&gt;
Do you want to preview the event space [http://www.parkcentralny.com/meetings/floor_plans.cfm Click Here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CPE Credits ==&lt;br /&gt;
&lt;br /&gt;
Much of the content is eligible for CPE credits.  Please check with your institution regarding specific requirements.&lt;br /&gt;
&lt;br /&gt;
'''The CISM cpe policy (www.isaca.org/cismcpepolicy) states''': &lt;br /&gt;
&lt;br /&gt;
One continuing professional education hour is earned for each fifty minutes of active participation (excluding lunches and breaks) in a professional educational activity. Continuing professional education hours are only earned in full-hour increments and rounding must be down. For example, a CISA who attends an eight-hour presentation (480 minutes) with 90 minutes of breaks will earn seven (7) continuing professional education hours.&lt;br /&gt;
&lt;br /&gt;
Activities that qualify for CPE must be directly applicable to the management, design or assessment of an enterprise's information security as per the CISM job practice&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Earn (ISC)2 CPE Credits at 2008 OWASP USA, NYC'''&lt;br /&gt;
&lt;br /&gt;
Attendance at the 2008 OWASP NYC Training Courses or Conferences will earn you Continuing Professional Education (CPE) credits as follows:&lt;br /&gt;
Training Courses: September 22-23, 2008&lt;br /&gt;
•	16 CPE units for 2 days of training (Monday - Tuesday) &lt;br /&gt;
•	8 CPE units for 1 day of training (Monday or Tuesday Only) &lt;br /&gt;
Conferences: September 24-25, 2008&lt;br /&gt;
Earn 1 CPE per hour of conference attendance&lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008 ] ==&lt;br /&gt;
&lt;br /&gt;
All classes begin at 9AM and end at 5:30PM&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. [[:Category:OWASP_AppSec_Conference_Training#T1._Defensive_Programming_-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jason Rouse, Technical Manager, [http://www.cigital.com/training/series http://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training#T2._Secure_Coding_for_Java_EE-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Dave Wichers: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training#T3._Web_Services_and_XML_Security_-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training#T4._Advanced_Web_Application_Security_Testing_-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Eric Sheridan: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training#T5._Leading_the_Development_of_Secure_Applications_-_1-Day_Course_-_Sep_22.2C_2008 | Learn More Here]]&lt;br /&gt;
Instructor: John Pavone: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Building Secure Rich Internet Applications 1-Day - Sept 23rd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This one day training addresses the special issues that arise in this type of application development.  [[:Category:OWASP_AppSec_Conference_Training#T6._Building_Secure_Rich_Internet_Applications_-_1-Day_Course_-_Sep_23.2C_2008 | Learn More Here]]&lt;br /&gt;
Instructor: Arshan Dabirsiaghi: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T8. Writing Secure Code  ASP.NET - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Understand the key security features of the .NET platform, the common web security pitfalls developers make, and how to build secure and reliable web applications using ASP.NET. Students are lead through hands on code examples that highlight issues and prescribe solutions. [[:Category:OWASP_AppSec_Conference_Training#T8._Writing_Secure_Code_ASP.NET_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
The instructors are Foundstone's Technical Director, Rudolph Araujo and Foundstone's Professional Services Consultant, Alex Smolen. [http://www.foundstone.com/us/education-overview.asp https://www.owasp.org/images/2/26/Foundstone.jpg]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://www.parkcentralny.com Park Central Hotel] - # 800.346.1359 / 212.247.8000  ROOM BLOCK # 41258 $549.00 per night.&lt;br /&gt;
870 Seventh Avenue at 56th Street, New York, NY 10019-4038&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?near=7th+Ave+%26+W+56th+St,+New+York,+NY&amp;amp;geocode=&amp;amp;q=hotels&amp;amp;f=l&amp;amp;sll=40.766339,-73.980539&amp;amp;sspn=0.007654,0.02223&amp;amp;ie=UTF8&amp;amp;ll=40.764681,-73.980668&amp;amp;spn=0.007655,0.02223&amp;amp;z=16 Hotels close to the venue]&lt;br /&gt;
&lt;br /&gt;
What is around APPSEC2008 - [http://www.parkcentralny.com/attractions/attractions.cfm  Area Attractions]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;EVENT SPONSORSHIP &amp;lt;/h2&amp;gt;The OWASP Conferences &amp;amp; Training security technologists including CSOs,admins, application admins, MIS directors, homeland defense chiefs. These important influencers drive buying decisions exclusive access to its audiences. OWASP has established strategic relationships with security—print publications, newsletters, portals, consultants,message—and leadership positioning OWASP events. OWASP’s mission is supported by organizations who share our application, and software security communities. This approach should be part of your mix.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities]- Register online: [http://guest.cvent.com/i.aspx?4W,M3,09e3b490-ba93-4474-851e-be803b1a01c2 click here]&amp;lt;/b&amp;gt;&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=39518</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=39518"/>
				<updated>2008-09-12T19:59:28Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008] */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
= 2008 OWASP USA, NYC =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP Foundation is excited to announce a change of venue for our NYC AppSec 2008 Conference as of &amp;lt;b&amp;gt;9/11/2008&amp;lt;/b&amp;gt; from downtown NYC to midtown. This was required due to the growing size of the conference and space limitations at our former venue. The prestigious &amp;lt;b&amp;gt;[http://www.parkcentralny.com/location/location.cfm Park Central New York Hotel]&amp;lt;/b&amp;gt; (www.parkcentralny.com) will now host the largest OWASP AppSec Conference on record. Centrally located in the heart of New York City, this landmark choice of Midtown Manhattan hotels is just blocks from the Theater District, Central Park, Rockefeller Center, and numerous fine restaurants. Relocation to this modern venue enables OWASP to offer conference attendees additional seating space, onsite accommodations, and access to the best of what New York City has to offer.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/6/61/Banner2_irfan.jpg]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;Scroll down to see event agenda and training options&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This conference has tracks for management, security, audit and development professionals interested in the state of the appsec industry and its trends. Presented by some of the brightest people in the industry, this event is a must attend for anyone looking to improve their information security posture and threat awareness. With assistance from: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net NYC ISACA], [http://www.nymissa.org NYC ISSA] and our event co-sponsors you are invited to (2) days of hardcore hands-on training and (2) full days of Seminars and Technology Pavilion from the world's best application security technology minds, all held in the New York City, Midtown. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;When:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sept 22nd - 25th 2008&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Where:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;&amp;lt;b&amp;gt;[http://www.parkcentralny.com/location/location.cfm The Park Central Hotel - 870 Seventh Avenue at 56th Street New York, NY 10019-4038]&amp;lt;/b&amp;gt;&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;How Much?&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Seminar Fees: $350 [https://www.owasp.org/index.php/Membership#Categories_of_Membership OWASP Members] / $400 Non-Members (includes 1 year OWASP individual membership) / $200 for Students (with student ID).  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#OWASP_NYC_AppSec_2008_Training_Courses_-_September_22nd_and_23rd.2C_2008 2 days of hands on training classes] are also available.&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Diamond Sponsor] - [http://www.imperva.com http://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Platinum Sponsor]  - [http://www.cenzic.com https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]  - [http://www.whitehatsec.com http://www.owasp.org/images/archive/4/4d/20080703021901%21Whitehat.gif] -  [http://www-935.ibm.com/services/us/gbs/app/html/gbs_applicationservices.html?cm_re=masthead-_-business-_-apps-allappserv https://www.owasp.org/images/4/47/Ibm.jpg] &amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Gold, Silver &amp;amp; Other Sponsors] - [http://www.isc2.org http://www.owasp.org/images/4/45/Isc2logo.gif] - [http://www.f5.com http://www.owasp.org/images/7/7e/50px-F5_50px.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.foundstone.com/us/education-overview.asp http://www.owasp.org/images/2/26/Foundstone.jpg] - [http://www.qualys.com https://www.owasp.org/images/a/ae/Qualys.gif] - [http://www.ouncelabs.com https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.acunetix.com https://www.owasp.org/images/e/eb/Acuneti.gif] - [http://www.accessitgroup.com https://www.owasp.org/images/6/6d/Accessit.JPG] - &lt;br /&gt;
[http://www.fishnetsecurity.com https://www.owasp.org/images/4/4a/Fishnet_security.png] - [http://www.arctecgroup.net http://www.owasp.org/images/b/bf/Arctec.jpg] - [http://www.airtightnetworks.net https://www.owasp.org/images/8/8b/Airtight.gif] - &lt;br /&gt;
[http://www.artofdefence.com https://www.owasp.org/images/d/dc/AOD_Logo.gif] - &lt;br /&gt;
[http://www.securityuniversity.net https://www.owasp.org/images/0/0d/Security_university.jpg] - &lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif] - [http://www.armorize.com https://www.owasp.org/images/c/ce/Armorize_Logo.png] -[http://www.barracudanetworks.com/ https://www.owasp.org/images/a/a2/Barracuda_Color_Logo.jpg] ~ [http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf http://www.owasp.org/images/f/f8/Sponsorsm.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities] -- [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-PRESS Press Registration] -- [http://www.owasp.org/index.php/Member_Offers Other OWASP Member Offers] &amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th ==&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;h2&amp;gt;[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/speakeragreement OWASP Speaker Agreement]&amp;lt;/h2&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | &amp;lt;h2&amp;gt;Day 1 – Sept 24th, 2008 &amp;lt;/h2&amp;gt; &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: BALLROOM&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: SKYLINE&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: TIMESQUARE&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:50 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Doors Open for Attendee/Speaker Registration &lt;br /&gt;
''avoid lines come early get your caffeine fix and use free wifi''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Version 3.0 who we are, how we got here and where we are going?&lt;br /&gt;
''OWASP Foundation: [http://www.owasp.org/index.php/Contact Jeff Williams], [http://www.owasp.org/index.php/Contact Dinis Cruz], [http://www.owasp.org/index.php/Contact Dave Wichers], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.owasp.org/index.php/Contact Sebastien Deleersnyder], [http://www.owasp.org/index.php/Contact Paulo Coimbra], [http://www.owasp.org/index.php/Contact Kate Hartmann], [http://www.owasp.org/index.php/Contact Alison Shrader] &amp;amp; [http://www.owasp.org/index.php/Category:OWASP_Chapter#Chapter_Support_Materials all local chapter leaders]&lt;br /&gt;
'' &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  [http://www.owasp.org/index.php/AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 Analysis of the Web Hacking Incidents Database (WHID)]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.webappsecroadmap.com Web Application Security Road Map]  &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] &amp;amp; [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Http Bot Research&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP &amp;quot;Google Hacking&amp;quot; Project &lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | MalSpam Research &lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Get Rich or Die Trying - Making Money on The Web, The Black Hat Way&lt;br /&gt;
''[http://www.linkedin.com/in/treyford Trey Ford], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.linkedin.com/pub/0/205/77a Jeremiah Grossman]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Framework-level Threat Analysis: Adding Science to the Art of Source-code review&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-rohit-sethi Rohit Sethi] &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni Sahba Kazerooni]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Automated Web-based Malware Behavioral Analysis &lt;br /&gt;
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | New Exploit Techniques&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] &amp;amp; [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WAF ModSecurity&lt;br /&gt;
''[http://www.breach.com/company/executive-team/ Ivan Ristic]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Using Layer 8 and OWASP to Secure Web Applications&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern] &amp;amp; [http://www.linkedin.com/in/romangarber Roman Garber]''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Industry Outlook Panel: ''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, [http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, [http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, [http://www.linkedin.com/pub/0/1ba/4a9 Warren Axelrod] SVP Bank of America, [http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS,[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant &amp;amp; [http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs, [http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers, [http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital, &amp;lt;br&amp;gt; [http://www.linkedin.com/in/mahidontamsetti   Mahi Dontamsetti] Moderator''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Security_Assessing_Java_RMI Security Assessing Java RMI] &lt;br /&gt;
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web &lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |OWASP Testing Guide - Offensive Assessing Financial Applications&lt;br /&gt;
'' [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert Daniel Cuthbert]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Wild_Wild_Web_on_Security_Planet Wild Wild Web on Security Planet]&lt;br /&gt;
''[http://www.securisksolutions.com/company/execmgt.aspx Mano Paul]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann Multidisciplinary Bank Attacks]&lt;br /&gt;
''Gunter Ollmann''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API [http://www.owasp.org/index.php/ESAPI (ESAPI) Project]&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Case Studies: Exploiting application testing tool deficiencies via &amp;quot;out of band&amp;quot; injection&lt;br /&gt;
''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] &amp;amp; [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Threading the Needle:&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks&lt;br /&gt;
'' [http://www.linkedin.com/in/arianevans Arian Evans]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho w3af - A Framework to own the web]&lt;br /&gt;
''Andres Riancho''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD]&lt;br /&gt;
'' [http://www.linkedin.com/in/packetfocus Joshua Perrymon]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Coding Secure w/PHP&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Payment_Card_Data_Security_and_the_new_Enterprise_Java Payment Card Data Security and the new Enterprise Java]&lt;br /&gt;
''[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar Dr. B. V. Kumar] &amp;amp; [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav Mr. Abhay Bhargav]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:00-19:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Party Set-Up ''BallRoom''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;lt;b&amp;gt; (ISC)2 Pre-Party event, all welcome to attend for special announcement &amp;lt;br&amp;gt; presented by: [https://www.isc2.org/cgi-bin/content.cgi?page=351 W. Hord Tipton, Executive Director of (ISC)2]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Technology Movie Night ''[http://www.youtube.com/watch?v=LlKDkTbUFhU&amp;amp;feature=related Sneakers], [http://www.youtube.com/watch?v=tAcEzhQ7oqA WarGames], [http://hackersarepeopletoo.com HackersArePeopleToo], [http://www.youtube.com/watch?v=4Be-ZzcXVLw TigerTeam]'' from 19:00 - 22:00&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:30-22:00+ || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Event Party/Reception &amp;lt;br&amp;gt;Event badge required for admission &amp;lt;br&amp;gt;[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Food, Drinks w/ New &amp;amp; Old Friends - break out the laptop and play capture the flag for fun and prizes.] &amp;lt;br&amp;gt;''Location: HOTEL BALLROOM''&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | &amp;lt;h2&amp;gt;Day 2 – Sept 25th, 2008 &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Software Development: The Last Security Frontier&lt;br /&gt;
''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior&lt;br /&gt;
Executive Director and member of the Board of Directors, (ISC)²''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls Best Practices Guide: Web Application Firewalls]&lt;br /&gt;
''Alexander Meisel''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]'' &amp;amp; ''[http://www.linkedin.com/in/steveantoniewicz Steve Antoniewicz]''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Web Services Top Ten&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html Tiger Team - APPSEC Projects]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | OpenSource Tools ''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Help Wanted&amp;quot; [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Industry Analyst with Forrester Research&lt;br /&gt;
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''[http://www.owasp.org/index.php/User:Wichers Dave Wichers]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Secure Software Impact&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms &lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]'' &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security of Software-as-a-Service (SaaS)&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[NIST SAMATE Static Analysis Tool Exposition (SATE)]]&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-vadim-okun Vadim Okun]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [https://www.owasp.org/index.php/User_talk:Jian Lotus Notes/Domino Web Application Security]&lt;br /&gt;
''[https://www.owasp.org/index.php/User_talk:Jian Jian Hui Wang]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Shootout @ Blackbox Corral&lt;br /&gt;
''Larry Suto ''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The Owasp Orizon Project: towards version 1.0]&lt;br /&gt;
[https://www.owasp.org/index.php/User:Thesp0nge Paolo Perego]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Building_Usable_Security Building Usable Security]&lt;br /&gt;
[http://www.owasp.org/index.php/Zed_Abbadi Zed Abbadi]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Off-shoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani'' &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 OWASP EU Summit Portugal]&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Code Secrets&lt;br /&gt;
''[http://johanpeeters.com Johan Peeters]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Vulnerabilities in application interpreters and runtimes&lt;br /&gt;
''Erik Cabetas''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Special Guest&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Event Wrap-Up / Speaker &amp;amp; CTF Awards and Sponsor Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Technology Pavilion - September 24th and 25th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from technology product and service firms worldwide? Stop by the Technology Pavilion/TechExpo on September 24th and 25th. &lt;br /&gt;
&lt;br /&gt;
Do you want to preview the event space [http://www.parkcentralny.com/meetings/floor_plans.cfm Click Here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CPE Credits ==&lt;br /&gt;
&lt;br /&gt;
Much of the content is eligible for CPE credits.  Please check with your institution regarding specific requirements.&lt;br /&gt;
&lt;br /&gt;
'''The CISM cpe policy (www.isaca.org/cismcpepolicy) states''': &lt;br /&gt;
&lt;br /&gt;
One continuing professional education hour is earned for each fifty minutes of active participation (excluding lunches and breaks) in a professional educational activity. Continuing professional education hours are only earned in full-hour increments and rounding must be down. For example, a CISA who attends an eight-hour presentation (480 minutes) with 90 minutes of breaks will earn seven (7) continuing professional education hours.&lt;br /&gt;
&lt;br /&gt;
Activities that qualify for CPE must be directly applicable to the management, design or assessment of an enterprise's information security as per the CISM job practice&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Earn (ISC)2 CPE Credits at 2008 OWASP USA, NYC'''&lt;br /&gt;
&lt;br /&gt;
Attendance at the 2008 OWASP NYC Training Courses or Conferences will earn you Continuing Professional Education (CPE) credits as follows:&lt;br /&gt;
Training Courses: September 22-23, 2008&lt;br /&gt;
•	16 CPE units for 2 days of training (Monday - Tuesday) &lt;br /&gt;
•	8 CPE units for 1 day of training (Monday or Tuesday Only) &lt;br /&gt;
Conferences: September 24-25, 2008&lt;br /&gt;
Earn 1 CPE per hour of conference attendance&lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008 ] ==&lt;br /&gt;
&lt;br /&gt;
All classes begin at 9AM and end at 5:30PM&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [[:Category:OWASP_AppSec_Conference_Training#T1._Defensive_Programming_-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jason Rouse, Technical Manager, [http://www.cigital.com/training/series http://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training#T2._Secure_Coding_for_Java_EE-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Dave Wichers: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training#T3._Web_Services_and_XML_Security_-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training#T4._Advanced_Web_Application_Security_Testing_-_2-Day_Course_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Eric Sheridan: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training#T5._Leading_the_Development_of_Secure_Applications_-_1-Day_Course_-_Sep_22.2C_2008 | Learn More Here]]&lt;br /&gt;
Instructor: John Pavone: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Building Secure Rich Internet Applications 1-Day - Sept 23rd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This one day training addresses the special issues that arise in this type of application development.  [[:Category:OWASP_AppSec_Conference_Training#T6._Building_Secure_Rich_Internet_Applications_-_1-Day_Course_-_Sep_23.2C_2008 | Learn More Here]]&lt;br /&gt;
Instructor: Arshan Dabirsiaghi: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T8. Writing Secure Code  ASP.NET - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Understand the key security features of the .NET platform, the common web security pitfalls developers make, and how to build secure and reliable web applications using ASP.NET. Students are lead through hands on code examples that highlight issues and prescribe solutions. [[:Category:OWASP_AppSec_Conference_Training#T8._Writing_Secure_Code_ASP.NET_-_Sep_22-23.2C_2008 | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
The instructors are Foundstone's Technical Director, Rudolph Araujo and Foundstone's Professional Services Consultant, Alex Smolen. [http://www.foundstone.com/us/education-overview.asp https://www.owasp.org/images/2/26/Foundstone.jpg]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://www.parkcentralny.com Park Central Hotel] - # 800.346.1359 / 212.247.8000  ROOM BLOCK # 41258 $549.00 per night.&lt;br /&gt;
870 Seventh Avenue at 56th Street, New York, NY 10019-4038&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?near=7th+Ave+%26+W+56th+St,+New+York,+NY&amp;amp;geocode=&amp;amp;q=hotels&amp;amp;f=l&amp;amp;sll=40.766339,-73.980539&amp;amp;sspn=0.007654,0.02223&amp;amp;ie=UTF8&amp;amp;ll=40.764681,-73.980668&amp;amp;spn=0.007655,0.02223&amp;amp;z=16 Hotels close to the venue]&lt;br /&gt;
&lt;br /&gt;
What is around APPSEC2008 - [http://www.parkcentralny.com/attractions/attractions.cfm  Area Attractions]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;EVENT SPONSORSHIP &amp;lt;/h2&amp;gt;The OWASP Conferences &amp;amp; Training security technologists including CSOs,admins, application admins, MIS directors, homeland defense chiefs. These important influencers drive buying decisions exclusive access to its audiences. OWASP has established strategic relationships with security—print publications, newsletters, portals, consultants,message—and leadership positioning OWASP events. OWASP’s mission is supported by organizations who share our application, and software security communities. This approach should be part of your mix.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities]- Register online: [http://guest.cvent.com/i.aspx?4W,M3,09e3b490-ba93-4474-851e-be803b1a01c2 click here]&amp;lt;/b&amp;gt;&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=23331</id>
		<title>7th OWASP AppSec Conference - San Jose 2007/Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=23331"/>
				<updated>2007-11-09T22:09:53Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Conference Training Day - Two Day Training Courses - November 12th-13th, 2007 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Conference Training Day - Two Day Training Courses - November 12th-13th, 2007 ==&lt;br /&gt;
&lt;br /&gt;
OWASP has arranged to have six 2-day Application Security training courses prior to the conference.&lt;br /&gt;
&lt;br /&gt;
The first three courses will be provided by a long time contributor to OWASP, Aspect Security. The fourth course will be provided by another active OWASP member, the Arctec Group. The fifth course is being provided by Dinis Cruz, the OWASP Chief Evangelist. The sixth course is being presented by frequent OWASP/WASC contributor Breach Security.  Most of these courses were offered in their 1-day format at the last two OWASP AppSec conferences and were well received. This is the first OWASP conference where we have been able to expand these classes to their 2-day format.&lt;br /&gt;
&lt;br /&gt;
These courses are being offered to attendees of the OWASP conference at a significant discount to their standard commercial price. Most of the course fee will go to OWASP to support the OWASP Foundation's efforts.&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; width=&amp;quot;60%&amp;quot; cellpadding=&amp;quot;2&amp;quot; cellspacing=&amp;quot;5&amp;quot; style=&amp;quot;vertical-align:top;background-color:#cedff2&amp;quot;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T1&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Building and Testing Secure Web Applications&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T2&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Secure Coding for Java EE&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T3&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Secure Coding .NET Web Applications&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T4&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Web Services and XML Security&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T5&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Leveraging OWASP Tools and Documents to Secure Your Enterprise&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T6&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;ModSecurity Boot-Camp Training&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;*Note: Information corresponding to each training course is located below.&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pricing'''&lt;br /&gt;
&lt;br /&gt;
$1300 for conference attendees. [Note: This fee includes snacks, and LUNCH]&lt;br /&gt;
&lt;br /&gt;
$1450 - Tutorial only pricing (if not attending the conference)&lt;br /&gt;
&lt;br /&gt;
$675 - Student Pricing&lt;br /&gt;
&lt;br /&gt;
'''Location'''&lt;br /&gt;
&lt;br /&gt;
At eBay in San Jose. Same location as the conference. [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=2211+North+First+Street++San+Jose,+CA&amp;amp;sll=37.35288,-121.9047&amp;amp;sspn=0.201136,0.304184&amp;amp;ie=UTF8&amp;amp;t=h&amp;amp;z=17&amp;amp;om=1 Click Here for Map] [http://maps.google.com/maps?f=d&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;saddr=san+jose+airport&amp;amp;daddr=2211+North+First+Street++San+Jose,+CA&amp;amp;sll=37.377249,-121.921354&amp;amp;sspn=0.006283,0.009506&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=1 From San Jose Airport] [http://maps.google.com/maps?f=d&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;saddr=San+Francisco+airport&amp;amp;daddr=2211+North+First+Street++San+Jose,+CA&amp;amp;sll=37.36999,-121.92282&amp;amp;sspn=0.025136,0.038023&amp;amp;ie=UTF8&amp;amp;z=11&amp;amp;om=1 From San Francisco Airport]&lt;br /&gt;
&lt;br /&gt;
'''Course Times'''&lt;br /&gt;
&lt;br /&gt;
Each class begins at 9 AM and runs until 5:30 PM each day.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
== T1. Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful two day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following web application security areas (which encompass the entire OWASP Top 10 plus more): &lt;br /&gt;
&lt;br /&gt;
* Authentication and Session Management&lt;br /&gt;
* Access Control&lt;br /&gt;
* Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* Cross-Site Scripting (XSS)&lt;br /&gt;
* Input Validation&lt;br /&gt;
* Protecting Sensitive Data (w/ Crypto)&lt;br /&gt;
* Caching, Pooling, and Reuse Errors &lt;br /&gt;
* Database Security (Including SQL Injection)&lt;br /&gt;
* Error Handling and Logging&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Code Quality&lt;br /&gt;
* Accessing Services Securely&lt;br /&gt;
* Setting Security Policy&lt;br /&gt;
* Integrating Security into the SDLC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T2. Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
To make room for this Java specific content, some of the more basic material has been removed, and some topics covered in our standard course are not addressed here.&lt;br /&gt;
&lt;br /&gt;
This course is a compressed version of Aspect's standard 3-day Secure Coding for Java EE course.&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful two day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most Java EE based web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how Java EE web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following Java EE web application security areas (which encompass the entire OWASP Top 10 plus more): &lt;br /&gt;
&lt;br /&gt;
* Authentication and Session Management&lt;br /&gt;
* Access Control&lt;br /&gt;
* Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* Cross-Site Scripting (XSS)&lt;br /&gt;
* Input Validation&lt;br /&gt;
* Protecting Sensitive Data (w/ Crypto)&lt;br /&gt;
* Database Security (Including SQL Injection)&lt;br /&gt;
* Error Handling and Logging&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Testing Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
'''Hands on Coding Exercises''' (Only in Java specific version of this class!)&lt;br /&gt;
&lt;br /&gt;
For this Java focused course, students will additionally have the opportunity to find, exploit, and then fix Java coding vulnerabilities in three different Java labs using Eclipse.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T3. Secure Coding .NET Web Applications - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of .NET focused content, including:&lt;br /&gt;
# .NET Framework security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on .NET, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a .NET application developed for the class.&lt;br /&gt;
&lt;br /&gt;
This class covers, and includes examples from, both C# and ASP.NET.&lt;br /&gt;
&lt;br /&gt;
To make room for this .NET specific content, some of the more basic material has been removed, and some topics covered in our standard course are not addressed here.&lt;br /&gt;
&lt;br /&gt;
This course is a compressed version of Aspect's standard 3-day Secure Coding for .NET course.&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful two day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most .NET based web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how .NET web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following .NET web application security areas (which encompass the entire OWASP Top 10 plus more): &lt;br /&gt;
&lt;br /&gt;
* Authentication and Session Management&lt;br /&gt;
* Access Control&lt;br /&gt;
* Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* Cross-Site Scripting (XSS)&lt;br /&gt;
* Input Validation&lt;br /&gt;
* Protecting Sensitive Data (w/ Crypto)&lt;br /&gt;
* Database Security (Including SQL Injection)&lt;br /&gt;
* Error Handling and Logging&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Testing Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
'''Hands on Coding Exercises''' (Only in .NET specific version of this class!)&lt;br /&gt;
&lt;br /&gt;
For this .NET focused course, students will additionally have the opportunity to find, exploit, and then fix .NET coding vulnerabilities in three different .NET labs using Visual Studio.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T4. Web Services and XML Security - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software.&lt;br /&gt;
&lt;br /&gt;
Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system!&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
Topics covered include understanding how web application risks (such as those in OWASP Guide and OWASP Top Ten) apply in a Web Services world, and Web Services security topics including:&lt;br /&gt;
&lt;br /&gt;
* Web Services attack patterns&lt;br /&gt;
* Common XML attack patterns&lt;br /&gt;
* Data and XML security using WS-Security, SAML, XML Encryption and XML Digital Signature&lt;br /&gt;
* Identity services and federation with SAML and Liberty&lt;br /&gt;
* Hardening Web Services servers&lt;br /&gt;
* Input validation for Web Services&lt;br /&gt;
* Integrating Web Services securely with backend resources and applications using WS-Trust&lt;br /&gt;
* Secure Exception handling in Web Services&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by [http://www.arctecgroup.net http://www.owasp.org/images/b/bc/Arctec_logo.jpeg]&lt;br /&gt;
&lt;br /&gt;
== T5. Leveraging OWASP Tools and Documents to Secure Your Enterprise - 2-Day Course - Nov 12-13, 2007 == &lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Apart from OWASP's Top 10, most OWASP projects (https://www.owasp.org/index.php/Category:OWASP_Project) are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Lifecycle (WADL)&lt;br /&gt;
&lt;br /&gt;
This course aims to change that by providing detailed presentations of the most mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
&lt;br /&gt;
Curriculum&lt;br /&gt;
&lt;br /&gt;
* Part 1: OWASP Documentation Projects&lt;br /&gt;
* Part 2: OWASP Tools&lt;br /&gt;
* Part 3: Using OWASP in the Enterprise&lt;br /&gt;
* Part 4: Using OWASP in the WADL (Web Application Development Lifecycle)&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
The course will be very practical where demonstration and hands-on exercises will be provided for the tools covered.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a laptop.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by Dinis Cruz (OWASP Chief Evangelist)&lt;br /&gt;
&lt;br /&gt;
== T6. ModSecurity Boot-Camp Training - 2-Day Course - Nov 12-13, 2007 == &lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
ModSecurity is currently the most widely deployed web application firewall (WAF) product.  This two-day, boot-camp class is designed for those people who want to quickly learn how to build, deploy, and use ModSecurity in the most effective manner possible.  The course will cover topics such as: the open source ModSecurity Console, which helps manage alerts on suspicious web activity targeting your web servers, and also provides an in-depth look at the extremely powerful ModSecurity Rules Language.  Learning how to take advantage of the power behind ModSecurity rules can help web security professionals write and configure highly effective rules to handle complex web vulnerabilities.  Hands-on labs with fully documented instructions help students deploy solid, secure ModSecurity installations and understand the inner workings of the premier open source web application firewall available today.&lt;br /&gt;
&lt;br /&gt;
Curriculum&lt;br /&gt;
&lt;br /&gt;
Day 1: Deployment and Management&lt;br /&gt;
* Introduction to Web Application Firewalls &lt;br /&gt;
* Overview of the Web Application Firewall Evaluation Criteria &lt;br /&gt;
* Introduction to ModSecurity &lt;br /&gt;
* ModSecurity architecture &lt;br /&gt;
* ModSecurity deployment options &lt;br /&gt;
* ModSecurity installation &lt;br /&gt;
* ModSecurity configuration and operation &lt;br /&gt;
* ModSecurity directives and features overview &lt;br /&gt;
* ModSecurity rules primer &lt;br /&gt;
* ModSecurity tuning &lt;br /&gt;
* ModSecurity console deployment and usage &lt;br /&gt;
&lt;br /&gt;
Day 2: Rules Writing Workshop&lt;br /&gt;
* Introduction to ModSecurity’s Rule Language &lt;br /&gt;
* Anatomy of a ModSecurity rule &lt;br /&gt;
* Overview of PCRE &lt;br /&gt;
* Variables &lt;br /&gt;
* Transformation functions &lt;br /&gt;
* Actions &lt;br /&gt;
* Using advanced rule syntax with the “chain” action &lt;br /&gt;
* Overview of the Core Rule set &lt;br /&gt;
* Creating custom rules &lt;br /&gt;
* Virtual Patching &lt;br /&gt;
* Using initcol and setsid for stateful rules &lt;br /&gt;
* Good rule writing practices &lt;br /&gt;
* Testing rules &lt;br /&gt;
* Tuning rules &lt;br /&gt;
* Rule Debugging &lt;br /&gt;
* Rule management &lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
Hands-on labs will include installation and use of the ModSecurity Console on day 1, and a unique challenge on day 2 where the participants will have to use ModSecurity to try and mitigate as many vulnerabilities as possible in the OWASP WebGoat application.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a laptop.  The class will use a custom VMware image so you will need to have VMware Player, Workstation or Server pre-installed.  Additionally, some of the tools we will be using outside of the VMware host will require Java so ensure that you have installed/updated to the latest version.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by Ryan Barnett (ModSecurity Community Manager and Director of Application Security Training at [http://www.breach.com http://www.owasp.org/images/9/9c/Breach_logo.gif])&lt;br /&gt;
&lt;br /&gt;
* Special Note: Ivan Ristic, ModSecurity Creator and Breach Security Chief Evangelist, will be in attendance to answer questions and also to present on the ModSecurity development roadmap.&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Conference_blurb&amp;diff=23239</id>
		<title>Template:Conference blurb</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Conference_blurb&amp;diff=23239"/>
				<updated>2007-11-07T16:46:05Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Nov 12-15 - [[:Category:OWASP AppSec Conference | OWASP &amp;amp; WASC AppSec 2007]] - San Jose'''&lt;br /&gt;
:Join us at the 7th AppSec Conference at eBay in San Jose, CA. Two full days of [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | training]] and two days of a dual track [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | agenda]] with the leading experts in application security. [https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=17e6e912-2dec-4de6-8946-aa005721c4dd Register...]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feb 27-29 - [[:Category:OWASP_AppSec_Conference | OWASP Australia AppSec 2008]] - Queensland'''&lt;br /&gt;
:Join us at the 8th AppSec Conference at Gold Coast Convention Center in Queensland Australia. One day of [[OWASP_Australia_AppSec_2008_Conference/TrainingAgenda| training]] and two days of a dual track [[OWASP_Australia_AppSec_2008_Conference/Agenda| agenda]] with the leading experts in application security. [http://guest.cvent.com/i.aspx?4W,M3,91a28af2-06ca-4030-bec4-a55c5a6fe138 Registration is now open!!!]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Conference_blurb&amp;diff=23238</id>
		<title>Template:Conference blurb</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Conference_blurb&amp;diff=23238"/>
				<updated>2007-11-07T16:43:19Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Nov 12-15 - [[:Category:OWASP AppSec Conference | OWASP &amp;amp; WASC AppSec 2007]] - San Jose'''&lt;br /&gt;
:Join us at the 7th AppSec Conference at eBay in San Jose, CA. Two full days of [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | training]] and two days of a dual track [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | agenda]] with the leading experts in application security. [https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=17e6e912-2dec-4de6-8946-aa005721c4dd Register...]&lt;br /&gt;
&lt;br /&gt;
'''Feb 27-29 - [[:Category:OWASP_AppSec_Conference | OWASP Australia AppSec 2008]] - Queensland, Australia'''&lt;br /&gt;
:Join us at the 8th AppSec Conference at Gold Coast Convention Center in Queensland Australia. One day of [[OWASP_Australia_AppSec_2008_Conference/TrainingAgenda| training]] and two days of a dual track [[OWASP_Australia_AppSec_2008_Conference/Agenda| agenda]] with the leading experts in application security. [http://guest.cvent.com/i.aspx?4W,M3,91a28af2-06ca-4030-bec4-a55c5a6fe138 Register...]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Australia_AppSec_2008_Conference&amp;diff=23237</id>
		<title>OWASP Australia AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Australia_AppSec_2008_Conference&amp;diff=23237"/>
				<updated>2007-11-07T16:21:31Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Registration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference https://www.owasp.org/images/4/4b/Owasp_ausconf_banner.jpg]&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP Australia Application Security Conference for 2008. Following on from the great success of OWASP Conferences in 2006 and 2007 in the United States and Europe, the first ever Asia Pacific &amp;amp; Australia Security conference will take place in February 2008. The conference will offer an opportunity for security professionals, developers, Managers to hear from industry recognised speakers on the latest critical security risks associated with application security. The conference includes a number of high quality presentations from industry speakers and business professionals with also the opportunity to network with relevant application security vendors and professionals.&lt;br /&gt;
&lt;br /&gt;
==Conference Details==&lt;br /&gt;
&lt;br /&gt;
'''Conference Training Day''' (Wednesday 27th February 2008).&lt;br /&gt;
&lt;br /&gt;
'''Main Conference Presentations''' (Thursday 28th and Friday 29th February 2008).&lt;br /&gt;
&lt;br /&gt;
The 2008 Conference will be held at the Gold Coast Convention Center in Queensland Australia.&lt;br /&gt;
&lt;br /&gt;
The Conference includes a Vendor Exhibition, Welcome Cocktail Party and Gala Dinner.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Latest News==&lt;br /&gt;
&lt;br /&gt;
We are currently in the final planing stages of the conference. We invite anyone to submit any recommendations, or ideas for the conference.&lt;br /&gt;
&lt;br /&gt;
The Call for papers has begun, and we would appreciate anyone submiting ideas and presentations email to  jderry 'at' owasp.org. The call for papers will expire on the 30th November 2007. We hope to put together a fantastic line up of OWASP Project speakers and industry experts. &lt;br /&gt;
&lt;br /&gt;
We are encouraging anyone to get involved in the project, so please simply contact the conference committee to get involved. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP_Australia_AppSec_2008_Conference/TrainingAgenda | OWASP Conference Training: Wednesday 27th February 2008]]==&lt;br /&gt;
&lt;br /&gt;
The Training to be offered for the Conference is still currently being decided upon. Any questions please contact the conference Committee.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP_Australia_AppSec_2008_Conference/Agenda | Agenda and Presentations: Thursday 28th and Friday 29th February 2008]]==&lt;br /&gt;
&lt;br /&gt;
Call for papers and presenters is currently open for the conference. &lt;br /&gt;
&lt;br /&gt;
Call for papers will continue until the end of November 2007.&lt;br /&gt;
&lt;br /&gt;
The conference committee only require an initial 3 paragraph summary of your proposed presentation for submissions. Please submit these to the conference committee. The conference will have both a technical and business application security track.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Technology Expo==&lt;br /&gt;
&lt;br /&gt;
Leading vendors in the application security space will be at the conference giving technology demonstrations and providing access to their technical staff so they can answer in-depth questions and demonstrate the capabilities of their products or managed services.&lt;br /&gt;
&lt;br /&gt;
The technology expo will be open during the conference in the meeting area. All attendees will be available to meet and discuss with any of the vendors during moring, lunch and afternoon breaks.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship and participating in the technology expo is available by contacting the conference Committee.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $475, OWASP Members: $425, AISA Members: $450, Early Registration Discount (by Dec 31): $50 &lt;br /&gt;
&lt;br /&gt;
Conference Fees are inclusive of all presentations and agenda (including the Cocktail Reception and Gala Dinner)&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (One Day Training): $650 ($750 if attending tutorial only) Early Registration Discount (by Dec 31): $50 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the AppSec 2008 Conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary. &lt;br /&gt;
(Please note that all fees are in USD)(Conference Fees are kept to a minimum and follow the US/UK Conference Pricing)&lt;br /&gt;
&lt;br /&gt;
==[http://guest.cvent.com/i.aspx?4W,M3,91a28af2-06ca-4030-bec4-a55c5a6fe138 Registration]==&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Here is the [http://guest.cvent.com/i.aspx?4W,M3,91a28af2-06ca-4030-bec4-a55c5a6fe138 registration page].&lt;br /&gt;
&lt;br /&gt;
== OWASP Australian Security Conference 2008 Sponsors==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2008 OWASP conferences, please contact the conference Committee.&lt;br /&gt;
&lt;br /&gt;
Current OWASP Australia Application Security 2008 Conference Sponsors are&lt;br /&gt;
&lt;br /&gt;
[http://www.b-sec.com http://www.owasp.org/images/3/33/Bsec.JPG]&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Australian Conferences Chair: Justin Derry - b-sec Consulting - jderry 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Currently assisted by (and with thanks)&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Australia_AppSec_2008_Conference&amp;diff=23236</id>
		<title>OWASP Australia AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Australia_AppSec_2008_Conference&amp;diff=23236"/>
				<updated>2007-11-07T16:17:08Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference https://www.owasp.org/images/4/4b/Owasp_ausconf_banner.jpg]&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP Australia Application Security Conference for 2008. Following on from the great success of OWASP Conferences in 2006 and 2007 in the United States and Europe, the first ever Asia Pacific &amp;amp; Australia Security conference will take place in February 2008. The conference will offer an opportunity for security professionals, developers, Managers to hear from industry recognised speakers on the latest critical security risks associated with application security. The conference includes a number of high quality presentations from industry speakers and business professionals with also the opportunity to network with relevant application security vendors and professionals.&lt;br /&gt;
&lt;br /&gt;
==Conference Details==&lt;br /&gt;
&lt;br /&gt;
'''Conference Training Day''' (Wednesday 27th February 2008).&lt;br /&gt;
&lt;br /&gt;
'''Main Conference Presentations''' (Thursday 28th and Friday 29th February 2008).&lt;br /&gt;
&lt;br /&gt;
The 2008 Conference will be held at the Gold Coast Convention Center in Queensland Australia.&lt;br /&gt;
&lt;br /&gt;
The Conference includes a Vendor Exhibition, Welcome Cocktail Party and Gala Dinner.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Latest News==&lt;br /&gt;
&lt;br /&gt;
We are currently in the final planing stages of the conference. We invite anyone to submit any recommendations, or ideas for the conference.&lt;br /&gt;
&lt;br /&gt;
The Call for papers has begun, and we would appreciate anyone submiting ideas and presentations email to  jderry 'at' owasp.org. The call for papers will expire on the 30th November 2007. We hope to put together a fantastic line up of OWASP Project speakers and industry experts. &lt;br /&gt;
&lt;br /&gt;
We are encouraging anyone to get involved in the project, so please simply contact the conference committee to get involved. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP_Australia_AppSec_2008_Conference/TrainingAgenda | OWASP Conference Training: Wednesday 27th February 2008]]==&lt;br /&gt;
&lt;br /&gt;
The Training to be offered for the Conference is still currently being decided upon. Any questions please contact the conference Committee.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP_Australia_AppSec_2008_Conference/Agenda | Agenda and Presentations: Thursday 28th and Friday 29th February 2008]]==&lt;br /&gt;
&lt;br /&gt;
Call for papers and presenters is currently open for the conference. &lt;br /&gt;
&lt;br /&gt;
Call for papers will continue until the end of November 2007.&lt;br /&gt;
&lt;br /&gt;
The conference committee only require an initial 3 paragraph summary of your proposed presentation for submissions. Please submit these to the conference committee. The conference will have both a technical and business application security track.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Technology Expo==&lt;br /&gt;
&lt;br /&gt;
Leading vendors in the application security space will be at the conference giving technology demonstrations and providing access to their technical staff so they can answer in-depth questions and demonstrate the capabilities of their products or managed services.&lt;br /&gt;
&lt;br /&gt;
The technology expo will be open during the conference in the meeting area. All attendees will be available to meet and discuss with any of the vendors during moring, lunch and afternoon breaks.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship and participating in the technology expo is available by contacting the conference Committee.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $475, OWASP Members: $425, AISA Members: $450, Early Registration Discount (by Dec 31): $50 &lt;br /&gt;
&lt;br /&gt;
Conference Fees are inclusive of all presentations and agenda (including the Cocktail Reception and Gala Dinner)&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (One Day Training): $650 ($750 if attending tutorial only) Early Registration Discount (by Dec 31): $50 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the AppSec 2008 Conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary. &lt;br /&gt;
(Please note that all fees are in USD)(Conference Fees are kept to a minimum and follow the US/UK Conference Pricing)&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Australian Security Conference 2008 Sponsors==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2008 OWASP conferences, please contact the conference Committee.&lt;br /&gt;
&lt;br /&gt;
Current OWASP Australia Application Security 2008 Conference Sponsors are&lt;br /&gt;
&lt;br /&gt;
[http://www.b-sec.com http://www.owasp.org/images/3/33/Bsec.JPG]&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Australian Conferences Chair: Justin Derry - b-sec Consulting - jderry 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Currently assisted by (and with thanks)&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Conference_Sponsors&amp;diff=22674</id>
		<title>OWASP AppSec Conference Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Conference_Sponsors&amp;diff=22674"/>
				<updated>2007-10-25T14:52:34Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Sending Materials to Conference Facility in San Jose */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Conference Sponsorship ==&lt;br /&gt;
&lt;br /&gt;
OWASP is '''no longer''' accepting sponsorships for the 2007 OWASP AppSec San Jose Conference. Financial sponsorship will help defray the non-profit OWASP Foundation's expenses to prepare for and hold this conference. For the first time, there are two different sponsorship options for this conference:&lt;br /&gt;
&lt;br /&gt;
Option #1: Standard Sponsorship Plan (same as previous conferences):&lt;br /&gt;
&lt;br /&gt;
* Sponsor information will be presented on the main conference web page&lt;br /&gt;
&lt;br /&gt;
* A Sponsor information sheet will be included in handouts to all attendees&lt;br /&gt;
&lt;br /&gt;
* Sponsors can include a poster (no larger than 6 ft. x 4 ft. [can be oriented either way]) at the conference in the main hallway. This can be freestanding, or be hung from the wall.&lt;br /&gt;
&lt;br /&gt;
* Includes 2 Free admissions to the conference&lt;br /&gt;
&lt;br /&gt;
The sponsorship fee for this option at the 7th OWASP Conference in San Jose, CA in November 2007 is $4000.&lt;br /&gt;
&lt;br /&gt;
Option #2: Technology Expo:&lt;br /&gt;
&lt;br /&gt;
* Product vendors can demonstrate their application security products to conference attendees. The intended focus of this expo is to be prepared to discuss the technical details of the technologies they are offering in the market to help organizations deal with their application security issues. This expo should be light on sales push and very technical. OWASP attendees are very familiar with the application security market! As this is a technology expo, services only vendors are not appropriate for this venue.&lt;br /&gt;
&lt;br /&gt;
* Time frame: The technology expo will be held from 12-2 on November 13th, with lunch included for all the OWASP tutorial attendees who will be invited to attend the expo, and then open again from 11-6 on November 14th during the first day of the OWASP conference.&lt;br /&gt;
&lt;br /&gt;
* Setup: The tech expo room will open at 9AM on Nov. 13th for the vendors so you can get in and set everything up.&lt;br /&gt;
&lt;br /&gt;
Each vendor will receive:&lt;br /&gt;
&lt;br /&gt;
* Tabletop with tablecloth&lt;br /&gt;
* Chairs&lt;br /&gt;
* Power strip&lt;br /&gt;
* Internet connectivity (it may be wireless access so please check)&lt;br /&gt;
&lt;br /&gt;
The sponsorship fee for this option at the 7th OWASP Conference in San Jose, CA in November 2007 is also $4000.&lt;br /&gt;
&lt;br /&gt;
Option #3: Combined Sponsorship:&lt;br /&gt;
&lt;br /&gt;
If you are interested in doing both at the San Jose conference, the sponsorship fee for this combined option is $6000.&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring the 2007 OWASP San Jose conference, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Sponsorship registration to the 2007 OWASP AppSec San Jose Conference is now open! Here is the [http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd registration page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sending Materials to Conference Facility in San Jose ==&lt;br /&gt;
&lt;br /&gt;
Sponsors, please ship your conference materials to:&lt;br /&gt;
&lt;br /&gt;
    Attention:  Amber Mann, OWASP event&lt;br /&gt;
    eBay&lt;br /&gt;
    2211 N. First Street &lt;br /&gt;
    San Jose, CA 95131&lt;br /&gt;
&lt;br /&gt;
All materials must arrive no earlier than Nov 7th.&lt;br /&gt;
&lt;br /&gt;
== Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The following are the sponsors for the OWASP &amp;amp; WASC AppSec 2007 Conference.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com http://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
[http://www.ouncelabs.com/ http://www.owasp.org/images/3/33/Ounce_labs.jpg]&lt;br /&gt;
[http://www.breach.com http://www.owasp.org/images/9/9c/Breach_logo.gif]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Conference_Sponsors&amp;diff=22673</id>
		<title>OWASP AppSec Conference Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Conference_Sponsors&amp;diff=22673"/>
				<updated>2007-10-25T14:51:43Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Sending Materials to Conference Facility in San Jose */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Conference Sponsorship ==&lt;br /&gt;
&lt;br /&gt;
OWASP is '''no longer''' accepting sponsorships for the 2007 OWASP AppSec San Jose Conference. Financial sponsorship will help defray the non-profit OWASP Foundation's expenses to prepare for and hold this conference. For the first time, there are two different sponsorship options for this conference:&lt;br /&gt;
&lt;br /&gt;
Option #1: Standard Sponsorship Plan (same as previous conferences):&lt;br /&gt;
&lt;br /&gt;
* Sponsor information will be presented on the main conference web page&lt;br /&gt;
&lt;br /&gt;
* A Sponsor information sheet will be included in handouts to all attendees&lt;br /&gt;
&lt;br /&gt;
* Sponsors can include a poster (no larger than 6 ft. x 4 ft. [can be oriented either way]) at the conference in the main hallway. This can be freestanding, or be hung from the wall.&lt;br /&gt;
&lt;br /&gt;
* Includes 2 Free admissions to the conference&lt;br /&gt;
&lt;br /&gt;
The sponsorship fee for this option at the 7th OWASP Conference in San Jose, CA in November 2007 is $4000.&lt;br /&gt;
&lt;br /&gt;
Option #2: Technology Expo:&lt;br /&gt;
&lt;br /&gt;
* Product vendors can demonstrate their application security products to conference attendees. The intended focus of this expo is to be prepared to discuss the technical details of the technologies they are offering in the market to help organizations deal with their application security issues. This expo should be light on sales push and very technical. OWASP attendees are very familiar with the application security market! As this is a technology expo, services only vendors are not appropriate for this venue.&lt;br /&gt;
&lt;br /&gt;
* Time frame: The technology expo will be held from 12-2 on November 13th, with lunch included for all the OWASP tutorial attendees who will be invited to attend the expo, and then open again from 11-6 on November 14th during the first day of the OWASP conference.&lt;br /&gt;
&lt;br /&gt;
* Setup: The tech expo room will open at 9AM on Nov. 13th for the vendors so you can get in and set everything up.&lt;br /&gt;
&lt;br /&gt;
Each vendor will receive:&lt;br /&gt;
&lt;br /&gt;
* Tabletop with tablecloth&lt;br /&gt;
* Chairs&lt;br /&gt;
* Power strip&lt;br /&gt;
* Internet connectivity (it may be wireless access so please check)&lt;br /&gt;
&lt;br /&gt;
The sponsorship fee for this option at the 7th OWASP Conference in San Jose, CA in November 2007 is also $4000.&lt;br /&gt;
&lt;br /&gt;
Option #3: Combined Sponsorship:&lt;br /&gt;
&lt;br /&gt;
If you are interested in doing both at the San Jose conference, the sponsorship fee for this combined option is $6000.&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring the 2007 OWASP San Jose conference, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Sponsorship registration to the 2007 OWASP AppSec San Jose Conference is now open! Here is the [http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd registration page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sending Materials to Conference Facility in San Jose ==&lt;br /&gt;
&lt;br /&gt;
Sponsors, please ship your conference materials to:&lt;br /&gt;
&lt;br /&gt;
Attention:  Amber Mann, OWASP event&lt;br /&gt;
eBay&lt;br /&gt;
2211 N. First Street &lt;br /&gt;
San Jose, CA 95131&lt;br /&gt;
&lt;br /&gt;
All materials must arrive no earlier than Nov 7th.&lt;br /&gt;
&lt;br /&gt;
== Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The following are the sponsors for the OWASP &amp;amp; WASC AppSec 2007 Conference.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com http://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
[http://www.ouncelabs.com/ http://www.owasp.org/images/3/33/Ounce_labs.jpg]&lt;br /&gt;
[http://www.breach.com http://www.owasp.org/images/9/9c/Breach_logo.gif]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=22436</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=22436"/>
				<updated>2007-10-17T13:56:43Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Conference Schedule and Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Owasp_wasc.gif|center]]&lt;br /&gt;
==Its now the OWASP &amp;amp; WASC AppSec 2007 Conference !!! @ eBay in San Jose, CA Nov 12-15, 2007==&lt;br /&gt;
&lt;br /&gt;
OWASP and [http://www.webappsec.org WASC] have agreed to join forces this year to put together an incredible AppSec 2007 Conference for the application security community. A huge concentration of industry leading experts will be in attendance presenting high quality web application security content. AppSec 2007 offers a unique opportunity for security professionals, software developers, and IT managers to get up to speed on the latest and greatest attack techniques, defense strategies, and industry trends in an atmosphere of peers. The conference format and venue is also perfect for networking and sharing experiences with others that are down in the trenches.&lt;br /&gt;
&lt;br /&gt;
Registration is now open for the conference. See below for details.&lt;br /&gt;
&lt;br /&gt;
==Conference Schedule and Location==&lt;br /&gt;
&lt;br /&gt;
The AppSec 2007 Conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: November 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007#Technology_Expo:_Tuesday-Wednesday_Nov_13th-14th | Tech Expo: November 13th-14th]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007#Social Events | Breach Cocktail Party: Evening of November 13th]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | Main Conference: November 14th-15th]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007#Social Events | OWASP Conference Dinner: Evening of November 14th]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007#Social Events | Microsoft and Aspect Security Cocktail Party: Evening of November 15th&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
==[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th]]==&lt;br /&gt;
&lt;br /&gt;
The [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | agenda]] will follow the general OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days.&lt;br /&gt;
&lt;br /&gt;
New Web Services Track: In addition, the conference will have a 3rd track on the first day. This track is focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP and WASC contributors and leading Application Security professionals, and will include closing panels each day.&lt;br /&gt;
&lt;br /&gt;
==[[ 7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training: Monday-Tuesday - Nov 12th-13th]]== &lt;br /&gt;
&lt;br /&gt;
We have arranged for a suite of two-day Application Security training courses to be offered prior to the conference. General details about all the tutorials including location and pricing is available [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | here]]. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | T1. Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | T2. Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Secure_Coding_.NET_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | T3. Secure Coding .NET Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | T4. Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T5._Leveraging_OWASP_Tools_and_Documents_to_Secure_Your_Enterprise | T5. Leveraging OWASP Tools and Documents to Secure Your Enterprise ]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T6._Open_Source_ModSecurity_Training_-_2-Day_Course_-_Nov_12-13.2C_2007 | T6. Open Source ModSecurity Training ]]&lt;br /&gt;
&lt;br /&gt;
==Technology Expo: Tuesday-Wednesday Nov 13th-14th==&lt;br /&gt;
&lt;br /&gt;
Leading vendors in the application security space will be at the conference for the first time this year giving technology demonstrations and providing access to their technical staff so they can answer in-depth questions and demonstrate the capabilities of their products or automated managed services.&lt;br /&gt;
&lt;br /&gt;
The technology expo will be open from '''12PM - 2PM on Nov. 13th''' (and all tutorial attendees will be given a large lunch break during that time to attend the expo). It will also be open from '''11AM - 5PM on Nov. 14th''' which is the first day of the conference.&lt;br /&gt;
&lt;br /&gt;
What can a conference attendee expect to get out of the Tech Expo?&lt;br /&gt;
* ''Hands-on time using a vendor's product'' - The goal is to be able to walk up to vendor with a USB stick of code/binaries/etc. and actually get a taste of how the tool(s) performs, technical features, applicability &amp;amp; appropriateness, etc.&lt;br /&gt;
* ''Evaluate in a non-sales environment'' - At the Expo, attendees will be provided information about the types of tools being exhibited and independent evaluation criteria where that exists (e.g. the [http://www.webappsec.org/projects/wafec/ WAFEC] from WASC, information from the [[OWASP_Tools_Project]], etc.). It's an opportunity to ask the hard questions and talk to technical folks from the vendors that can answer them.&lt;br /&gt;
* ''Contact info exchange at your discretion'' - We will not be doing badge scanning and the like to provide vendors attendee information, so attendees are in control of who they want to follow-up with (via good, old-fashioned business card exchange).&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship and participating in the technology expo is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the AppSec 2007 Conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
==[http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd Registration]==&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Here is the [http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd registration page].&lt;br /&gt;
&lt;br /&gt;
==Social Events==&lt;br /&gt;
Breach Cocktail Party: Evening of November 13th&lt;br /&gt;
    @ Fahrenheit Ultra Lounge &amp;amp; Restaurant&lt;br /&gt;
      99 East San Fernando Street&lt;br /&gt;
      San Jose, CA 95113&lt;br /&gt;
      6:30PM - 8:30PM&lt;br /&gt;
      Space is Limited so please RSVP:  More info and how to RSVP available [http://www.breach.com/breach_security_party_owaspwasc_san_jose.html here]. &lt;br /&gt;
&lt;br /&gt;
OWASP Conference Dinner: Evening of November 14th&lt;br /&gt;
    @ Holiday Inn&lt;br /&gt;
      1740 N. First Street&lt;br /&gt;
      San Jose, CA 95112&lt;br /&gt;
      6:30PM - ???PM&lt;br /&gt;
      Register for this event at the conference [https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=17e6e912-2dec-4de6-8946-aa005721c4dd website]. &lt;br /&gt;
Microsoft and Aspect Security Cocktail Party: Evening of November 15th&lt;br /&gt;
    @ Holiday Inn&lt;br /&gt;
      1740 N. First Street&lt;br /&gt;
      San Jose, CA 95112&lt;br /&gt;
      6:30PM - 8:30PM&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Hotel and Transportation Info==&lt;br /&gt;
OWASP has negotiated rates at the following hotels (Please book hotel rooms by October 21st to ensure OWASP rates):&lt;br /&gt;
&lt;br /&gt;
 Holiday Inn-San Jose OWASP Rate $129/night King or Double Room&lt;br /&gt;
 You can call reservations at 1-866-241-9878 and ask for the group &amp;quot;OWASP&amp;quot; or reserve your room [http://www.ichotelsgroup.com/h/d/hi/1/en/advancedsearch?whichtype=room&amp;amp;roomResult=none&amp;amp;hotelCode=sjcfs&amp;amp;quickRes=city&amp;amp;_GPC=OSP&amp;amp;checkInDate=11&amp;amp;checkOutMonthYear=102007&amp;amp;checkInMonthYear=102007&amp;amp;checkOutDate=16&amp;amp;_requestid=184025 online here].&lt;br /&gt;
&lt;br /&gt;
 Homewood Suites by Hilton- San Jose OWASP Rate $149/night (4+ nights) $169/night (3 or less nights)&lt;br /&gt;
 King room w/ sleeper sofa (comes w/ fully equipped kitchen)&lt;br /&gt;
 Call Maria Larios at 408-678-4481 and ask for the group OWASP or email her at maria.larios@dimdev.com&lt;br /&gt;
&lt;br /&gt;
Transportation Info:&lt;br /&gt;
&lt;br /&gt;
From San Jose International Airport (SJC):&lt;br /&gt;
eBay is located about a mile from this airport&lt;br /&gt;
&lt;br /&gt;
From San Francisco International Airport (SFO):&lt;br /&gt;
eBay is located 40 miles from this airport&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
2008 U.S. Planning Committee Chair: Tom Brennan - Access IT Group - jinxpuppy 'at' gmail.com&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be&lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | OWASP &amp;amp; WASC AppSec 2007 Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
[http://www.paypal.com https://www.owasp.org/images/c/c9/Paypal_logo.gif]&lt;br /&gt;
[http://www.ebay.com https://www.owasp.org/images/e/e0/Ebay.gif]&lt;br /&gt;
[http://www.ouncelabs.com/ https://www.owasp.org/images/3/33/Ounce_labs.jpg]&lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif]&lt;br /&gt;
[http://www.whitehatsec.com https://www.owasp.org/images/4/4d/Whitehat.gif]&lt;br /&gt;
[http://www.ioactive.com https://www.owasp.org/images/4/46/IOActive.gif]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=22435</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=22435"/>
				<updated>2007-10-17T13:52:26Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /*  Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Owasp_wasc.gif|center]]&lt;br /&gt;
==Its now the OWASP &amp;amp; WASC AppSec 2007 Conference !!! @ eBay in San Jose, CA Nov 12-15, 2007==&lt;br /&gt;
&lt;br /&gt;
OWASP and [http://www.webappsec.org WASC] have agreed to join forces this year to put together an incredible AppSec 2007 Conference for the application security community. A huge concentration of industry leading experts will be in attendance presenting high quality web application security content. AppSec 2007 offers a unique opportunity for security professionals, software developers, and IT managers to get up to speed on the latest and greatest attack techniques, defense strategies, and industry trends in an atmosphere of peers. The conference format and venue is also perfect for networking and sharing experiences with others that are down in the trenches.&lt;br /&gt;
&lt;br /&gt;
Registration is now open for the conference. See below for details.&lt;br /&gt;
&lt;br /&gt;
==Conference Schedule and Location==&lt;br /&gt;
&lt;br /&gt;
The AppSec 2007 Conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: November 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007#Technology_Expo:_Tuesday-Wednesday_Nov_13th-14th | Tech Expo: November 13th-14th]]&lt;br /&gt;
&lt;br /&gt;
Breach Cocktail Party: Evening of November 13th&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | Main Conference: November 14th-15th]]&lt;br /&gt;
&lt;br /&gt;
OWASP Conference Dinner: Evening of November 14th&lt;br /&gt;
&lt;br /&gt;
Microsoft and Aspect Security Cocktail Party: Evening of November 15th&lt;br /&gt;
&lt;br /&gt;
==[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th]]==&lt;br /&gt;
&lt;br /&gt;
The [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | agenda]] will follow the general OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days.&lt;br /&gt;
&lt;br /&gt;
New Web Services Track: In addition, the conference will have a 3rd track on the first day. This track is focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP and WASC contributors and leading Application Security professionals, and will include closing panels each day.&lt;br /&gt;
&lt;br /&gt;
==[[ 7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training: Monday-Tuesday - Nov 12th-13th]]== &lt;br /&gt;
&lt;br /&gt;
We have arranged for a suite of two-day Application Security training courses to be offered prior to the conference. General details about all the tutorials including location and pricing is available [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | here]]. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | T1. Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | T2. Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Secure_Coding_.NET_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | T3. Secure Coding .NET Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | T4. Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T5._Leveraging_OWASP_Tools_and_Documents_to_Secure_Your_Enterprise | T5. Leveraging OWASP Tools and Documents to Secure Your Enterprise ]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T6._Open_Source_ModSecurity_Training_-_2-Day_Course_-_Nov_12-13.2C_2007 | T6. Open Source ModSecurity Training ]]&lt;br /&gt;
&lt;br /&gt;
==Technology Expo: Tuesday-Wednesday Nov 13th-14th==&lt;br /&gt;
&lt;br /&gt;
Leading vendors in the application security space will be at the conference for the first time this year giving technology demonstrations and providing access to their technical staff so they can answer in-depth questions and demonstrate the capabilities of their products or automated managed services.&lt;br /&gt;
&lt;br /&gt;
The technology expo will be open from '''12PM - 2PM on Nov. 13th''' (and all tutorial attendees will be given a large lunch break during that time to attend the expo). It will also be open from '''11AM - 5PM on Nov. 14th''' which is the first day of the conference.&lt;br /&gt;
&lt;br /&gt;
What can a conference attendee expect to get out of the Tech Expo?&lt;br /&gt;
* ''Hands-on time using a vendor's product'' - The goal is to be able to walk up to vendor with a USB stick of code/binaries/etc. and actually get a taste of how the tool(s) performs, technical features, applicability &amp;amp; appropriateness, etc.&lt;br /&gt;
* ''Evaluate in a non-sales environment'' - At the Expo, attendees will be provided information about the types of tools being exhibited and independent evaluation criteria where that exists (e.g. the [http://www.webappsec.org/projects/wafec/ WAFEC] from WASC, information from the [[OWASP_Tools_Project]], etc.). It's an opportunity to ask the hard questions and talk to technical folks from the vendors that can answer them.&lt;br /&gt;
* ''Contact info exchange at your discretion'' - We will not be doing badge scanning and the like to provide vendors attendee information, so attendees are in control of who they want to follow-up with (via good, old-fashioned business card exchange).&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship and participating in the technology expo is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the AppSec 2007 Conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
==[http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd Registration]==&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Here is the [http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd registration page].&lt;br /&gt;
&lt;br /&gt;
==Social Events==&lt;br /&gt;
Breach Cocktail Party: Evening of November 13th&lt;br /&gt;
    @ Fahrenheit Ultra Lounge &amp;amp; Restaurant&lt;br /&gt;
      99 East San Fernando Street&lt;br /&gt;
      San Jose, CA 95113&lt;br /&gt;
      6:30PM - 8:30PM&lt;br /&gt;
      Space is Limited so please RSVP:  More info and how to RSVP available [http://www.breach.com/breach_security_party_owaspwasc_san_jose.html here]. &lt;br /&gt;
&lt;br /&gt;
OWASP Conference Dinner: Evening of November 14th&lt;br /&gt;
    @ Holiday Inn&lt;br /&gt;
      1740 N. First Street&lt;br /&gt;
      San Jose, CA 95112&lt;br /&gt;
      6:30PM - ???PM&lt;br /&gt;
      Register for this event at the conference [https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=17e6e912-2dec-4de6-8946-aa005721c4dd website]. &lt;br /&gt;
Microsoft and Aspect Security Cocktail Party: Evening of November 15th&lt;br /&gt;
    @ Holiday Inn&lt;br /&gt;
      1740 N. First Street&lt;br /&gt;
      San Jose, CA 95112&lt;br /&gt;
      6:30PM - 8:30PM&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Hotel and Transportation Info==&lt;br /&gt;
OWASP has negotiated rates at the following hotels (Please book hotel rooms by October 21st to ensure OWASP rates):&lt;br /&gt;
&lt;br /&gt;
 Holiday Inn-San Jose OWASP Rate $129/night King or Double Room&lt;br /&gt;
 You can call reservations at 1-866-241-9878 and ask for the group &amp;quot;OWASP&amp;quot; or reserve your room [http://www.ichotelsgroup.com/h/d/hi/1/en/advancedsearch?whichtype=room&amp;amp;roomResult=none&amp;amp;hotelCode=sjcfs&amp;amp;quickRes=city&amp;amp;_GPC=OSP&amp;amp;checkInDate=11&amp;amp;checkOutMonthYear=102007&amp;amp;checkInMonthYear=102007&amp;amp;checkOutDate=16&amp;amp;_requestid=184025 online here].&lt;br /&gt;
&lt;br /&gt;
 Homewood Suites by Hilton- San Jose OWASP Rate $149/night (4+ nights) $169/night (3 or less nights)&lt;br /&gt;
 King room w/ sleeper sofa (comes w/ fully equipped kitchen)&lt;br /&gt;
 Call Maria Larios at 408-678-4481 and ask for the group OWASP or email her at maria.larios@dimdev.com&lt;br /&gt;
&lt;br /&gt;
Transportation Info:&lt;br /&gt;
&lt;br /&gt;
From San Jose International Airport (SJC):&lt;br /&gt;
eBay is located about a mile from this airport&lt;br /&gt;
&lt;br /&gt;
From San Francisco International Airport (SFO):&lt;br /&gt;
eBay is located 40 miles from this airport&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
2008 U.S. Planning Committee Chair: Tom Brennan - Access IT Group - jinxpuppy 'at' gmail.com&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be&lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | OWASP &amp;amp; WASC AppSec 2007 Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
[http://www.paypal.com https://www.owasp.org/images/c/c9/Paypal_logo.gif]&lt;br /&gt;
[http://www.ebay.com https://www.owasp.org/images/e/e0/Ebay.gif]&lt;br /&gt;
[http://www.ouncelabs.com/ https://www.owasp.org/images/3/33/Ounce_labs.jpg]&lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif]&lt;br /&gt;
[http://www.whitehatsec.com https://www.owasp.org/images/4/4d/Whitehat.gif]&lt;br /&gt;
[http://www.ioactive.com https://www.owasp.org/images/4/46/IOActive.gif]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=22434</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=22434"/>
				<updated>2007-10-17T13:51:41Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Social Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Owasp_wasc.gif|center]]&lt;br /&gt;
==Its now the OWASP &amp;amp; WASC AppSec 2007 Conference !!! @ eBay in San Jose, CA Nov 12-15, 2007==&lt;br /&gt;
&lt;br /&gt;
OWASP and [http://www.webappsec.org WASC] have agreed to join forces this year to put together an incredible AppSec 2007 Conference for the application security community. A huge concentration of industry leading experts will be in attendance presenting high quality web application security content. AppSec 2007 offers a unique opportunity for security professionals, software developers, and IT managers to get up to speed on the latest and greatest attack techniques, defense strategies, and industry trends in an atmosphere of peers. The conference format and venue is also perfect for networking and sharing experiences with others that are down in the trenches.&lt;br /&gt;
&lt;br /&gt;
Registration is now open for the conference. See below for details.&lt;br /&gt;
&lt;br /&gt;
==Conference Schedule and Location==&lt;br /&gt;
&lt;br /&gt;
The AppSec 2007 Conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: November 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007#Technology_Expo:_Tuesday-Wednesday_Nov_13th-14th | Tech Expo: November 13th-14th]]&lt;br /&gt;
&lt;br /&gt;
Breach Cocktail Party: Evening of November 13th&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | Main Conference: November 14th-15th]]&lt;br /&gt;
&lt;br /&gt;
OWASP Conference Dinner: Evening of November 14th&lt;br /&gt;
&lt;br /&gt;
Microsoft and Aspect Security Cocktail Party: Evening of November 15th&lt;br /&gt;
&lt;br /&gt;
==[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th]]==&lt;br /&gt;
&lt;br /&gt;
The [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | agenda]] will follow the general OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days.&lt;br /&gt;
&lt;br /&gt;
New Web Services Track: In addition, the conference will have a 3rd track on the first day. This track is focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP and WASC contributors and leading Application Security professionals, and will include closing panels each day.&lt;br /&gt;
&lt;br /&gt;
==[[ 7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training: Monday-Tuesday - Nov 12th-13th]]== &lt;br /&gt;
&lt;br /&gt;
We have arranged for a suite of two-day Application Security training courses to be offered prior to the conference. General details about all the tutorials including location and pricing is available [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | here]]. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | T1. Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | T2. Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Secure_Coding_.NET_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | T3. Secure Coding .NET Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | T4. Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T5._Leveraging_OWASP_Tools_and_Documents_to_Secure_Your_Enterprise | T5. Leveraging OWASP Tools and Documents to Secure Your Enterprise ]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T6._Open_Source_ModSecurity_Training_-_2-Day_Course_-_Nov_12-13.2C_2007 | T6. Open Source ModSecurity Training ]]&lt;br /&gt;
&lt;br /&gt;
==Technology Expo: Tuesday-Wednesday Nov 13th-14th==&lt;br /&gt;
&lt;br /&gt;
Leading vendors in the application security space will be at the conference for the first time this year giving technology demonstrations and providing access to their technical staff so they can answer in-depth questions and demonstrate the capabilities of their products or automated managed services.&lt;br /&gt;
&lt;br /&gt;
The technology expo will be open from '''12PM - 2PM on Nov. 13th''' (and all tutorial attendees will be given a large lunch break during that time to attend the expo). It will also be open from '''11AM - 5PM on Nov. 14th''' which is the first day of the conference.&lt;br /&gt;
&lt;br /&gt;
What can a conference attendee expect to get out of the Tech Expo?&lt;br /&gt;
* ''Hands-on time using a vendor's product'' - The goal is to be able to walk up to vendor with a USB stick of code/binaries/etc. and actually get a taste of how the tool(s) performs, technical features, applicability &amp;amp; appropriateness, etc.&lt;br /&gt;
* ''Evaluate in a non-sales environment'' - At the Expo, attendees will be provided information about the types of tools being exhibited and independent evaluation criteria where that exists (e.g. the [http://www.webappsec.org/projects/wafec/ WAFEC] from WASC, information from the [[OWASP_Tools_Project]], etc.). It's an opportunity to ask the hard questions and talk to technical folks from the vendors that can answer them.&lt;br /&gt;
* ''Contact info exchange at your discretion'' - We will not be doing badge scanning and the like to provide vendors attendee information, so attendees are in control of who they want to follow-up with (via good, old-fashioned business card exchange).&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship and participating in the technology expo is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the AppSec 2007 Conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
==[http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd Registration]==&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Here is the [http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd registration page].&lt;br /&gt;
&lt;br /&gt;
==Social Events==&lt;br /&gt;
Breach Cocktail Party: Evening of November 13th&lt;br /&gt;
    @ Fahrenheit Ultra Lounge &amp;amp; Restaurant&lt;br /&gt;
      99 East San Fernando Street&lt;br /&gt;
      San Jose, CA 95113&lt;br /&gt;
      6:30PM - 8:30PM&lt;br /&gt;
      Space is Limited so please RSVP:  More info and how to RSVP available [http://www.breach.com/breach_security_party_owaspwasc_san_jose.html here]. &lt;br /&gt;
&lt;br /&gt;
OWASP Conference Dinner: Evening of November 14th&lt;br /&gt;
    @ Holiday Inn&lt;br /&gt;
      1740 N. First Street&lt;br /&gt;
      San Jose, CA 95112&lt;br /&gt;
      6:30PM - ???PM&lt;br /&gt;
      Register for this event at the conference [https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=17e6e912-2dec-4de6-8946-aa005721c4dd website]. &lt;br /&gt;
Microsoft and Aspect Security Cocktail Party: Evening of November 15th&lt;br /&gt;
    @ Holiday Inn&lt;br /&gt;
      1740 N. First Street&lt;br /&gt;
      San Jose, CA 95112&lt;br /&gt;
      6:30PM - 8:30PM&lt;br /&gt;
&lt;br /&gt;
==[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th]]==&lt;br /&gt;
&lt;br /&gt;
==Hotel and Transportation Info==&lt;br /&gt;
OWASP has negotiated rates at the following hotels (Please book hotel rooms by October 21st to ensure OWASP rates):&lt;br /&gt;
&lt;br /&gt;
 Holiday Inn-San Jose OWASP Rate $129/night King or Double Room&lt;br /&gt;
 You can call reservations at 1-866-241-9878 and ask for the group &amp;quot;OWASP&amp;quot; or reserve your room [http://www.ichotelsgroup.com/h/d/hi/1/en/advancedsearch?whichtype=room&amp;amp;roomResult=none&amp;amp;hotelCode=sjcfs&amp;amp;quickRes=city&amp;amp;_GPC=OSP&amp;amp;checkInDate=11&amp;amp;checkOutMonthYear=102007&amp;amp;checkInMonthYear=102007&amp;amp;checkOutDate=16&amp;amp;_requestid=184025 online here].&lt;br /&gt;
&lt;br /&gt;
 Homewood Suites by Hilton- San Jose OWASP Rate $149/night (4+ nights) $169/night (3 or less nights)&lt;br /&gt;
 King room w/ sleeper sofa (comes w/ fully equipped kitchen)&lt;br /&gt;
 Call Maria Larios at 408-678-4481 and ask for the group OWASP or email her at maria.larios@dimdev.com&lt;br /&gt;
&lt;br /&gt;
Transportation Info:&lt;br /&gt;
&lt;br /&gt;
From San Jose International Airport (SJC):&lt;br /&gt;
eBay is located about a mile from this airport&lt;br /&gt;
&lt;br /&gt;
From San Francisco International Airport (SFO):&lt;br /&gt;
eBay is located 40 miles from this airport&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
2008 U.S. Planning Committee Chair: Tom Brennan - Access IT Group - jinxpuppy 'at' gmail.com&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be&lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | OWASP &amp;amp; WASC AppSec 2007 Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
[http://www.paypal.com https://www.owasp.org/images/c/c9/Paypal_logo.gif]&lt;br /&gt;
[http://www.ebay.com https://www.owasp.org/images/e/e0/Ebay.gif]&lt;br /&gt;
[http://www.ouncelabs.com/ https://www.owasp.org/images/3/33/Ounce_labs.jpg]&lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif]&lt;br /&gt;
[http://www.whitehatsec.com https://www.owasp.org/images/4/4d/Whitehat.gif]&lt;br /&gt;
[http://www.ioactive.com https://www.owasp.org/images/4/46/IOActive.gif]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=22433</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=22433"/>
				<updated>2007-10-17T13:34:24Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Owasp_wasc.gif|center]]&lt;br /&gt;
==Its now the OWASP &amp;amp; WASC AppSec 2007 Conference !!! @ eBay in San Jose, CA Nov 12-15, 2007==&lt;br /&gt;
&lt;br /&gt;
OWASP and [http://www.webappsec.org WASC] have agreed to join forces this year to put together an incredible AppSec 2007 Conference for the application security community. A huge concentration of industry leading experts will be in attendance presenting high quality web application security content. AppSec 2007 offers a unique opportunity for security professionals, software developers, and IT managers to get up to speed on the latest and greatest attack techniques, defense strategies, and industry trends in an atmosphere of peers. The conference format and venue is also perfect for networking and sharing experiences with others that are down in the trenches.&lt;br /&gt;
&lt;br /&gt;
Registration is now open for the conference. See below for details.&lt;br /&gt;
&lt;br /&gt;
==Conference Schedule and Location==&lt;br /&gt;
&lt;br /&gt;
The AppSec 2007 Conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: November 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007#Technology_Expo:_Tuesday-Wednesday_Nov_13th-14th | Tech Expo: November 13th-14th]]&lt;br /&gt;
&lt;br /&gt;
Breach Cocktail Party: Evening of November 13th&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | Main Conference: November 14th-15th]]&lt;br /&gt;
&lt;br /&gt;
OWASP Conference Dinner: Evening of November 14th&lt;br /&gt;
&lt;br /&gt;
Microsoft and Aspect Security Cocktail Party: Evening of November 15th&lt;br /&gt;
&lt;br /&gt;
==[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th]]==&lt;br /&gt;
&lt;br /&gt;
The [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | agenda]] will follow the general OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days.&lt;br /&gt;
&lt;br /&gt;
New Web Services Track: In addition, the conference will have a 3rd track on the first day. This track is focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP and WASC contributors and leading Application Security professionals, and will include closing panels each day.&lt;br /&gt;
&lt;br /&gt;
==[[ 7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training: Monday-Tuesday - Nov 12th-13th]]== &lt;br /&gt;
&lt;br /&gt;
We have arranged for a suite of two-day Application Security training courses to be offered prior to the conference. General details about all the tutorials including location and pricing is available [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | here]]. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | T1. Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | T2. Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Secure_Coding_.NET_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | T3. Secure Coding .NET Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | T4. Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T5._Leveraging_OWASP_Tools_and_Documents_to_Secure_Your_Enterprise | T5. Leveraging OWASP Tools and Documents to Secure Your Enterprise ]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T6._Open_Source_ModSecurity_Training_-_2-Day_Course_-_Nov_12-13.2C_2007 | T6. Open Source ModSecurity Training ]]&lt;br /&gt;
&lt;br /&gt;
==Technology Expo: Tuesday-Wednesday Nov 13th-14th==&lt;br /&gt;
&lt;br /&gt;
Leading vendors in the application security space will be at the conference for the first time this year giving technology demonstrations and providing access to their technical staff so they can answer in-depth questions and demonstrate the capabilities of their products or automated managed services.&lt;br /&gt;
&lt;br /&gt;
The technology expo will be open from '''12PM - 2PM on Nov. 13th''' (and all tutorial attendees will be given a large lunch break during that time to attend the expo). It will also be open from '''11AM - 5PM on Nov. 14th''' which is the first day of the conference.&lt;br /&gt;
&lt;br /&gt;
What can a conference attendee expect to get out of the Tech Expo?&lt;br /&gt;
* ''Hands-on time using a vendor's product'' - The goal is to be able to walk up to vendor with a USB stick of code/binaries/etc. and actually get a taste of how the tool(s) performs, technical features, applicability &amp;amp; appropriateness, etc.&lt;br /&gt;
* ''Evaluate in a non-sales environment'' - At the Expo, attendees will be provided information about the types of tools being exhibited and independent evaluation criteria where that exists (e.g. the [http://www.webappsec.org/projects/wafec/ WAFEC] from WASC, information from the [[OWASP_Tools_Project]], etc.). It's an opportunity to ask the hard questions and talk to technical folks from the vendors that can answer them.&lt;br /&gt;
* ''Contact info exchange at your discretion'' - We will not be doing badge scanning and the like to provide vendors attendee information, so attendees are in control of who they want to follow-up with (via good, old-fashioned business card exchange).&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship and participating in the technology expo is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the AppSec 2007 Conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
==[http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd Registration]==&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Here is the [http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd registration page].&lt;br /&gt;
&lt;br /&gt;
==Social Events==&lt;br /&gt;
Breach Cocktail Party: Evening of November 13th&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | Main Conference: November 14th-15th]]&lt;br /&gt;
&lt;br /&gt;
OWASP Conference Dinner: Evening of November 14th&lt;br /&gt;
&lt;br /&gt;
Microsoft and Aspect Security Cocktail Party: Evening of November 15th&lt;br /&gt;
&lt;br /&gt;
==[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda | Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th]]==&lt;br /&gt;
&lt;br /&gt;
==Hotel and Transportation Info==&lt;br /&gt;
OWASP has negotiated rates at the following hotels (Please book hotel rooms by October 21st to ensure OWASP rates):&lt;br /&gt;
&lt;br /&gt;
 Holiday Inn-San Jose OWASP Rate $129/night King or Double Room&lt;br /&gt;
 You can call reservations at 1-866-241-9878 and ask for the group &amp;quot;OWASP&amp;quot; or reserve your room [http://www.ichotelsgroup.com/h/d/hi/1/en/advancedsearch?whichtype=room&amp;amp;roomResult=none&amp;amp;hotelCode=sjcfs&amp;amp;quickRes=city&amp;amp;_GPC=OSP&amp;amp;checkInDate=11&amp;amp;checkOutMonthYear=102007&amp;amp;checkInMonthYear=102007&amp;amp;checkOutDate=16&amp;amp;_requestid=184025 online here].&lt;br /&gt;
&lt;br /&gt;
 Homewood Suites by Hilton- San Jose OWASP Rate $149/night (4+ nights) $169/night (3 or less nights)&lt;br /&gt;
 King room w/ sleeper sofa (comes w/ fully equipped kitchen)&lt;br /&gt;
 Call Maria Larios at 408-678-4481 and ask for the group OWASP or email her at maria.larios@dimdev.com&lt;br /&gt;
&lt;br /&gt;
Transportation Info:&lt;br /&gt;
&lt;br /&gt;
From San Jose International Airport (SJC):&lt;br /&gt;
eBay is located about a mile from this airport&lt;br /&gt;
&lt;br /&gt;
From San Francisco International Airport (SFO):&lt;br /&gt;
eBay is located 40 miles from this airport&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
2008 U.S. Planning Committee Chair: Tom Brennan - Access IT Group - jinxpuppy 'at' gmail.com&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be&lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | OWASP &amp;amp; WASC AppSec 2007 Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
[http://www.paypal.com https://www.owasp.org/images/c/c9/Paypal_logo.gif]&lt;br /&gt;
[http://www.ebay.com https://www.owasp.org/images/e/e0/Ebay.gif]&lt;br /&gt;
[http://www.ouncelabs.com/ https://www.owasp.org/images/3/33/Ounce_labs.jpg]&lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif]&lt;br /&gt;
[http://www.whitehatsec.com https://www.owasp.org/images/4/4d/Whitehat.gif]&lt;br /&gt;
[http://www.ioactive.com https://www.owasp.org/images/4/46/IOActive.gif]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Australia_AppSec_2008_Conference&amp;diff=22431</id>
		<title>OWASP Australia AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Australia_AppSec_2008_Conference&amp;diff=22431"/>
				<updated>2007-10-17T11:21:05Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Conference Fees */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference https://www.owasp.org/images/4/4b/Owasp_ausconf_banner.jpg]&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP Australia Application Security Conference for 2008. Following on from the great success of OWASP Conferences in 2006 and 2007 in the United States and Europe, the first ever Asia Pacific &amp;amp; Australia Security conference will take place in February 2008. The conference will offer an opportunity for security professionals, developers, Managers to hear from industry recognised speakers on the latest critical security risks associated with application security. The conference includes a number of high quality presentations from industry speakers and business professionals with also the opportunity to network with relevant application security vendors and professionals.&lt;br /&gt;
&lt;br /&gt;
==Conference Details==&lt;br /&gt;
&lt;br /&gt;
'''Conference Training Day''' (Wednesday 27th February 2008).&lt;br /&gt;
&lt;br /&gt;
'''Main Conference Presentations''' (Thursday 28th and Friday 29th February 2008).&lt;br /&gt;
&lt;br /&gt;
The 2008 Conference will be held at the Gold Coast Convention Center in Queensland Australia.&lt;br /&gt;
&lt;br /&gt;
The Conference includes a Vendor Exhibition, Welcome Cocktail Party and Gala Dinner.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Latest News==&lt;br /&gt;
&lt;br /&gt;
We are currently in the final planing stages of the conference. We invite anyone to submit any recommendations, or ideas for the conference.&lt;br /&gt;
&lt;br /&gt;
The Call for papers has begun, and we would appreciate anyone submiting ideas and presentations email to  jderry 'at' owasp.org. The call for papers will expire on the 30th November 2007. We hope to put together a fantastic line up of OWASP Project speakers and industry experts. &lt;br /&gt;
&lt;br /&gt;
We are encouraging anyone to get involved in the project, so please simply contact the conference committee to get involved. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP_Australia_AppSec_2008_Conference/TrainingAgenda | OWASP Conference Training: Wednesday 27th February 2008]]==&lt;br /&gt;
&lt;br /&gt;
The Training to be offered for the Conference is still currently being decided upon. Any questions please contact the conference Committee.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP_Australia_AppSec_2008_Conference/Agenda | Agenda and Presentations: Thursday 28th and Friday 29th February 2008]]==&lt;br /&gt;
&lt;br /&gt;
Call for papers and presenters is currently open for the conference. &lt;br /&gt;
&lt;br /&gt;
Call for papers will continue until the end of November 2007.&lt;br /&gt;
&lt;br /&gt;
The conference committee only require an initial 3 paragraph summary of your proposed presentation for submissions. Please submit these to the conference committee. The conference will have both a technical and business application security track.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Technology Expo==&lt;br /&gt;
&lt;br /&gt;
Leading vendors in the application security space will be at the conference giving technology demonstrations and providing access to their technical staff so they can answer in-depth questions and demonstrate the capabilities of their products or managed services.&lt;br /&gt;
&lt;br /&gt;
The technology expo will be open during the conference in the meeting area. All attendees will be available to meet and discuss with any of the vendors during moring, lunch and afternoon breaks.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship and participating in the technology expo is available by contacting the conference Committee.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $475, OWASP Members: $425, AISA Members: $450, Early Registration Discount (by Dec 31): $50 &lt;br /&gt;
&lt;br /&gt;
Conference Fees are inclusive of all presentations and agenda (including the Cocktail Reception and Gala Dinner)&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (One Day Training): $650 ($750 if attending tutorial only) Early Registration Discount (by Dec 31): $50 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the AppSec 2008 Conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary. &lt;br /&gt;
(Please note that all fees are in USD)(Conference Fees are kept to a minimum and follow the US/UK Conference Pricing)&lt;br /&gt;
&lt;br /&gt;
== OWASP Australian Security Conference 2008 Sponsors==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2008 OWASP conferences, please contact the conference Committee.&lt;br /&gt;
&lt;br /&gt;
Current OWASP Australia Application Security 2008 Conference Sponsors are&lt;br /&gt;
&lt;br /&gt;
[http://www.b-sec.com http://www.owasp.org/images/3/33/Bsec.JPG]&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Australian Conferences Chair: Justin Derry - b-sec Consulting - jderry 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Currently assisted by (and with thanks)&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Australia_AppSec_2008_Conference&amp;diff=22430</id>
		<title>OWASP Australia AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Australia_AppSec_2008_Conference&amp;diff=22430"/>
				<updated>2007-10-17T11:19:56Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Conference Fees */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference https://www.owasp.org/images/4/4b/Owasp_ausconf_banner.jpg]&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP Australia Application Security Conference for 2008. Following on from the great success of OWASP Conferences in 2006 and 2007 in the United States and Europe, the first ever Asia Pacific &amp;amp; Australia Security conference will take place in February 2008. The conference will offer an opportunity for security professionals, developers, Managers to hear from industry recognised speakers on the latest critical security risks associated with application security. The conference includes a number of high quality presentations from industry speakers and business professionals with also the opportunity to network with relevant application security vendors and professionals.&lt;br /&gt;
&lt;br /&gt;
==Conference Details==&lt;br /&gt;
&lt;br /&gt;
'''Conference Training Day''' (Wednesday 27th February 2008).&lt;br /&gt;
&lt;br /&gt;
'''Main Conference Presentations''' (Thursday 28th and Friday 29th February 2008).&lt;br /&gt;
&lt;br /&gt;
The 2008 Conference will be held at the Gold Coast Convention Center in Queensland Australia.&lt;br /&gt;
&lt;br /&gt;
The Conference includes a Vendor Exhibition, Welcome Cocktail Party and Gala Dinner.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Latest News==&lt;br /&gt;
&lt;br /&gt;
We are currently in the final planing stages of the conference. We invite anyone to submit any recommendations, or ideas for the conference.&lt;br /&gt;
&lt;br /&gt;
The Call for papers has begun, and we would appreciate anyone submiting ideas and presentations email to  jderry 'at' owasp.org. The call for papers will expire on the 30th November 2007. We hope to put together a fantastic line up of OWASP Project speakers and industry experts. &lt;br /&gt;
&lt;br /&gt;
We are encouraging anyone to get involved in the project, so please simply contact the conference committee to get involved. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP_Australia_AppSec_2008_Conference/TrainingAgenda | OWASP Conference Training: Wednesday 27th February 2008]]==&lt;br /&gt;
&lt;br /&gt;
The Training to be offered for the Conference is still currently being decided upon. Any questions please contact the conference Committee.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP_Australia_AppSec_2008_Conference/Agenda | Agenda and Presentations: Thursday 28th and Friday 29th February 2008]]==&lt;br /&gt;
&lt;br /&gt;
Call for papers and presenters is currently open for the conference. &lt;br /&gt;
&lt;br /&gt;
Call for papers will continue until the end of November 2007.&lt;br /&gt;
&lt;br /&gt;
The conference committee only require an initial 3 paragraph summary of your proposed presentation for submissions. Please submit these to the conference committee. The conference will have both a technical and business application security track.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Technology Expo==&lt;br /&gt;
&lt;br /&gt;
Leading vendors in the application security space will be at the conference giving technology demonstrations and providing access to their technical staff so they can answer in-depth questions and demonstrate the capabilities of their products or managed services.&lt;br /&gt;
&lt;br /&gt;
The technology expo will be open during the conference in the meeting area. All attendees will be available to meet and discuss with any of the vendors during moring, lunch and afternoon breaks.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship and participating in the technology expo is available by contacting the conference Committee.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $475, OWASP Members: $425, AISA Members: $450, Early Registration Discount (by Dec 31): $50 &lt;br /&gt;
&lt;br /&gt;
Conference Fees are inclusive of all presentations and agenda (including the Cocktail Receiption and Gala Dinner)&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (One Day Training): $650 ($750 if attending tutorial only) Early Registration Discount (by Dec 31): $50 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the AppSec 2008 Conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary. &lt;br /&gt;
(Please note that all fees are in USD)(Conference Fees are kept to a minimum and follow the US/UK Conference Pricing)&lt;br /&gt;
&lt;br /&gt;
== OWASP Australian Security Conference 2008 Sponsors==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2008 OWASP conferences, please contact the conference Committee.&lt;br /&gt;
&lt;br /&gt;
Current OWASP Australia Application Security 2008 Conference Sponsors are&lt;br /&gt;
&lt;br /&gt;
[http://www.b-sec.com http://www.owasp.org/images/3/33/Bsec.JPG]&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Australian Conferences Chair: Justin Derry - b-sec Consulting - jderry 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Currently assisted by (and with thanks)&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Australia_AppSec_2008_Conference&amp;diff=22429</id>
		<title>OWASP Australia AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Australia_AppSec_2008_Conference&amp;diff=22429"/>
				<updated>2007-10-17T11:18:00Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Conference Fees */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.owasp.org/index.php/OWASP_Australia_AppSec_2008_Conference https://www.owasp.org/images/4/4b/Owasp_ausconf_banner.jpg]&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP Australia Application Security Conference for 2008. Following on from the great success of OWASP Conferences in 2006 and 2007 in the United States and Europe, the first ever Asia Pacific &amp;amp; Australia Security conference will take place in February 2008. The conference will offer an opportunity for security professionals, developers, Managers to hear from industry recognised speakers on the latest critical security risks associated with application security. The conference includes a number of high quality presentations from industry speakers and business professionals with also the opportunity to network with relevant application security vendors and professionals.&lt;br /&gt;
&lt;br /&gt;
==Conference Details==&lt;br /&gt;
&lt;br /&gt;
'''Conference Training Day''' (Wednesday 27th February 2008).&lt;br /&gt;
&lt;br /&gt;
'''Main Conference Presentations''' (Thursday 28th and Friday 29th February 2008).&lt;br /&gt;
&lt;br /&gt;
The 2008 Conference will be held at the Gold Coast Convention Center in Queensland Australia.&lt;br /&gt;
&lt;br /&gt;
The Conference includes a Vendor Exhibition, Welcome Cocktail Party and Gala Dinner.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Latest News==&lt;br /&gt;
&lt;br /&gt;
We are currently in the final planing stages of the conference. We invite anyone to submit any recommendations, or ideas for the conference.&lt;br /&gt;
&lt;br /&gt;
The Call for papers has begun, and we would appreciate anyone submiting ideas and presentations email to  jderry 'at' owasp.org. The call for papers will expire on the 30th November 2007. We hope to put together a fantastic line up of OWASP Project speakers and industry experts. &lt;br /&gt;
&lt;br /&gt;
We are encouraging anyone to get involved in the project, so please simply contact the conference committee to get involved. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP_Australia_AppSec_2008_Conference/TrainingAgenda | OWASP Conference Training: Wednesday 27th February 2008]]==&lt;br /&gt;
&lt;br /&gt;
The Training to be offered for the Conference is still currently being decided upon. Any questions please contact the conference Committee.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP_Australia_AppSec_2008_Conference/Agenda | Agenda and Presentations: Thursday 28th and Friday 29th February 2008]]==&lt;br /&gt;
&lt;br /&gt;
Call for papers and presenters is currently open for the conference. &lt;br /&gt;
&lt;br /&gt;
Call for papers will continue until the end of November 2007.&lt;br /&gt;
&lt;br /&gt;
The conference committee only require an initial 3 paragraph summary of your proposed presentation for submissions. Please submit these to the conference committee. The conference will have both a technical and business application security track.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Technology Expo==&lt;br /&gt;
&lt;br /&gt;
Leading vendors in the application security space will be at the conference giving technology demonstrations and providing access to their technical staff so they can answer in-depth questions and demonstrate the capabilities of their products or managed services.&lt;br /&gt;
&lt;br /&gt;
The technology expo will be open during the conference in the meeting area. All attendees will be available to meet and discuss with any of the vendors during moring, lunch and afternoon breaks.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship and participating in the technology expo is available by contacting the conference Committee.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $475, OWASP Members: $425, AISA Members: $450, Early Registration Discount (by Dec 31): $50 (Please note that all fees are in USD)&lt;br /&gt;
&lt;br /&gt;
Conference Fees are inclusive of all presentations and agenda (including the Cocktail Receiption and Gala Dinner)&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (One Day Training): $650 ($750 if attending tutorial only) Early Registration Discount (by Dec 31): $50 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the AppSec 2008 Conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary. &lt;br /&gt;
(Conference Fees are kept to a minimum and follow the US/UK Conference Pricing)&lt;br /&gt;
&lt;br /&gt;
== OWASP Australian Security Conference 2008 Sponsors==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2008 OWASP conferences, please contact the conference Committee.&lt;br /&gt;
&lt;br /&gt;
Current OWASP Australia Application Security 2008 Conference Sponsors are&lt;br /&gt;
&lt;br /&gt;
[http://www.b-sec.com http://www.owasp.org/images/3/33/Bsec.JPG]&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Australian Conferences Chair: Justin Derry - b-sec Consulting - jderry 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Currently assisted by (and with thanks)&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21965</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21965"/>
				<updated>2007-09-25T17:59:18Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Hotel and Transportation Info */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Owasp_wasc.gif|center]]&lt;br /&gt;
==Its now the OWASP &amp;amp; WASC AppSec 2007 Conference !!! @ eBay in San Jose, CA Nov 12-15, 2007==&lt;br /&gt;
&lt;br /&gt;
OWASP and [http://www.webappsec.org WASC] have agreed to join forces this year to put together an incredible AppSec 2007 Conference for the application security community. A huge concentration of industry leading experts will be in attendance presenting high quality web application security content. AppSec 2007 offers a unique opportunity for security professionals, software developers, and IT managers to get up to speed on the latest and greatest attack techniques, defense strategies, and industry trends in an atmosphere of peers. The conference format and venue is also perfect for networking and sharing experiences with others that are down in the trenches.&lt;br /&gt;
&lt;br /&gt;
Registration is now open for the conference. See below for details.&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
&lt;br /&gt;
The AppSec 2007 Conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: November 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
Main Conference: November 14th-15th&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda agenda] will follow the (current) standard OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days.&lt;br /&gt;
&lt;br /&gt;
New Web Services Track: In addition, the conference will have a 3rd track on the first day. This track is focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP and WASC contributors and leading Application Security professionals, and will include one panel each day.&lt;br /&gt;
&lt;br /&gt;
The OWASP &amp;amp; WASC AppSec 2007 agenda is still being developed.&lt;br /&gt;
&lt;br /&gt;
==Training: Monday-Tuesday - Nov 12th-13th== &lt;br /&gt;
&lt;br /&gt;
We have arranged for a suite of two day Application Security training courses to be offered prior to the conference. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
==Technology Expo: Tuesday-Wednesday Nov 13th-14th==&lt;br /&gt;
&lt;br /&gt;
Leading vendors in the application security space will be at the conference for the first time this year giving technology demonstrations and providing access to their technical staff so they can answer in-depth questions and demonstrate the capabilities of their products or managed services.&lt;br /&gt;
&lt;br /&gt;
The technology expo will be open from 12PM - 2PM on Nov. 13th (and all tutorial attendees will be given a large lunch break during that time to attend the expo). It will also be open from 11AM until 5PM on Nov. 14th which is the first day of the conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship and participating in the technology expo is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the AppSec 2007 Conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
==[http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd Registration]==&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Here is the [http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd registration page].&lt;br /&gt;
&lt;br /&gt;
==Hotel and Transportation Info==&lt;br /&gt;
OWASP has negotiated rates at the following hotels (Please book hotel rooms by October 21st to ensure OWASP rates):&lt;br /&gt;
&lt;br /&gt;
 Holiday Inn-San Jose OWASP Rate $129/night King or Double Room&lt;br /&gt;
 You can call reservations at 1-866-241-9878 and ask for the group &amp;quot;OWASP&amp;quot; or reserve your room [http://www.ichotelsgroup.com/h/d/hi/1/en/advancedsearch?whichtype=room&amp;amp;roomResult=none&amp;amp;hotelCode=sjcfs&amp;amp;quickRes=city&amp;amp;_GPC=OSP&amp;amp;checkInDate=11&amp;amp;checkOutMonthYear=102007&amp;amp;checkInMonthYear=102007&amp;amp;checkOutDate=16&amp;amp;_requestid=184025 online here].&lt;br /&gt;
&lt;br /&gt;
 Homewood Suites by Hilton- San Jose OWASP Rate $149/night (4+ nights) $169/night (3 or less nights)&lt;br /&gt;
 King room w/ sleeper sofa (comes w/ fully equipped kitchen)&lt;br /&gt;
 Call Maria Larios at 408-678-4481 and ask for the group OWASP or email her at maria.larios@dimdev.com&lt;br /&gt;
&lt;br /&gt;
Transportation Info:&lt;br /&gt;
&lt;br /&gt;
From San Jose International Airport (SJC):&lt;br /&gt;
eBay is located about a mile from this airport&lt;br /&gt;
&lt;br /&gt;
From San Francisco International Airport (SFO):&lt;br /&gt;
eBay is located 40 miles from this airport&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be &lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | OWASP &amp;amp; WASC AppSec 2007 Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
[http://www.ouncelabs.com/ https://www.owasp.org/images/3/33/Ounce_labs.jpg]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21591</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21591"/>
				<updated>2007-09-07T21:58:59Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Hotel and Transportation Info */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Owasp_wasc.gif|center]]&lt;br /&gt;
==Its now the OWASP &amp;amp; WASC AppSec 2007 Conference !!! @ eBay in San Jose, CA Nov 12-15, 2007==&lt;br /&gt;
&lt;br /&gt;
OWASP and [http://www.webappsec.org WASC] have agreed to join forces this year to put together an incredible AppSec 2007 Conference for the application security community. A huge concentration of industry leading experts will be in attendance presenting high quality web application security content. AppSec 2007 offers a unique opportunity for security professionals, software developers, and IT managers to get up to speed on the latest and greatest attack techniques, defense strategies, and industry trends in an atmosphere of peers. The conference format and venue is also perfect for networking and sharing experiences with others that are down in the trenches.&lt;br /&gt;
&lt;br /&gt;
Registration is now open for the conference. See below for details.&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
&lt;br /&gt;
The AppSec 2007 Conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: November 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
Main Conference: November 14th-15th&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda agenda] will follow the (current) standard OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days.&lt;br /&gt;
&lt;br /&gt;
New Web Services Track: In addition, the conference will have a 3rd track on the first day. This track is focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP and WASC contributors and leading Application Security professionals, and will include one panel each day.&lt;br /&gt;
&lt;br /&gt;
The OWASP &amp;amp; WASC AppSec 2007 agenda is still being developed.&lt;br /&gt;
&lt;br /&gt;
==Training: Monday-Tuesday - Nov 12th-13th== &lt;br /&gt;
&lt;br /&gt;
We have arranged for a suite of two day Application Security training courses to be offered prior to the conference. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
==Technology Expo: Tuesday-Wednesday Nov 13th-14th==&lt;br /&gt;
&lt;br /&gt;
Leading vendors in the application security space will be at the conference for the first time this year giving technology demonstrations and providing access to their technical staff so they can answer in-depth questions and demonstrate the capabilities of their products or managed services.&lt;br /&gt;
&lt;br /&gt;
The technology expo will be open from 12PM - 2PM on Nov. 13th (and all tutorial attendees will be given a large lunch break during that time to attend the expo). It will also be open from 11AM until 5PM on Nov. 14th which is the first day of the conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship and participating in the technology expo is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the AppSec 2007 Conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
==[http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd Registration]==&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Here is the [http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd registration page].&lt;br /&gt;
&lt;br /&gt;
==Hotel and Transportation Info==&lt;br /&gt;
OWASP has negotiated rates at the following hotels:&lt;br /&gt;
&lt;br /&gt;
 Holiday Inn-San Jose OWASP Rate $129/night King or Double Room&lt;br /&gt;
 You can call reservations at 1-866-241-9878 and ask for the group &amp;quot;OWASP&amp;quot; or reserve your room [http://www.ichotelsgroup.com/h/d/hi/1/en/advancedsearch?whichtype=room&amp;amp;roomResult=none&amp;amp;hotelCode=sjcfs&amp;amp;quickRes=city&amp;amp;_GPC=OSP&amp;amp;checkInDate=11&amp;amp;checkOutMonthYear=102007&amp;amp;checkInMonthYear=102007&amp;amp;checkOutDate=16&amp;amp;_requestid=184025 online here].&lt;br /&gt;
&lt;br /&gt;
 Homewood Suites by Hilton- San Jose OWASP Rate $149/night (4+ nights) $169/night (3 or less nights)&lt;br /&gt;
 King room w/ sleeper sofa (comes w/ fully equipped kitchen)&lt;br /&gt;
 Call Maria Larios at 408-678-4481 and ask for the group OWASP or email her at maria.larios@dimdev.com&lt;br /&gt;
&lt;br /&gt;
Transportation Info:&lt;br /&gt;
&lt;br /&gt;
From San Jose International Airport (SJC):&lt;br /&gt;
eBay is located about a mile from this airport&lt;br /&gt;
&lt;br /&gt;
From San Francisco International Airport (SFO):&lt;br /&gt;
eBay is located 40 miles from this airport&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be &lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | OWASP &amp;amp; WASC AppSec 2007 Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21590</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21590"/>
				<updated>2007-09-07T21:04:09Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Hotel and Transportation Info */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Owasp_wasc.gif|center]]&lt;br /&gt;
==Its now the OWASP &amp;amp; WASC AppSec 2007 Conference !!! @ eBay in San Jose, CA Nov 12-15, 2007==&lt;br /&gt;
&lt;br /&gt;
OWASP and [http://www.webappsec.org WASC] have agreed to join forces this year to put together an incredible AppSec 2007 Conference for the application security community. A huge concentration of industry leading experts will be in attendance presenting high quality web application security content. AppSec 2007 offers a unique opportunity for security professionals, software developers, and IT managers to get up to speed on the latest and greatest attack techniques, defense strategies, and industry trends in an atmosphere of peers. The conference format and venue is also perfect for networking and sharing experiences with others that are down in the trenches.&lt;br /&gt;
&lt;br /&gt;
Registration is now open for the conference. See below for details.&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
&lt;br /&gt;
The AppSec 2007 Conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: November 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
Main Conference: November 14th-15th&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda agenda] will follow the (current) standard OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days.&lt;br /&gt;
&lt;br /&gt;
New Web Services Track: In addition, the conference will have a 3rd track on the first day. This track is focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP and WASC contributors and leading Application Security professionals, and will include one panel each day.&lt;br /&gt;
&lt;br /&gt;
The OWASP &amp;amp; WASC AppSec 2007 agenda is still being developed.&lt;br /&gt;
&lt;br /&gt;
==Training: Monday-Tuesday - Nov 12th-13th== &lt;br /&gt;
&lt;br /&gt;
We have arranged for a suite of two day Application Security training courses to be offered prior to the conference. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
==Technology Expo: Tuesday-Wednesday Nov 13th-14th==&lt;br /&gt;
&lt;br /&gt;
Leading vendors in the application security space will be at the conference for the first time this year giving technology demonstrations and providing access to their technical staff so they can answer in-depth questions and demonstrate the capabilities of their products or managed services.&lt;br /&gt;
&lt;br /&gt;
The technology expo will be open from 12PM - 2PM on Nov. 13th (and all tutorial attendees will be given a large lunch break during that time to attend the expo). It will also be open from 11AM until 5PM on Nov. 14th which is the first day of the conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship and participating in the technology expo is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the AppSec 2007 Conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
==[http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd Registration]==&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Here is the [http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd registration page].&lt;br /&gt;
&lt;br /&gt;
==Hotel and Transportation Info==&lt;br /&gt;
OWASP has negotiated rates at the following hotels:&lt;br /&gt;
&lt;br /&gt;
 Holiday Inn-San Jose OWASP Rate $129/night&lt;br /&gt;
 You can call reservations at 1-866-241-9878 and ask for the group &amp;quot;OWASP&amp;quot; or reserve your room [http://www.ichotelsgroup.com/h/d/hi/1/en/advancedsearch?whichtype=room&amp;amp;roomResult=none&amp;amp;hotelCode=sjcfs&amp;amp;quickRes=city&amp;amp;_GPC=OSP&amp;amp;checkInDate=11&amp;amp;checkOutMonthYear=102007&amp;amp;checkInMonthYear=102007&amp;amp;checkOutDate=16&amp;amp;_requestid=184025 online here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Transportation Info:&lt;br /&gt;
&lt;br /&gt;
From San Jose International Airport (SJC):&lt;br /&gt;
eBay is located about a mile from this airport&lt;br /&gt;
&lt;br /&gt;
From San Francisco International Airport (SFO):&lt;br /&gt;
eBay is located 40 miles from this airport&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be &lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | OWASP &amp;amp; WASC AppSec 2007 Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Old-MembershipReference&amp;diff=21474</id>
		<title>Old-MembershipReference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Old-MembershipReference&amp;diff=21474"/>
				<updated>2007-09-05T21:26:47Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Membership/Donation Information'''&lt;br /&gt;
&lt;br /&gt;
='''Please Join Us'''=&lt;br /&gt;
&lt;br /&gt;
We invite you to join us. If you're using OWASP materials in your organization, please support our efforts by becoming a member. All of our materials are free and offered under an open source license, so you do not have to become a member to use them or participate in our projects, mailing lists, conferences, or other activities. Please consider becoming a member and enabling OWASP to continue to provide unbiased tools, documentation, conferences, mailing lists, etc.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Register Now&amp;quot; logo to register&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[http://guest.cvent.com/i.aspx?4W,M3,d8fa3c02-6498-47c8-be53-ed24858a2619 https://www.owasp.org/images/9/9d/Register_now.gif]&lt;br /&gt;
or fill out the [http://www.owasp.org/images/4/4b/Membership.pdf OWASP Membership/Donation Registration Form]&lt;br /&gt;
&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
and fax to (443 583-0772) or e-mail (conferences 'at' owasp.org) it to us. Then send a check to OWASP at the address at the bottom of this page.&lt;br /&gt;
&lt;br /&gt;
='''About OWASP'''=&lt;br /&gt;
&lt;br /&gt;
OWASP is an open source project dedicated to finding and fighting the causes of insecure software. The OWASP Foundation is a not-for-profit 501c3 charitable organization not associated with any commercial product or service. OWASP member companies, educational organizations, government and law enforcement agencies, and individuals from around the world form an application security community that works together to create articles, methodologies, documentation, tools, and technologies (“OWASP Materials”). For more information about OWASP, please see the [[About The Open Web Application Security Project]].&lt;br /&gt;
&lt;br /&gt;
='''Benefits of Membership'''=&lt;br /&gt;
&lt;br /&gt;
'''Benefits unique to members'''&lt;br /&gt;
#A [[OWASP Commercial License]] to use the materials within your organization without the restrictions associated with the various open source licenses used by the OWASP projects. &lt;br /&gt;
#Visibility for your organization's tangible commitment to application security through its inclusion in the members list on the OWASP website and promotional materials. &lt;br /&gt;
#The right to use the OWASP name and [http://www.owasp.org/images/f/f0/OWASP_Logo.gif membership mark] to show that you are an OWASP Member. Note that the mark must not be used in any way that might indicate that OWASP supports a commercial product or service.&lt;br /&gt;
#Discounts to the OWASP AppSec and other security conferences and events. See the OWASP [[Member Offers]] page for the most current discounts available to OWASP Members. NOTE: Some of these discounts are greater than or equal to the cost of an individual OWASP Membership.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Benefits that also apply to all OWASP participants (even non-members)'''&lt;br /&gt;
#An active voice in the development of OWASP Materials that are becoming widely accepted as an application security standard for all organizations. &lt;br /&gt;
# Timely electronic notification of updates to the OWASP Materials. &lt;br /&gt;
# Collaboration with other highly skilled people from organizations around the world, both virtually and in person during periodic OWASP AppSec conferences and chapter meetings.&lt;br /&gt;
# Authorization to create an account and edit pages on the www.owasp.org website (WIKI based)&lt;br /&gt;
&lt;br /&gt;
='''Categories of Membership'''=&lt;br /&gt;
&lt;br /&gt;
There are several types of OWASP Memberships depending on the type of organization and how the OWASP Materials are used. As a not-for-profit organization, 100% of all membership fees go directly to supporting OWASP's various projects and chapters.&lt;br /&gt;
&lt;br /&gt;
{| border=1 &lt;br /&gt;
 ||'''Membership Category''' ||'''Description''' ||'''Annual Membership Fee''' &lt;br /&gt;
|-&lt;br /&gt;
 ||Individual Members||Individuals who support OWASP's mission and would like to provide financial support to our efforts. ||$100 USD&lt;br /&gt;
|- &lt;br /&gt;
 ||Educational and Non-Profit Members || [http://www.ed.gov/admins/finaid/accred/index.html Accredited] [http://www.ope.ed.gov/accreditation/Search.asp educational institutions] and government-approved non-profit organizations that would like to use OWASP materials in their courses, research, or other educational purposes.||$250 USD &lt;br /&gt;
|-&lt;br /&gt;
 ||End-User Organization Members ||End-user organizations that use OWASP Materials within their organization. Organizations with 100 or more employees are considered large. ||Small (&amp;lt;100) - $2,000 USD&lt;br /&gt;
&lt;br /&gt;
Large (100+) - $7,000 USD &lt;br /&gt;
|-&lt;br /&gt;
 ||Consulting Organization Members ||Organizations with employees that provide information security consulting, training, or auditing services and use OWASP Materials in their services or marketing. Organizations with 10 or more consultants are considered large. ||Small (&amp;lt;10) - $3,000 USD&lt;br /&gt;
&lt;br /&gt;
Large (10+) - $8,000 USD &lt;br /&gt;
|-&lt;br /&gt;
 ||Vendor Organization Members ||Software vendors that market security products or other software and use OWASP Materials in their products or marketing. ||$9,000 USD &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
='''Current OWASP Members'''=&lt;br /&gt;
{{OWASP Members}}&lt;br /&gt;
&lt;br /&gt;
='''OWASP Membership Frequently Asked Questions (FAQ)'''=&lt;br /&gt;
&lt;br /&gt;
== Why Should I Become An OWASP Member? ==&lt;br /&gt;
&lt;br /&gt;
OWASP provides documentation, tools, methodologies, standards, articles, and message forums (“OWASP Materials”) as a service to Internet users worldwide to help users and developers understand more about application security. OWASP makes these materials available to end users to help them acquire, build, test, and operate secure software. In addition to the benefits you receive as described above, your membership helps to support the growth of OWASP and the development of new and improved OWASP Materials. Because we are an open, non-commercial entity, we can take on projects that commercial entities driven by profit motives could not. Everyone benefits from these projects. Your support will help OWASP continue to find and fight the causes of insecure software.&lt;br /&gt;
&lt;br /&gt;
== How Are Funds Used? ==&lt;br /&gt;
&lt;br /&gt;
OWASP is a 501c3 not-for-profit foundation, and all funds go directly to support OWASP projects, chapters, and infrastructure. Our funds come from conferences, memberships, advertising, and individual contributions.&lt;br /&gt;
&lt;br /&gt;
== Who Must Become an OWASP Member? ==&lt;br /&gt;
&lt;br /&gt;
Memberships are not required to use OWASP materials under each project's open source license. Also, anyone can participate in or contribute to an OWASP project without becoming a member. Membership provides a [[OWASP commercial license|commercial license]] to all OWASP Materials for your entire organization. This license will ensure that you can modify, use, and bundle OWASP Materials in applications and documents under a single commercial license. Your membership fees are what make the various OWASP projects possible.&lt;br /&gt;
&lt;br /&gt;
== How Can I Become An OWASP Member? ==&lt;br /&gt;
&lt;br /&gt;
To become an OWASP Member, an individual or organization must:&lt;br /&gt;
Agree to the terms and conditions of the OWASP Membership Agreement. &lt;br /&gt;
Pay the appropriate membership fee, depending on what type of OWASP Membership is indicated. (See top of page for both)&lt;br /&gt;
Keep OWASP updated with accurate contact and business profile information.&lt;br /&gt;
Enrollment as an OWASP Member is required before a commercial license to use the materials is established. The term of the agreement is one year from the date of execution. We appreciate your interest in becoming an OWASP Member. Click the &amp;quot;Register Now&amp;quot; logo to begin the OWASP Member registration process:&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[http://guest.cvent.com/i.aspx?4W,M3,d8fa3c02-6498-47c8-be53-ed24858a2619 https://www.owasp.org/images/9/9d/Register_now.gif]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== What is OWASP’s licensing model? ==&lt;br /&gt;
&lt;br /&gt;
OWASP uses a &amp;quot;dual licensing&amp;quot; business model. OWASP Materials are offered under two types of licenses. Anyone can use OWASP materials under the [http://www.opensource.org/ approved open source license] associated with each project. Members, however, may also use the OWASP materials under the [[OWASP Commercial License]]. Both have full access to the entire range of OWASP Materials and include all source code and documentation.&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Licenses''': Each OWASP project is licensed under one of the [http://www.opensource.org/ approved open source licenses], such as the GPL, LGPL, and GFDL. Under these licenses, you may be required to contribute changes back to the open source community at large, according to the terms of the applicable open source license.&lt;br /&gt;
*'''Commercial License for Members''': Members in good standing have the right to use the OWASP Materials under the [[OWASP Commercial License]]. This is a single license that grants access to all OWASP Materials to an individual member or an entire organization.&lt;br /&gt;
&lt;br /&gt;
== Why does OWASP offer two licenses? ==&lt;br /&gt;
&lt;br /&gt;
OWASP's dual license model allows individuals and organizations the option to use a single license for all OWASP projects. The [[OWASP Commercial License]] is free from open source terms that may restrict a member's use of the materials and may require legal analysis. The OWASP membership program is also the best way for organizations to support what OWASP does. As a not-for-profit foundation, OWASP channels all membership fees back into support for its open source user community that, in turn, supports OWASP’s members.&lt;br /&gt;
&lt;br /&gt;
== Do I get the same OWASP Materials under either license? ==&lt;br /&gt;
&lt;br /&gt;
Yes. The OWASP Materials are essentially identical under either license option.&lt;br /&gt;
&lt;br /&gt;
== With a commercial license option, is OWASP still an &amp;quot;open source&amp;quot; organization? ==&lt;br /&gt;
&lt;br /&gt;
Yes, OWASP is an open source organization and is completely committed to open source values and philosophies. All of the OWASP Materials are offered for no cost and with all source code. We believe the open source model of development and distribution is the most efficient way to produce high-quality documentation, tools, and other materials. All OWASP Materials are offered under both open source and commercial license terms.&lt;br /&gt;
&lt;br /&gt;
== Are other organizations using the dual licensing business model? ==&lt;br /&gt;
&lt;br /&gt;
Yes, the dual licensing business model is well established among open source organizations as it paves the way for long-term financial viability. Other companies that offer dual licensing include MySQL, Red Hat, Digium, OSAF, MandrakeSoft, Sleepycat Software, Technical Pursuit, Trolltech, and others.&lt;br /&gt;
&lt;br /&gt;
==For more information==&lt;br /&gt;
[http://guest.cvent.com/i.aspx?4W,M3,d8fa3c02-6498-47c8-be53-ed24858a2619 https://www.owasp.org/images/9/9d/Register_now.gif]&lt;br /&gt;
&lt;br /&gt;
Contact: [mailto:owasp@owasp.org owasp@owasp.org]&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
9175 Guilford Road, Suite 300&lt;br /&gt;
&lt;br /&gt;
Columbia, MD 21046&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Foundation]]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Old-MembershipReference&amp;diff=21473</id>
		<title>Old-MembershipReference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Old-MembershipReference&amp;diff=21473"/>
				<updated>2007-09-05T21:13:30Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* '''Please Join Us''' */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Membership Information'''&lt;br /&gt;
&lt;br /&gt;
='''Please Join Us'''=&lt;br /&gt;
&lt;br /&gt;
We invite you to join us. If you're using OWASP materials in your organization, please support our efforts by becoming a member. All of our materials are free and offered under an open source license, so you do not have to become a member to use them or participate in our projects, mailing lists, conferences, or other activities. Please consider becoming a member and enabling OWASP to continue to provide unbiased tools, documentation, conferences, mailing lists, etc.&lt;br /&gt;
&lt;br /&gt;
Click the &amp;quot;Register Now&amp;quot; logo to register&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[http://guest.cvent.com/i.aspx?4W,M3,d8fa3c02-6498-47c8-be53-ed24858a2619 https://www.owasp.org/images/9/9d/Register_now.gif]&lt;br /&gt;
or fill out the [http://www.owasp.org/images/4/4b/Membership.pdf OWASP Membership/Donation Registration Form]&lt;br /&gt;
&amp;lt;/center&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
and fax to (443 583-0772) or e-mail (conferences 'at' owasp.org) it to us. Then send a check to OWASP at the address at the bottom of this page.&lt;br /&gt;
&lt;br /&gt;
='''About OWASP'''=&lt;br /&gt;
&lt;br /&gt;
OWASP is an open source project dedicated to finding and fighting the causes of insecure software. The OWASP Foundation is a not-for-profit 501c3 charitable organization not associated with any commercial product or service. OWASP member companies, educational organizations, government and law enforcement agencies, and individuals from around the world form an application security community that works together to create articles, methodologies, documentation, tools, and technologies (“OWASP Materials”). For more information about OWASP, please see the [[About The Open Web Application Security Project]].&lt;br /&gt;
&lt;br /&gt;
='''Benefits of Membership'''=&lt;br /&gt;
&lt;br /&gt;
'''Benefits unique to members'''&lt;br /&gt;
#A [[OWASP Commercial License]] to use the materials within your organization without the restrictions associated with the various open source licenses used by the OWASP projects. &lt;br /&gt;
#Visibility for your organization's tangible commitment to application security through its inclusion in the members list on the OWASP website and promotional materials. &lt;br /&gt;
#The right to use the OWASP name and [http://www.owasp.org/images/f/f0/OWASP_Logo.gif membership mark] to show that you are an OWASP Member. Note that the mark must not be used in any way that might indicate that OWASP supports a commercial product or service.&lt;br /&gt;
#Discounts to the OWASP AppSec and other security conferences and events. See the OWASP [[Member Offers]] page for the most current discounts available to OWASP Members. NOTE: Some of these discounts are greater than or equal to the cost of an individual OWASP Membership.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Benefits that also apply to all OWASP participants (even non-members)'''&lt;br /&gt;
#An active voice in the development of OWASP Materials that are becoming widely accepted as an application security standard for all organizations. &lt;br /&gt;
# Timely electronic notification of updates to the OWASP Materials. &lt;br /&gt;
# Collaboration with other highly skilled people from organizations around the world, both virtually and in person during periodic OWASP AppSec conferences and chapter meetings.&lt;br /&gt;
# Authorization to create an account and edit pages on the www.owasp.org website (WIKI based)&lt;br /&gt;
&lt;br /&gt;
='''Categories of Membership'''=&lt;br /&gt;
&lt;br /&gt;
There are several types of OWASP Memberships depending on the type of organization and how the OWASP Materials are used. As a not-for-profit organization, 100% of all membership fees go directly to supporting OWASP's various projects and chapters.&lt;br /&gt;
&lt;br /&gt;
{| border=1 &lt;br /&gt;
 ||'''Membership Category''' ||'''Description''' ||'''Annual Membership Fee''' &lt;br /&gt;
|-&lt;br /&gt;
 ||Individual Members||Individuals who support OWASP's mission and would like to provide financial support to our efforts. ||$100 USD&lt;br /&gt;
|- &lt;br /&gt;
 ||Educational and Non-Profit Members || [http://www.ed.gov/admins/finaid/accred/index.html Accredited] [http://www.ope.ed.gov/accreditation/Search.asp educational institutions] and government-approved non-profit organizations that would like to use OWASP materials in their courses, research, or other educational purposes.||$250 USD &lt;br /&gt;
|-&lt;br /&gt;
 ||End-User Organization Members ||End-user organizations that use OWASP Materials within their organization. Organizations with 100 or more employees are considered large. ||Small (&amp;lt;100) - $2,000 USD&lt;br /&gt;
&lt;br /&gt;
Large (100+) - $7,000 USD &lt;br /&gt;
|-&lt;br /&gt;
 ||Consulting Organization Members ||Organizations with employees that provide information security consulting, training, or auditing services and use OWASP Materials in their services or marketing. Organizations with 10 or more consultants are considered large. ||Small (&amp;lt;10) - $3,000 USD&lt;br /&gt;
&lt;br /&gt;
Large (10+) - $8,000 USD &lt;br /&gt;
|-&lt;br /&gt;
 ||Vendor Organization Members ||Software vendors that market security products or other software and use OWASP Materials in their products or marketing. ||$9,000 USD &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
='''Current OWASP Members'''=&lt;br /&gt;
{{OWASP Members}}&lt;br /&gt;
&lt;br /&gt;
='''OWASP Membership Frequently Asked Questions (FAQ)'''=&lt;br /&gt;
&lt;br /&gt;
== Why Should I Become An OWASP Member? ==&lt;br /&gt;
&lt;br /&gt;
OWASP provides documentation, tools, methodologies, standards, articles, and message forums (“OWASP Materials”) as a service to Internet users worldwide to help users and developers understand more about application security. OWASP makes these materials available to end users to help them acquire, build, test, and operate secure software. In addition to the benefits you receive as described above, your membership helps to support the growth of OWASP and the development of new and improved OWASP Materials. Because we are an open, non-commercial entity, we can take on projects that commercial entities driven by profit motives could not. Everyone benefits from these projects. Your support will help OWASP continue to find and fight the causes of insecure software.&lt;br /&gt;
&lt;br /&gt;
== How Are Funds Used? ==&lt;br /&gt;
&lt;br /&gt;
OWASP is a 501c3 not-for-profit foundation, and all funds go directly to support OWASP projects, chapters, and infrastructure. Our funds come from conferences, memberships, advertising, and individual contributions.&lt;br /&gt;
&lt;br /&gt;
== Who Must Become an OWASP Member? ==&lt;br /&gt;
&lt;br /&gt;
Memberships are not required to use OWASP materials under each project's open source license. Also, anyone can participate in or contribute to an OWASP project without becoming a member. Membership provides a [[OWASP commercial license|commercial license]] to all OWASP Materials for your entire organization. This license will ensure that you can modify, use, and bundle OWASP Materials in applications and documents under a single commercial license. Your membership fees are what make the various OWASP projects possible.&lt;br /&gt;
&lt;br /&gt;
== How Can I Become An OWASP Member? ==&lt;br /&gt;
&lt;br /&gt;
To become an OWASP Member, an individual or organization must:&lt;br /&gt;
Agree to the terms and conditions of the OWASP Membership Agreement. &lt;br /&gt;
Pay the appropriate membership fee, depending on what type of OWASP Membership is indicated. (See top of page for both)&lt;br /&gt;
Keep OWASP updated with accurate contact and business profile information.&lt;br /&gt;
Enrollment as an OWASP Member is required before a commercial license to use the materials is established. The term of the agreement is one year from the date of execution. We appreciate your interest in becoming an OWASP Member. Click the &amp;quot;Register Now&amp;quot; logo to begin the OWASP Member registration process:&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[http://guest.cvent.com/i.aspx?4W,M3,d8fa3c02-6498-47c8-be53-ed24858a2619 https://www.owasp.org/images/9/9d/Register_now.gif]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== What is OWASP’s licensing model? ==&lt;br /&gt;
&lt;br /&gt;
OWASP uses a &amp;quot;dual licensing&amp;quot; business model. OWASP Materials are offered under two types of licenses. Anyone can use OWASP materials under the [http://www.opensource.org/ approved open source license] associated with each project. Members, however, may also use the OWASP materials under the [[OWASP Commercial License]]. Both have full access to the entire range of OWASP Materials and include all source code and documentation.&lt;br /&gt;
&lt;br /&gt;
*'''Open Source Licenses''': Each OWASP project is licensed under one of the [http://www.opensource.org/ approved open source licenses], such as the GPL, LGPL, and GFDL. Under these licenses, you may be required to contribute changes back to the open source community at large, according to the terms of the applicable open source license.&lt;br /&gt;
*'''Commercial License for Members''': Members in good standing have the right to use the OWASP Materials under the [[OWASP Commercial License]]. This is a single license that grants access to all OWASP Materials to an individual member or an entire organization.&lt;br /&gt;
&lt;br /&gt;
== Why does OWASP offer two licenses? ==&lt;br /&gt;
&lt;br /&gt;
OWASP's dual license model allows individuals and organizations the option to use a single license for all OWASP projects. The [[OWASP Commercial License]] is free from open source terms that may restrict a member's use of the materials and may require legal analysis. The OWASP membership program is also the best way for organizations to support what OWASP does. As a not-for-profit foundation, OWASP channels all membership fees back into support for its open source user community that, in turn, supports OWASP’s members.&lt;br /&gt;
&lt;br /&gt;
== Do I get the same OWASP Materials under either license? ==&lt;br /&gt;
&lt;br /&gt;
Yes. The OWASP Materials are essentially identical under either license option.&lt;br /&gt;
&lt;br /&gt;
== With a commercial license option, is OWASP still an &amp;quot;open source&amp;quot; organization? ==&lt;br /&gt;
&lt;br /&gt;
Yes, OWASP is an open source organization and is completely committed to open source values and philosophies. All of the OWASP Materials are offered for no cost and with all source code. We believe the open source model of development and distribution is the most efficient way to produce high-quality documentation, tools, and other materials. All OWASP Materials are offered under both open source and commercial license terms.&lt;br /&gt;
&lt;br /&gt;
== Are other organizations using the dual licensing business model? ==&lt;br /&gt;
&lt;br /&gt;
Yes, the dual licensing business model is well established among open source organizations as it paves the way for long-term financial viability. Other companies that offer dual licensing include MySQL, Red Hat, Digium, OSAF, MandrakeSoft, Sleepycat Software, Technical Pursuit, Trolltech, and others.&lt;br /&gt;
&lt;br /&gt;
==For more information==&lt;br /&gt;
[http://guest.cvent.com/i.aspx?4W,M3,d8fa3c02-6498-47c8-be53-ed24858a2619 https://www.owasp.org/images/9/9d/Register_now.gif]&lt;br /&gt;
&lt;br /&gt;
Contact: [mailto:owasp@owasp.org owasp@owasp.org]&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
9175 Guilford Road, Suite 300&lt;br /&gt;
&lt;br /&gt;
Columbia, MD 21046&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Foundation]]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:OWASP_Conference&amp;diff=21472</id>
		<title>Template:OWASP Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:OWASP_Conference&amp;diff=21472"/>
				<updated>2007-09-05T20:22:57Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[[6th_OWASP_AppSec_Conference_-_Italy_2007|6th OWASP AppSec Conference in Italy May 15-17 was a great success!!]]'''&lt;br /&gt;
&lt;br /&gt;
The [[6th_OWASP_AppSec_Conference_-_Italy_2007|6th OWASP AppSec Conference]] was held May 15-17 in Milan, Italy. Microsoft presented on &amp;quot;The Benefits of the SDL initiative to Microsoft and its Customers&amp;quot; and there were expert talks on Web Services Security, Securing AJAX, the Microsoft Secure Development Lifecycle, all the new OWASP projects, and much more.&lt;br /&gt;
&lt;br /&gt;
You can read all the [[6th_OWASP_AppSec_Conference_-_Italy_2007|details]] and then access all the presentations online on the [[6th_OWASP_AppSec_Conference_-_Italy_2007/Agenda | agenda page]].&lt;br /&gt;
&lt;br /&gt;
'''[[7th_OWASP_AppSec_Conference_-_San_Jose_2007|It's now the OWASP &amp;amp; WASC AppSec 2007 Conference !!! Registration Now Available!]]'''&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007 |The OWASP &amp;amp; WASC AppSec Conference]] will be held Nov. 12-15, 2007 at eBay in San Jose, CA.  This conference will be our biggest ever with two full days of tutorials, two days for the conference (including a new 3rd track on Web Services Security), and  for the first time a vendor booth area.&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Conference_Sponsors&amp;diff=21264</id>
		<title>OWASP AppSec Conference Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Conference_Sponsors&amp;diff=21264"/>
				<updated>2007-08-30T18:11:25Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Conference Sponsorship ==&lt;br /&gt;
&lt;br /&gt;
OWASP is accepting sponsorships for the 2007 OWASP AppSec San Jose Conference. Financial sponsorship will help defray the non-profit OWASP Foundation's expenses to prepare for and hold this conference. For the first time, there are two different sponsorship options for this conference:&lt;br /&gt;
&lt;br /&gt;
Option #1: Standard Sponsorship Plan (same as previous conferences):&lt;br /&gt;
&lt;br /&gt;
* Sponsor information will be presented on the main conference page&lt;br /&gt;
&lt;br /&gt;
* A Sponsor information sheet will be included in handouts to all attendees&lt;br /&gt;
&lt;br /&gt;
* Sponsors can include a poster (no larger than 6 ft. x 4 ft.) at the conference in the main hallway&lt;br /&gt;
&lt;br /&gt;
* Includes 2 Free admissions to the conference&lt;br /&gt;
&lt;br /&gt;
The sponsorship fee for this option at the 7th OWASP Conference in San Jose, CA in November 2007 is $4000.&lt;br /&gt;
&lt;br /&gt;
Option #2: Technology Expo:&lt;br /&gt;
&lt;br /&gt;
* Product vendors can demonstrate their application security products to conference attendees. The intended focus of this expo is to be prepared to discuss the technical details of the technologies they are offering in the market to help organizations deal with their application security issues. This expo should be light on sales push and very technical. OWASP attendees are very familiar with the application security market! As this is a technology expo, services only vendors are not appropriate for this venue.&lt;br /&gt;
&lt;br /&gt;
* Time frame: The technology expo will be held from 12-2 on November 13th, with lunch included for all the OWASP tutorial attendees who will be invited to attend the expo, and then open again from 11-5 on November 14th during the first day of the OWASP conference.&lt;br /&gt;
&lt;br /&gt;
Each vendor will receive:&lt;br /&gt;
&lt;br /&gt;
* Tabletop with tablecloth&lt;br /&gt;
* Power strip&lt;br /&gt;
* Internet connectivity (it may be wireless access so please check)&lt;br /&gt;
&lt;br /&gt;
The sponsorship fee for this option at the 7th OWASP Conference in San Jose, CA in November 2007 is also $4000.&lt;br /&gt;
&lt;br /&gt;
Option #3: Combined Sponsorship:&lt;br /&gt;
&lt;br /&gt;
If you are interested in doing both at the San Jose conference, the sponsorship fee for this combined option is $6000.&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring the 2007 OWASP San Jose conference, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
Sponsorship registration to the 2007 OWASP AppSec San Jose Conference is now open! Here is the [http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd registration page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sending Materials to Conference Facility in San Jose ==&lt;br /&gt;
&lt;br /&gt;
Sponsors, please ship your conference materials to:&lt;br /&gt;
&lt;br /&gt;
Location TBD.&lt;br /&gt;
&lt;br /&gt;
All materials must arrive no earlier than date TBD.&lt;br /&gt;
&lt;br /&gt;
== Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The following are the sponsors for the 7th OWASP AppSec Conference.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:OWASP_Conference&amp;diff=21168</id>
		<title>Template:OWASP Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:OWASP_Conference&amp;diff=21168"/>
				<updated>2007-08-27T18:23:43Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[[6th_OWASP_AppSec_Conference_-_Italy_2007|6th OWASP AppSec Conference in Italy May 15-17 was a great success!!]]'''&lt;br /&gt;
&lt;br /&gt;
The [[6th_OWASP_AppSec_Conference_-_Italy_2007|6th OWASP AppSec Conference]] was held May 15-17 in Milan, Italy. Microsoft presented on &amp;quot;The Benefits of the SDL initiative to Microsoft and its Customers&amp;quot; and there were expert talks on Web Services Security, Securing AJAX, the Microsoft Secure Development Lifecycle, all the new OWASP projects, and much more.&lt;br /&gt;
&lt;br /&gt;
You can read all the [[6th_OWASP_AppSec_Conference_-_Italy_2007|details]] and then access all the presentations online on the [[6th_OWASP_AppSec_Conference_-_Italy_2007/Agenda | agenda page]].&lt;br /&gt;
&lt;br /&gt;
'''[[7th_OWASP_AppSec_Conference_-_San_Jose_2007|REGISTRATION NOW OPEN for 7th OWASP AppSec Conference in San Jose, CA Nov. 12-15 2007!]]'''&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007 | 7th OWASP AppSec Conference]] will be held Nov. 12-15, 2007 at eBay in San Jose, CA.  This conference will be our biggest ever with two full days of tutorials, two days for the conference (including a new 3rd track on Web Services Security), and  for the first time a vendor booth area.&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21162</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21162"/>
				<updated>2007-08-27T17:10:56Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Registration is now open for the OWASP U.S. conference, eBay in San Jose, CA Nov 12-15, 2007.&lt;br /&gt;
&lt;br /&gt;
Web Services Track: The conference will have 3 tracks on the first day instead of 2. The 3rd track will be focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
Application Security Technology Expo: This conference will also have a technology expo for the first time. Application Security product vendors will be able to demonstrate the technical capabilities of their products in the technology expo area. More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
&lt;br /&gt;
This year's US OWASP conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: Novermber 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
Main Conference: November 14th-15th&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda agenda] will follow the (current) standard OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days. In addition, on the first day, there will be a third track focused on Web Services Security.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP contributors and leading Application Security professionals, and will include one panel each day.&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec San Jose 2007 agenda is still being developed.&lt;br /&gt;
&lt;br /&gt;
==Training: Monday-Tuesday - Nov 12th-13th== &lt;br /&gt;
&lt;br /&gt;
OWASP has arranged for a suite of two day Application Security training courses to be offered prior to the conference. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Advanced_Asp.Net_Exploits_and_Countermeasures_-_2-Day_Course_-_Nov_12-13.2C_2007 | Advanced Asp.Net Exploits and Countermeasures]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
==[http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd Registration]==&lt;br /&gt;
&lt;br /&gt;
Here is the [http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd registration page].&lt;br /&gt;
&lt;br /&gt;
==Hotel and Transportation Info==&lt;br /&gt;
&lt;br /&gt;
OWASP is currently negotiating rates with local hotels&lt;br /&gt;
&lt;br /&gt;
From San Jose International Airport (SJC):&lt;br /&gt;
eBay is located about a mile from this airport&lt;br /&gt;
&lt;br /&gt;
From San Francisco International Airport (SFO):&lt;br /&gt;
eBay is located 40 miles from this airport&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be &lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21161</id>
		<title>7th OWASP AppSec Conference - San Jose 2007/Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21161"/>
				<updated>2007-08-27T17:07:02Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Conference Training Day - Two Day Training Courses - November 12th-13th, 2007 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Conference Training Day - Two Day Training Courses - November 12th-13th, 2007 ==&lt;br /&gt;
&lt;br /&gt;
OWASP has arranged to have four 2-day Application Security training courses prior to the conference.&lt;br /&gt;
&lt;br /&gt;
The first two courses will be provided by a long time contributor to OWASP, Aspect Security. The third course is being taught by Dinis Cruz, the OWASP Evangelist and one of the longest active members at OWASP. The fourth course will be provided by another active OWASP member, the Arctec Group. All of these courses were offered in their 1-day format at the last two OWASP AppSec conferences and were well received. This is the first OWASP conference where we have been able to expand these classes to their 2-day format.&lt;br /&gt;
&lt;br /&gt;
These courses are being offered to attendees of the OWASP conference at a significant discount to their standard commercial price. Most of the course fee will go to OWASP to support the OWASP Foundation's efforts.&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; width=&amp;quot;60%&amp;quot; cellpadding=&amp;quot;2&amp;quot; cellspacing=&amp;quot;5&amp;quot; style=&amp;quot;vertical-align:top;background-color:#cedff2&amp;quot;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T1&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T2&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T3&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Advanced Asp.Net Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T4&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Web Services and XML Security - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;*Note: Information corresponding to each training course is located below.&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pricing'''&lt;br /&gt;
&lt;br /&gt;
$1300 for conference attendees. [Note: This fee includes snacks, and LUNCH]&lt;br /&gt;
&lt;br /&gt;
$1450 - Tutorial only pricing (if not attending the conference)&lt;br /&gt;
&lt;br /&gt;
$675 - Student Pricing&lt;br /&gt;
&lt;br /&gt;
'''Location'''&lt;br /&gt;
&lt;br /&gt;
At eBay in San Jose. Same location as the conference.&lt;br /&gt;
&lt;br /&gt;
'''Course Times'''&lt;br /&gt;
&lt;br /&gt;
Each class begins at 9 AM and runs until 5 PM each day.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
== T1. Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful two day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T2. Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including 1) Java EE security overview, 2) all coding examples are specifically focused on Java and Java servers, and 3) the addition of 3 hands on coding labs where the students find and then fix security vulnerabilities in an application developed for the class.&lt;br /&gt;
&lt;br /&gt;
This course is a compressed version of Aspect's standard 3-day Secure Coding for Java EE course.&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful one day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
For this Java focused course, students will additionally have the opportunity to find and exploit, and then fix vulnerabilities in three different labs using Eclipse.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T3. Advanced ASP.NET Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
In this two day course you will push ASP.NET to the limit and will be shown how ASP.NET applications and environments can be exploited by skilled attackers. Advanced exploitation techniques will be presented together with low-level technical analysis of the .NET Framework. You will also learn advanced defense techniques such as: Building an ASP.NET Security Protection layer (also called a Web Application Firewall) and Real time patching of vulnerabilities in the target application, the .NET Framework or the CLR.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
The Course is made of 2 modules &lt;br /&gt;
&lt;br /&gt;
'''Module 1: Security principles and .NET Framework Architecture; Guerrilla Threat Modeling; Exploiting ASP.NET Applications'''&lt;br /&gt;
&lt;br /&gt;
* Analysis of the .NET Framework and its core components (CLR, Garbage Collector, Verifier, Security Manager)&lt;br /&gt;
* Using quick-and-dirty threat models to discover vulnerabilities in the target application&lt;br /&gt;
* Exploiting vulnerabilities in ASP.NET applications: Data Validation, Authorization, Authentication, SessionState, XSS, Cookies, AJAX, Web Services, Remoting, etc. (using basic and advanced techniques)&lt;br /&gt;
* Exploiting Buffer Overflows and Windows vulnerabilities via ASP.NET Applications&lt;br /&gt;
&lt;br /&gt;
'''Module 2: Exploiting Full Trust and Partial Trust ASP.NET Environments; Advanced ASP.NET Countermeasures'''&lt;br /&gt;
&lt;br /&gt;
* Practical demonstrations of the power of Full Trust ASP.NET:&lt;br /&gt;
* Rooting the CLR (e.g. patching the .Net Framework and CLR), Reflection, IIS Metabase, Shellcode injection, Launching internal attacks to compromise the server and the data center&lt;br /&gt;
* Full Trust non-verification and Type Safety attacks (via MSIL manipulation)&lt;br /&gt;
* Exploiting Insecure Partial Trust ASP.NET Environments&lt;br /&gt;
* Applying real-time security patches in the target application, .NET Framework and CLR&lt;br /&gt;
* Solutions to create secure Data Validation and Authorization architectures&lt;br /&gt;
* Creating secure ASP.NET hosting environments&lt;br /&gt;
* Building an ASP.NET Security Protection layer (also called Web Application Firewall);&lt;br /&gt;
&lt;br /&gt;
You will walk away from this class with a much better understanding of some of the weaknesses of .NET applications, particularly the internals of the .NET framework. You will also get the chance to put your skills to the test against a target application over the course of the class.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
A laptop with VMWare Player pre-installed. A VMWare image containing all necessary lab tools will be provided.&lt;br /&gt;
&lt;br /&gt;
'''Prerequisites'''&lt;br /&gt;
&lt;br /&gt;
This is an advanced course targeted at industry professionals who want to understand the weaknesses and the power of the .Net Framework.&lt;br /&gt;
&lt;br /&gt;
To get the most of this course and to be able to do the extensive practice material provided (using a VMWare image), the participants must:&lt;br /&gt;
&lt;br /&gt;
* Have a good understanding of a .NET Language (Ideally C#)&lt;br /&gt;
* Be familiar with MSIL/Assembly&lt;br /&gt;
* Have some experience with debugging user-land applications&lt;br /&gt;
* Have commercial experience on either application development or security auditing.&lt;br /&gt;
&lt;br /&gt;
The material is presented at a pace adjusted for experienced developers and/or security consultants.&lt;br /&gt;
&lt;br /&gt;
'''Trainer'''&lt;br /&gt;
&lt;br /&gt;
Dinis Cruz is the OWASP Evangelist, current OWASP .NET Project leader and the main developer of several of OWASP .NET tools (SAM'SHE, ANBS, SiteGenerator, PenTest Reporter, Asp.Net Reflector, Online IIS Metabase Explorer).&lt;br /&gt;
&lt;br /&gt;
Since the 1.1 release of the .NET Framework, Dinis has been one of the strongest proponents of the need to write .NET applications that can be executed in secure Partially Trusted .NET environments, and has done extensive research on: Rooting the CLR, exposing the dangers of Full Trust ASP.NET Code, Type Confusion vulnerabilities in Full Trust (i.e. non verifiable) code, creating .Net Security Protection Layers and using Reflection to dynamically manipulate .Net Client applications.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by Dinis Cruz (OWASP Chief Evangelist)&lt;br /&gt;
&lt;br /&gt;
== T4. Web Services and XML Security - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software.&lt;br /&gt;
&lt;br /&gt;
Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system!&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
Topics covered include understanding how web application risks (such as those in OWASP Guide and OWASP Top Ten) apply in a Web Services world, and Web Services security topics including:&lt;br /&gt;
&lt;br /&gt;
* Web Services attack patterns&lt;br /&gt;
* Common XML attack patterns&lt;br /&gt;
* Data and XML security using WS-Security, SAML, XML Encryption and XML Digital Signature&lt;br /&gt;
* Identity services and federation with SAML and Liberty&lt;br /&gt;
* Hardening Web Services servers&lt;br /&gt;
* Input validation for Web Services&lt;br /&gt;
* Integrating Web Services securely with backend resources and applications using WS-Trust&lt;br /&gt;
* Secure Exception handling in Web Services&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by [http://www.arctecgroup.net http://www.owasp.org/images/b/bc/Arctec_logo.jpeg]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21160</id>
		<title>7th OWASP AppSec Conference - San Jose 2007/Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21160"/>
				<updated>2007-08-27T17:06:17Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* T4. Web Services and XML Security - 2-Day Course - Nov 12-13, 2007 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Conference Training Day - Two Day Training Courses - November 12th-13th, 2007 ==&lt;br /&gt;
&lt;br /&gt;
OWASP has arranged to have four 2-day Application Security training courses prior to the conference.&lt;br /&gt;
&lt;br /&gt;
The first two courses will be provided by a long time contributor to OWASP, Aspect Security. The third course is being taught by Dinis Cruz, the OWASP Evangelist and one of the longest active members at OWASP. The fourth course will be provided by another active OWASP member, the Arctec Group. All of these courses were offered in their 1-day format at the last two OWASP AppSec conferences and were well received. This is the first OWASP conference where we have been able to expand these classes to their 2-day format.&lt;br /&gt;
&lt;br /&gt;
These courses are being offered to attendees of the OWASP conference at a significant discount to their standard commercial price. Most of the course fee will go to OWASP to support the OWASP Foundation's efforts.&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; width=&amp;quot;60%&amp;quot; cellpadding=&amp;quot;2&amp;quot; cellspacing=&amp;quot;5&amp;quot; style=&amp;quot;vertical-align:top;background-color:#cedff2&amp;quot;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T1&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T2&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T3&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Advanced Asp.Net Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T4&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Web Services and XML Security - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;*Note: Information corresponding to each training course is located below.&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pricing'''&lt;br /&gt;
&lt;br /&gt;
$1300 for conference attendees. [Note: This fee includes snacks, and LUNCH]&lt;br /&gt;
&lt;br /&gt;
$1450 - Tutorial only pricing (if not attending the conference)&lt;br /&gt;
&lt;br /&gt;
$675 - Student Pricing&lt;br /&gt;
&lt;br /&gt;
'''Location'''&lt;br /&gt;
&lt;br /&gt;
At eBay in San Jose. Same location as the conference.&lt;br /&gt;
&lt;br /&gt;
'''Course Times'''&lt;br /&gt;
&lt;br /&gt;
Each class begins at 9 AM and runs until 5 PM each day.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
== T1. Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful two day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T2. Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including 1) Java EE security overview, 2) all coding examples are specifically focused on Java and Java servers, and 3) the addition of 3 hands on coding labs where the students find and then fix security vulnerabilities in an application developed for the class.&lt;br /&gt;
&lt;br /&gt;
This course is a compressed version of Aspect's standard 3-day Secure Coding for Java EE course.&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful one day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
For this Java focused course, students will additionally have the opportunity to find and exploit, and then fix vulnerabilities in three different labs using Eclipse.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T3. Advanced ASP.NET Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
In this two day course you will push ASP.NET to the limit and will be shown how ASP.NET applications and environments can be exploited by skilled attackers. Advanced exploitation techniques will be presented together with low-level technical analysis of the .NET Framework. You will also learn advanced defense techniques such as: Building an ASP.NET Security Protection layer (also called a Web Application Firewall) and Real time patching of vulnerabilities in the target application, the .NET Framework or the CLR.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
The Course is made of 2 modules &lt;br /&gt;
&lt;br /&gt;
'''Module 1: Security principles and .NET Framework Architecture; Guerrilla Threat Modeling; Exploiting ASP.NET Applications'''&lt;br /&gt;
&lt;br /&gt;
* Analysis of the .NET Framework and its core components (CLR, Garbage Collector, Verifier, Security Manager)&lt;br /&gt;
* Using quick-and-dirty threat models to discover vulnerabilities in the target application&lt;br /&gt;
* Exploiting vulnerabilities in ASP.NET applications: Data Validation, Authorization, Authentication, SessionState, XSS, Cookies, AJAX, Web Services, Remoting, etc. (using basic and advanced techniques)&lt;br /&gt;
* Exploiting Buffer Overflows and Windows vulnerabilities via ASP.NET Applications&lt;br /&gt;
&lt;br /&gt;
'''Module 2: Exploiting Full Trust and Partial Trust ASP.NET Environments; Advanced ASP.NET Countermeasures'''&lt;br /&gt;
&lt;br /&gt;
* Practical demonstrations of the power of Full Trust ASP.NET:&lt;br /&gt;
* Rooting the CLR (e.g. patching the .Net Framework and CLR), Reflection, IIS Metabase, Shellcode injection, Launching internal attacks to compromise the server and the data center&lt;br /&gt;
* Full Trust non-verification and Type Safety attacks (via MSIL manipulation)&lt;br /&gt;
* Exploiting Insecure Partial Trust ASP.NET Environments&lt;br /&gt;
* Applying real-time security patches in the target application, .NET Framework and CLR&lt;br /&gt;
* Solutions to create secure Data Validation and Authorization architectures&lt;br /&gt;
* Creating secure ASP.NET hosting environments&lt;br /&gt;
* Building an ASP.NET Security Protection layer (also called Web Application Firewall);&lt;br /&gt;
&lt;br /&gt;
You will walk away from this class with a much better understanding of some of the weaknesses of .NET applications, particularly the internals of the .NET framework. You will also get the chance to put your skills to the test against a target application over the course of the class.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
A laptop with VMWare Player pre-installed. A VMWare image containing all necessary lab tools will be provided.&lt;br /&gt;
&lt;br /&gt;
'''Prerequisites'''&lt;br /&gt;
&lt;br /&gt;
This is an advanced course targeted at industry professionals who want to understand the weaknesses and the power of the .Net Framework.&lt;br /&gt;
&lt;br /&gt;
To get the most of this course and to be able to do the extensive practice material provided (using a VMWare image), the participants must:&lt;br /&gt;
&lt;br /&gt;
* Have a good understanding of a .NET Language (Ideally C#)&lt;br /&gt;
* Be familiar with MSIL/Assembly&lt;br /&gt;
* Have some experience with debugging user-land applications&lt;br /&gt;
* Have commercial experience on either application development or security auditing.&lt;br /&gt;
&lt;br /&gt;
The material is presented at a pace adjusted for experienced developers and/or security consultants.&lt;br /&gt;
&lt;br /&gt;
'''Trainer'''&lt;br /&gt;
&lt;br /&gt;
Dinis Cruz is the OWASP Evangelist, current OWASP .NET Project leader and the main developer of several of OWASP .NET tools (SAM'SHE, ANBS, SiteGenerator, PenTest Reporter, Asp.Net Reflector, Online IIS Metabase Explorer).&lt;br /&gt;
&lt;br /&gt;
Since the 1.1 release of the .NET Framework, Dinis has been one of the strongest proponents of the need to write .NET applications that can be executed in secure Partially Trusted .NET environments, and has done extensive research on: Rooting the CLR, exposing the dangers of Full Trust ASP.NET Code, Type Confusion vulnerabilities in Full Trust (i.e. non verifiable) code, creating .Net Security Protection Layers and using Reflection to dynamically manipulate .Net Client applications.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by Dinis Cruz (OWASP Chief Evangelist)&lt;br /&gt;
&lt;br /&gt;
== T4. Web Services and XML Security - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software.&lt;br /&gt;
&lt;br /&gt;
Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system!&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
Topics covered include understanding how web application risks (such as those in OWASP Guide and OWASP Top Ten) apply in a Web Services world, and Web Services security topics including:&lt;br /&gt;
&lt;br /&gt;
* Web Services attack patterns&lt;br /&gt;
* Common XML attack patterns&lt;br /&gt;
* Data and XML security using WS-Security, SAML, XML Encryption and XML Digital Signature&lt;br /&gt;
* Identity services and federation with SAML and Liberty&lt;br /&gt;
* Hardening Web Services servers&lt;br /&gt;
* Input validation for Web Services&lt;br /&gt;
* Integrating Web Services securely with backend resources and applications using WS-Trust&lt;br /&gt;
* Secure Exception handling in Web Services&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by [http://www.arctecgroup.net http://www.owasp.org/images/b/bc/Arctec_logo.jpeg]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21159</id>
		<title>7th OWASP AppSec Conference - San Jose 2007/Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21159"/>
				<updated>2007-08-27T17:05:49Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* T3. Advanced ASP.NET Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Conference Training Day - Two Day Training Courses - November 12th-13th, 2007 ==&lt;br /&gt;
&lt;br /&gt;
OWASP has arranged to have four 2-day Application Security training courses prior to the conference.&lt;br /&gt;
&lt;br /&gt;
The first two courses will be provided by a long time contributor to OWASP, Aspect Security. The third course is being taught by Dinis Cruz, the OWASP Evangelist and one of the longest active members at OWASP. The fourth course will be provided by another active OWASP member, the Arctec Group. All of these courses were offered in their 1-day format at the last two OWASP AppSec conferences and were well received. This is the first OWASP conference where we have been able to expand these classes to their 2-day format.&lt;br /&gt;
&lt;br /&gt;
These courses are being offered to attendees of the OWASP conference at a significant discount to their standard commercial price. Most of the course fee will go to OWASP to support the OWASP Foundation's efforts.&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; width=&amp;quot;60%&amp;quot; cellpadding=&amp;quot;2&amp;quot; cellspacing=&amp;quot;5&amp;quot; style=&amp;quot;vertical-align:top;background-color:#cedff2&amp;quot;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T1&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T2&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T3&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Advanced Asp.Net Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T4&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Web Services and XML Security - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;*Note: Information corresponding to each training course is located below.&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pricing'''&lt;br /&gt;
&lt;br /&gt;
$1300 for conference attendees. [Note: This fee includes snacks, and LUNCH]&lt;br /&gt;
&lt;br /&gt;
$1450 - Tutorial only pricing (if not attending the conference)&lt;br /&gt;
&lt;br /&gt;
$675 - Student Pricing&lt;br /&gt;
&lt;br /&gt;
'''Location'''&lt;br /&gt;
&lt;br /&gt;
At eBay in San Jose. Same location as the conference.&lt;br /&gt;
&lt;br /&gt;
'''Course Times'''&lt;br /&gt;
&lt;br /&gt;
Each class begins at 9 AM and runs until 5 PM each day.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
== T1. Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful two day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T2. Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including 1) Java EE security overview, 2) all coding examples are specifically focused on Java and Java servers, and 3) the addition of 3 hands on coding labs where the students find and then fix security vulnerabilities in an application developed for the class.&lt;br /&gt;
&lt;br /&gt;
This course is a compressed version of Aspect's standard 3-day Secure Coding for Java EE course.&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful one day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
For this Java focused course, students will additionally have the opportunity to find and exploit, and then fix vulnerabilities in three different labs using Eclipse.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T3. Advanced ASP.NET Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
In this two day course you will push ASP.NET to the limit and will be shown how ASP.NET applications and environments can be exploited by skilled attackers. Advanced exploitation techniques will be presented together with low-level technical analysis of the .NET Framework. You will also learn advanced defense techniques such as: Building an ASP.NET Security Protection layer (also called a Web Application Firewall) and Real time patching of vulnerabilities in the target application, the .NET Framework or the CLR.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
The Course is made of 2 modules &lt;br /&gt;
&lt;br /&gt;
'''Module 1: Security principles and .NET Framework Architecture; Guerrilla Threat Modeling; Exploiting ASP.NET Applications'''&lt;br /&gt;
&lt;br /&gt;
* Analysis of the .NET Framework and its core components (CLR, Garbage Collector, Verifier, Security Manager)&lt;br /&gt;
* Using quick-and-dirty threat models to discover vulnerabilities in the target application&lt;br /&gt;
* Exploiting vulnerabilities in ASP.NET applications: Data Validation, Authorization, Authentication, SessionState, XSS, Cookies, AJAX, Web Services, Remoting, etc. (using basic and advanced techniques)&lt;br /&gt;
* Exploiting Buffer Overflows and Windows vulnerabilities via ASP.NET Applications&lt;br /&gt;
&lt;br /&gt;
'''Module 2: Exploiting Full Trust and Partial Trust ASP.NET Environments; Advanced ASP.NET Countermeasures'''&lt;br /&gt;
&lt;br /&gt;
* Practical demonstrations of the power of Full Trust ASP.NET:&lt;br /&gt;
* Rooting the CLR (e.g. patching the .Net Framework and CLR), Reflection, IIS Metabase, Shellcode injection, Launching internal attacks to compromise the server and the data center&lt;br /&gt;
* Full Trust non-verification and Type Safety attacks (via MSIL manipulation)&lt;br /&gt;
* Exploiting Insecure Partial Trust ASP.NET Environments&lt;br /&gt;
* Applying real-time security patches in the target application, .NET Framework and CLR&lt;br /&gt;
* Solutions to create secure Data Validation and Authorization architectures&lt;br /&gt;
* Creating secure ASP.NET hosting environments&lt;br /&gt;
* Building an ASP.NET Security Protection layer (also called Web Application Firewall);&lt;br /&gt;
&lt;br /&gt;
You will walk away from this class with a much better understanding of some of the weaknesses of .NET applications, particularly the internals of the .NET framework. You will also get the chance to put your skills to the test against a target application over the course of the class.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
A laptop with VMWare Player pre-installed. A VMWare image containing all necessary lab tools will be provided.&lt;br /&gt;
&lt;br /&gt;
'''Prerequisites'''&lt;br /&gt;
&lt;br /&gt;
This is an advanced course targeted at industry professionals who want to understand the weaknesses and the power of the .Net Framework.&lt;br /&gt;
&lt;br /&gt;
To get the most of this course and to be able to do the extensive practice material provided (using a VMWare image), the participants must:&lt;br /&gt;
&lt;br /&gt;
* Have a good understanding of a .NET Language (Ideally C#)&lt;br /&gt;
* Be familiar with MSIL/Assembly&lt;br /&gt;
* Have some experience with debugging user-land applications&lt;br /&gt;
* Have commercial experience on either application development or security auditing.&lt;br /&gt;
&lt;br /&gt;
The material is presented at a pace adjusted for experienced developers and/or security consultants.&lt;br /&gt;
&lt;br /&gt;
'''Trainer'''&lt;br /&gt;
&lt;br /&gt;
Dinis Cruz is the OWASP Evangelist, current OWASP .NET Project leader and the main developer of several of OWASP .NET tools (SAM'SHE, ANBS, SiteGenerator, PenTest Reporter, Asp.Net Reflector, Online IIS Metabase Explorer).&lt;br /&gt;
&lt;br /&gt;
Since the 1.1 release of the .NET Framework, Dinis has been one of the strongest proponents of the need to write .NET applications that can be executed in secure Partially Trusted .NET environments, and has done extensive research on: Rooting the CLR, exposing the dangers of Full Trust ASP.NET Code, Type Confusion vulnerabilities in Full Trust (i.e. non verifiable) code, creating .Net Security Protection Layers and using Reflection to dynamically manipulate .Net Client applications.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by Dinis Cruz (OWASP Chief Evangelist)&lt;br /&gt;
&lt;br /&gt;
== T4. Web Services and XML Security - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software.&lt;br /&gt;
&lt;br /&gt;
Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system!&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
Topics covered include understanding how web application risks (such as those in OWASP Guide and OWASP Top Ten) apply in a Web Services world, and Web Services security topics including:&lt;br /&gt;
&lt;br /&gt;
* Web Services attack patterns&lt;br /&gt;
* Common XML attack patterns&lt;br /&gt;
* Data and XML security using WS-Security, SAML, XML Encryption and XML Digital Signature&lt;br /&gt;
* Identity services and federation with SAML and Liberty&lt;br /&gt;
* Hardening Web Services servers&lt;br /&gt;
* Input validation for Web Services&lt;br /&gt;
* Integrating Web Services securely with backend resources and applications using WS-Trust&lt;br /&gt;
* Secure Exception handling in Web Services&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by [http://www.arctecgroup.net http://www.owasp.org/images/b/bc/Arctec_logo.jpeg]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21158</id>
		<title>7th OWASP AppSec Conference - San Jose 2007/Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21158"/>
				<updated>2007-08-27T17:04:51Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* T2. Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Conference Training Day - Two Day Training Courses - November 12th-13th, 2007 ==&lt;br /&gt;
&lt;br /&gt;
OWASP has arranged to have four 2-day Application Security training courses prior to the conference.&lt;br /&gt;
&lt;br /&gt;
The first two courses will be provided by a long time contributor to OWASP, Aspect Security. The third course is being taught by Dinis Cruz, the OWASP Evangelist and one of the longest active members at OWASP. The fourth course will be provided by another active OWASP member, the Arctec Group. All of these courses were offered in their 1-day format at the last two OWASP AppSec conferences and were well received. This is the first OWASP conference where we have been able to expand these classes to their 2-day format.&lt;br /&gt;
&lt;br /&gt;
These courses are being offered to attendees of the OWASP conference at a significant discount to their standard commercial price. Most of the course fee will go to OWASP to support the OWASP Foundation's efforts.&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; width=&amp;quot;60%&amp;quot; cellpadding=&amp;quot;2&amp;quot; cellspacing=&amp;quot;5&amp;quot; style=&amp;quot;vertical-align:top;background-color:#cedff2&amp;quot;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T1&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T2&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T3&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Advanced Asp.Net Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T4&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Web Services and XML Security - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;*Note: Information corresponding to each training course is located below.&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pricing'''&lt;br /&gt;
&lt;br /&gt;
$1300 for conference attendees. [Note: This fee includes snacks, and LUNCH]&lt;br /&gt;
&lt;br /&gt;
$1450 - Tutorial only pricing (if not attending the conference)&lt;br /&gt;
&lt;br /&gt;
$675 - Student Pricing&lt;br /&gt;
&lt;br /&gt;
'''Location'''&lt;br /&gt;
&lt;br /&gt;
At eBay in San Jose. Same location as the conference.&lt;br /&gt;
&lt;br /&gt;
'''Course Times'''&lt;br /&gt;
&lt;br /&gt;
Each class begins at 9 AM and runs until 5 PM each day.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
== T1. Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful two day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T2. Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including 1) Java EE security overview, 2) all coding examples are specifically focused on Java and Java servers, and 3) the addition of 3 hands on coding labs where the students find and then fix security vulnerabilities in an application developed for the class.&lt;br /&gt;
&lt;br /&gt;
This course is a compressed version of Aspect's standard 3-day Secure Coding for Java EE course.&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful one day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
For this Java focused course, students will additionally have the opportunity to find and exploit, and then fix vulnerabilities in three different labs using Eclipse.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T3. Advanced ASP.NET Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
In this two day course you will push ASP.NET to the limit and will be shown how ASP.NET applications and environments can be exploited by skilled attackers. Advanced exploitation techniques will be presented together with low-level technical analysis of the .NET Framework. You will also learn advanced defense techniques such as: Building an ASP.NET Security Protection layer (also called a Web Application Firewall) and Real time patching of vulnerabilities in the target application, the .NET Framework or the CLR.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
The Course is made of 2 modules &lt;br /&gt;
&lt;br /&gt;
'''Module 1: Security principles and .NET Framework Architecture; Guerrilla Threat Modeling; Exploiting ASP.NET Applications'''&lt;br /&gt;
&lt;br /&gt;
* Analysis of the .NET Framework and its core components (CLR, Garbage Collector, Verifier, Security Manager)&lt;br /&gt;
* Using quick-and-dirty threat models to discover vulnerabilities in the target application&lt;br /&gt;
* Exploiting vulnerabilities in ASP.NET applications: Data Validation, Authorization, Authentication, SessionState, XSS, Cookies, AJAX, Web Services, Remoting, etc. (using basic and advanced techniques)&lt;br /&gt;
* Exploiting Buffer Overflows and Windows vulnerabilities via ASP.NET Applications&lt;br /&gt;
&lt;br /&gt;
'''Module 2: Exploiting Full Trust and Partial Trust ASP.NET Environments; Advanced ASP.NET Countermeasures'''&lt;br /&gt;
&lt;br /&gt;
* Practical demonstrations of the power of Full Trust ASP.NET:&lt;br /&gt;
* Rooting the CLR (e.g. patching the .Net Framework and CLR), Reflection, IIS Metabase, Shellcode injection, Launching internal attacks to compromise the server and the data center&lt;br /&gt;
* Full Trust non-verification and Type Safety attacks (via MSIL manipulation)&lt;br /&gt;
* Exploiting Insecure Partial Trust ASP.NET Environments&lt;br /&gt;
* Applying real-time security patches in the target application, .NET Framework and CLR&lt;br /&gt;
* Solutions to create secure Data Validation and Authorization architectures&lt;br /&gt;
* Creating secure ASP.NET hosting environments&lt;br /&gt;
* Building an ASP.NET Security Protection layer (also called Web Application Firewall);&lt;br /&gt;
&lt;br /&gt;
You will walk away from this class with a much better understanding of some of the weaknesses of .NET applications, particularly the internals of the .NET framework. You will also get the chance to put your skills to the test against a target application over the course of the class.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
A laptop with VMWare Player pre-installed. A VMWare image containing all necessary lab tools will be provided.&lt;br /&gt;
&lt;br /&gt;
'''Prerequisites'''&lt;br /&gt;
&lt;br /&gt;
This is an advanced course targeted at industry professionals who want to understand the weaknesses and the power of the .Net Framework.&lt;br /&gt;
&lt;br /&gt;
To get the most of this course and to be able to do the extensive practice material provided (using a VMWare image), the participants must:&lt;br /&gt;
&lt;br /&gt;
* Have a good understanding of a .NET Language (Ideally C#)&lt;br /&gt;
* Be familiar with MSIL/Assembly&lt;br /&gt;
* Have some experience with debugging user-land applications&lt;br /&gt;
* Have commercial experience on either application development or security auditing.&lt;br /&gt;
&lt;br /&gt;
The material is presented at a pace adjusted for experienced developers and/or security consultants.&lt;br /&gt;
&lt;br /&gt;
'''Trainer'''&lt;br /&gt;
&lt;br /&gt;
Dinis Cruz is the OWASP Evangelist, current OWASP .NET Project leader and the main developer of several of OWASP .NET tools (SAM'SHE, ANBS, SiteGenerator, PenTest Reporter, Asp.Net Reflector, Online IIS Metabase Explorer).&lt;br /&gt;
&lt;br /&gt;
Since the 1.1 release of the .NET Framework, Dinis has been one of the strongest proponents of the need to write .NET applications that can be executed in secure Partially Trusted .NET environments, and has done extensive research on: Rooting the CLR, exposing the dangers of Full Trust ASP.NET Code, Type Confusion vulnerabilities in Full Trust (i.e. non verifiable) code, creating .Net Security Protection Layers and using Reflection to dynamically manipulate .Net Client applications.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by Dinis Cruz (OWASP Chief Evangelist)&lt;br /&gt;
&lt;br /&gt;
== T4. Web Services and XML Security - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software.&lt;br /&gt;
&lt;br /&gt;
Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system!&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
Topics covered include understanding how web application risks (such as those in OWASP Guide and OWASP Top Ten) apply in a Web Services world, and Web Services security topics including:&lt;br /&gt;
&lt;br /&gt;
* Web Services attack patterns&lt;br /&gt;
* Common XML attack patterns&lt;br /&gt;
* Data and XML security using WS-Security, SAML, XML Encryption and XML Digital Signature&lt;br /&gt;
* Identity services and federation with SAML and Liberty&lt;br /&gt;
* Hardening Web Services servers&lt;br /&gt;
* Input validation for Web Services&lt;br /&gt;
* Integrating Web Services securely with backend resources and applications using WS-Trust&lt;br /&gt;
* Secure Exception handling in Web Services&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by [http://www.arctecgroup.net http://www.owasp.org/images/b/bc/Arctec_logo.jpeg]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21157</id>
		<title>7th OWASP AppSec Conference - San Jose 2007/Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21157"/>
				<updated>2007-08-27T17:02:54Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* T1. Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Conference Training Day - Two Day Training Courses - November 12th-13th, 2007 ==&lt;br /&gt;
&lt;br /&gt;
OWASP has arranged to have four 2-day Application Security training courses prior to the conference.&lt;br /&gt;
&lt;br /&gt;
The first two courses will be provided by a long time contributor to OWASP, Aspect Security. The third course is being taught by Dinis Cruz, the OWASP Evangelist and one of the longest active members at OWASP. The fourth course will be provided by another active OWASP member, the Arctec Group. All of these courses were offered in their 1-day format at the last two OWASP AppSec conferences and were well received. This is the first OWASP conference where we have been able to expand these classes to their 2-day format.&lt;br /&gt;
&lt;br /&gt;
These courses are being offered to attendees of the OWASP conference at a significant discount to their standard commercial price. Most of the course fee will go to OWASP to support the OWASP Foundation's efforts.&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; width=&amp;quot;60%&amp;quot; cellpadding=&amp;quot;2&amp;quot; cellspacing=&amp;quot;5&amp;quot; style=&amp;quot;vertical-align:top;background-color:#cedff2&amp;quot;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T1&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T2&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T3&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Advanced Asp.Net Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T4&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Web Services and XML Security - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;*Note: Information corresponding to each training course is located below.&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pricing'''&lt;br /&gt;
&lt;br /&gt;
$1300 for conference attendees. [Note: This fee includes snacks, and LUNCH]&lt;br /&gt;
&lt;br /&gt;
$1450 - Tutorial only pricing (if not attending the conference)&lt;br /&gt;
&lt;br /&gt;
$675 - Student Pricing&lt;br /&gt;
&lt;br /&gt;
'''Location'''&lt;br /&gt;
&lt;br /&gt;
At eBay in San Jose. Same location as the conference.&lt;br /&gt;
&lt;br /&gt;
'''Course Times'''&lt;br /&gt;
&lt;br /&gt;
Each class begins at 9 AM and runs until 5 PM each day.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
== T1. Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful two day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T2. Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including 1) Java EE security overview, 2) all coding examples are specifically focused on Java and Java servers, and 3) the addition of 3 hands on coding labs where the students find and then fix security vulnerabilities in an application developed for the class.&lt;br /&gt;
&lt;br /&gt;
This course is a compressed version of Aspect's standard 3-day Secure Coding for Java EE course.&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful one day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
For this Java focused course, students will additionally have the opportunity to find and exploit, and then fix vulnerabilities in three different labs using Eclipse.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T3. Advanced ASP.NET Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
In this two day course you will push ASP.NET to the limit and will be shown how ASP.NET applications and environments can be exploited by skilled attackers. Advanced exploitation techniques will be presented together with low-level technical analysis of the .NET Framework. You will also learn advanced defense techniques such as: Building an ASP.NET Security Protection layer (also called a Web Application Firewall) and Real time patching of vulnerabilities in the target application, the .NET Framework or the CLR.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
The Course is made of 2 modules &lt;br /&gt;
&lt;br /&gt;
'''Module 1: Security principles and .NET Framework Architecture; Guerrilla Threat Modeling; Exploiting ASP.NET Applications'''&lt;br /&gt;
&lt;br /&gt;
* Analysis of the .NET Framework and its core components (CLR, Garbage Collector, Verifier, Security Manager)&lt;br /&gt;
* Using quick-and-dirty threat models to discover vulnerabilities in the target application&lt;br /&gt;
* Exploiting vulnerabilities in ASP.NET applications: Data Validation, Authorization, Authentication, SessionState, XSS, Cookies, AJAX, Web Services, Remoting, etc. (using basic and advanced techniques)&lt;br /&gt;
* Exploiting Buffer Overflows and Windows vulnerabilities via ASP.NET Applications&lt;br /&gt;
&lt;br /&gt;
'''Module 2: Exploiting Full Trust and Partial Trust ASP.NET Environments; Advanced ASP.NET Countermeasures'''&lt;br /&gt;
&lt;br /&gt;
* Practical demonstrations of the power of Full Trust ASP.NET:&lt;br /&gt;
* Rooting the CLR (e.g. patching the .Net Framework and CLR), Reflection, IIS Metabase, Shellcode injection, Launching internal attacks to compromise the server and the data center&lt;br /&gt;
* Full Trust non-verification and Type Safety attacks (via MSIL manipulation)&lt;br /&gt;
* Exploiting Insecure Partial Trust ASP.NET Environments&lt;br /&gt;
* Applying real-time security patches in the target application, .NET Framework and CLR&lt;br /&gt;
* Solutions to create secure Data Validation and Authorization architectures&lt;br /&gt;
* Creating secure ASP.NET hosting environments&lt;br /&gt;
* Building an ASP.NET Security Protection layer (also called Web Application Firewall);&lt;br /&gt;
&lt;br /&gt;
You will walk away from this class with a much better understanding of some of the weaknesses of .NET applications, particularly the internals of the .NET framework. You will also get the chance to put your skills to the test against a target application over the course of the class.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
A laptop with VMWare Player pre-installed. A VMWare image containing all necessary lab tools will be provided.&lt;br /&gt;
&lt;br /&gt;
'''Prerequisites'''&lt;br /&gt;
&lt;br /&gt;
This is an advanced course targeted at industry professionals who want to understand the weaknesses and the power of the .Net Framework.&lt;br /&gt;
&lt;br /&gt;
To get the most of this course and to be able to do the extensive practice material provided (using a VMWare image), the participants must:&lt;br /&gt;
&lt;br /&gt;
* Have a good understanding of a .NET Language (Ideally C#)&lt;br /&gt;
* Be familiar with MSIL/Assembly&lt;br /&gt;
* Have some experience with debugging user-land applications&lt;br /&gt;
* Have commercial experience on either application development or security auditing.&lt;br /&gt;
&lt;br /&gt;
The material is presented at a pace adjusted for experienced developers and/or security consultants.&lt;br /&gt;
&lt;br /&gt;
'''Trainer'''&lt;br /&gt;
&lt;br /&gt;
Dinis Cruz is the OWASP Evangelist, current OWASP .NET Project leader and the main developer of several of OWASP .NET tools (SAM'SHE, ANBS, SiteGenerator, PenTest Reporter, Asp.Net Reflector, Online IIS Metabase Explorer).&lt;br /&gt;
&lt;br /&gt;
Since the 1.1 release of the .NET Framework, Dinis has been one of the strongest proponents of the need to write .NET applications that can be executed in secure Partially Trusted .NET environments, and has done extensive research on: Rooting the CLR, exposing the dangers of Full Trust ASP.NET Code, Type Confusion vulnerabilities in Full Trust (i.e. non verifiable) code, creating .Net Security Protection Layers and using Reflection to dynamically manipulate .Net Client applications.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by Dinis Cruz (OWASP Chief Evangelist)&lt;br /&gt;
&lt;br /&gt;
== T4. Web Services and XML Security - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software.&lt;br /&gt;
&lt;br /&gt;
Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system!&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
Topics covered include understanding how web application risks (such as those in OWASP Guide and OWASP Top Ten) apply in a Web Services world, and Web Services security topics including:&lt;br /&gt;
&lt;br /&gt;
* Web Services attack patterns&lt;br /&gt;
* Common XML attack patterns&lt;br /&gt;
* Data and XML security using WS-Security, SAML, XML Encryption and XML Digital Signature&lt;br /&gt;
* Identity services and federation with SAML and Liberty&lt;br /&gt;
* Hardening Web Services servers&lt;br /&gt;
* Input validation for Web Services&lt;br /&gt;
* Integrating Web Services securely with backend resources and applications using WS-Trust&lt;br /&gt;
* Secure Exception handling in Web Services&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by [http://www.arctecgroup.net http://www.owasp.org/images/b/bc/Arctec_logo.jpeg]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21156</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21156"/>
				<updated>2007-08-27T17:00:24Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Registration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;We are still in the planning stages for the next OWASP U.S. conference, eBay in San Jose, CA Nov 12-15, 2007.&lt;br /&gt;
&lt;br /&gt;
Web Services Track: The conference will have 3 tracks on the first day instead of 2. The 3rd track will be focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
Application Security Technology Expo: This conference will also have a technology expo for the first time. Application Security product vendors will be able to demonstrate the technical capabilities of their products in the technology expo area. More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
&lt;br /&gt;
This year's US OWASP conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: Novermber 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
Main Conference: November 14th-15th&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda agenda] will follow the (current) standard OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days. In addition, on the first day, there will be a third track focused on Web Services Security.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP contributors and leading Application Security professionals, and will include one panel each day.&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec San Jose 2007 agenda is still being developed.&lt;br /&gt;
&lt;br /&gt;
==Training: Monday-Tuesday - Nov 12th-13th== &lt;br /&gt;
&lt;br /&gt;
OWASP has arranged for a suite of two day Application Security training courses to be offered prior to the conference. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Advanced_Asp.Net_Exploits_and_Countermeasures_-_2-Day_Course_-_Nov_12-13.2C_2007 | Advanced Asp.Net Exploits and Countermeasures]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
==[http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd Registration]==&lt;br /&gt;
&lt;br /&gt;
Here is the [http://guest.cvent.com/i.aspx?4W,M3,17e6e912-2dec-4de6-8946-aa005721c4dd registration page].&lt;br /&gt;
&lt;br /&gt;
==Hotel and Transportation Info==&lt;br /&gt;
&lt;br /&gt;
OWASP is currently negotiating rates with local hotels&lt;br /&gt;
&lt;br /&gt;
From San Jose International Airport (SJC):&lt;br /&gt;
eBay is located about a mile from this airport&lt;br /&gt;
&lt;br /&gt;
From San Francisco International Airport (SFO):&lt;br /&gt;
eBay is located 40 miles from this airport&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be &lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21155</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21155"/>
				<updated>2007-08-27T16:55:37Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;We are still in the planning stages for the next OWASP U.S. conference, eBay in San Jose, CA Nov 12-15, 2007.&lt;br /&gt;
&lt;br /&gt;
Web Services Track: The conference will have 3 tracks on the first day instead of 2. The 3rd track will be focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
Application Security Technology Expo: This conference will also have a technology expo for the first time. Application Security product vendors will be able to demonstrate the technical capabilities of their products in the technology expo area. More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
&lt;br /&gt;
This year's US OWASP conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: Novermber 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
Main Conference: November 14th-15th&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda agenda] will follow the (current) standard OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days. In addition, on the first day, there will be a third track focused on Web Services Security.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP contributors and leading Application Security professionals, and will include one panel each day.&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec San Jose 2007 agenda is still being developed.&lt;br /&gt;
&lt;br /&gt;
==Training: Monday-Tuesday - Nov 12th-13th== &lt;br /&gt;
&lt;br /&gt;
OWASP has arranged for a suite of two day Application Security training courses to be offered prior to the conference. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Advanced_Asp.Net_Exploits_and_Countermeasures_-_2-Day_Course_-_Nov_12-13.2C_2007 | Advanced Asp.Net Exploits and Countermeasures]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
==Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Hotel and Transportation Info==&lt;br /&gt;
&lt;br /&gt;
OWASP is currently negotiating rates with local hotels&lt;br /&gt;
&lt;br /&gt;
From San Jose International Airport (SJC):&lt;br /&gt;
eBay is located about a mile from this airport&lt;br /&gt;
&lt;br /&gt;
From San Francisco International Airport (SFO):&lt;br /&gt;
eBay is located 40 miles from this airport&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be &lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21094</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21094"/>
				<updated>2007-08-24T15:45:05Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;We are still in the planning stages for the next OWASP U.S. conference, eBay in San Jose, CA Nov 12-15, 2007.&lt;br /&gt;
&lt;br /&gt;
Web Services Track: The conference will have 3 tracks on the first day instead of 2. The 3rd track will be focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
Application Security Vendor Expo: This conference will also have a vendor expo for the first time Application Security product vendors can demonstrate the technical capabilities of their products. More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
&lt;br /&gt;
This year's US OWASP conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: Novermber 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
Main Conference: November 14th-15th&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda agenda] will follow the (current) standard OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days. In addition, on the first day, there will be a third track focused on Web Services Security.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP contributors and leading Application Security professionals, and will include one panel each day.&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec San Jose 2007 agenda is still being developed.&lt;br /&gt;
&lt;br /&gt;
==Training: Monday-Tuesday - Nov 12th-13th== &lt;br /&gt;
&lt;br /&gt;
OWASP has arranged for a suite of two day Application Security training courses to be offered prior to the conference. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Advanced_Asp.Net_Exploits_and_Countermeasures_-_2-Day_Course_-_Nov_12-13.2C_2007 | Advanced Asp.Net Exploits and Countermeasures]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
==Hotel and Transportation Info==&lt;br /&gt;
&lt;br /&gt;
OWASP is currently negotiating rates with local hotels&lt;br /&gt;
&lt;br /&gt;
From San Jose International Airport (SJC):&lt;br /&gt;
eBay is located about a mile from this airport&lt;br /&gt;
&lt;br /&gt;
From San Francisco International Airport (SFO):&lt;br /&gt;
eBay is located 40 miles from this airport&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be &lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Conference_Sponsors&amp;diff=21093</id>
		<title>OWASP AppSec Conference Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Conference_Sponsors&amp;diff=21093"/>
				<updated>2007-08-24T15:19:37Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* OWASP Conference Sponsorship */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Conference Sponsorship ==&lt;br /&gt;
&lt;br /&gt;
OWASP is accepting sponsorships for the 2007 OWASP Conferences. Financial sponsorship for a conference will help defray the non-profit OWASP Foundation's expenses to prepare for and hold this conference.&lt;br /&gt;
&lt;br /&gt;
The following is our current sponsorship plan:&lt;br /&gt;
&lt;br /&gt;
* Sponsor information will be presented on the main conference page&lt;br /&gt;
&lt;br /&gt;
* A Sponsor information sheet will be included in handouts to all attendees&lt;br /&gt;
&lt;br /&gt;
* Sponsors can include a poster (no larger than 6 ft. x 4 ft.) at the conference in the main hallway&lt;br /&gt;
&lt;br /&gt;
* Includes 2 Free admissions to the conference&lt;br /&gt;
&lt;br /&gt;
The sponsorship fee for 7th OWASP Conference in San Jose, CA in November 2007 is $4250.&lt;br /&gt;
&lt;br /&gt;
Note: We are also working on pulling together vendor booths for application security product vendors to exhibit at the San Jose conference. We have not figured out these details or pricing but in the mean time, if you are interested in exhibiting, please let us know.&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
== Sending Materials to Conference Facility in San Jose ==&lt;br /&gt;
&lt;br /&gt;
Sponsors, please ship your conference materials to:&lt;br /&gt;
&lt;br /&gt;
Location TBD.&lt;br /&gt;
&lt;br /&gt;
All materials must arrive no earlier than date TBD.&lt;br /&gt;
&lt;br /&gt;
== Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The following are the sponsors for the 7th OWASP AppSec Conference.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Conference_Sponsors&amp;diff=21092</id>
		<title>OWASP AppSec Conference Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Conference_Sponsors&amp;diff=21092"/>
				<updated>2007-08-24T15:17:30Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Conference Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Conference Sponsorship ==&lt;br /&gt;
&lt;br /&gt;
OWASP is accepting sponsorships for the 2007 OWASP Conferences. Financial sponsorship for a conference will help defray the non-profit OWASP Foundation's expenses to prepare for and hold this conference.&lt;br /&gt;
&lt;br /&gt;
The following is our current sponsorship plan:&lt;br /&gt;
&lt;br /&gt;
* Sponsor information will be presented on the main conference page&lt;br /&gt;
&lt;br /&gt;
* A Sponsor information sheet will be included in handouts to all attendees&lt;br /&gt;
&lt;br /&gt;
* Sponsors can include a poster (no larger than 6 ft. x 4 ft.) at the conference in the main hallway&lt;br /&gt;
&lt;br /&gt;
* Includes 2 Free admissions to the conference&lt;br /&gt;
&lt;br /&gt;
The sponsorship fee for 7th OWASP Conference in San Jose, CA in October 2007 is $4250.&lt;br /&gt;
&lt;br /&gt;
Note: We are also working on pulling together vendor booths for application security product vendors to exhibit at the San Jose conference. We have not figured out these details or pricing but in the mean time, if you are interested in exhibiting, please let us know.&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
== Sending Materials to Conference Facility in San Jose ==&lt;br /&gt;
&lt;br /&gt;
Sponsors, please ship your conference materials to:&lt;br /&gt;
&lt;br /&gt;
Location TBD.&lt;br /&gt;
&lt;br /&gt;
All materials must arrive no earlier than date TBD.&lt;br /&gt;
&lt;br /&gt;
== Conference Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The following are the sponsors for the 7th OWASP AppSec Conference.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21091</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21091"/>
				<updated>2007-08-24T15:16:47Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Agenda and Presentations - Nov 14th-15th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;We are still in the planning stages for the next OWASP U.S. conference, eBay in San Jose, CA Nov 12-15, 2007.&lt;br /&gt;
&lt;br /&gt;
Web Services Track: The conference will have 3 tracks on the first day instead of 2. The 3rd track will be focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
Application Security Vendor Expo: This conference will also have a vendor expo for the first time Application Security product vendors can demonstrate the technical capabilities of their products. More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
&lt;br /&gt;
This year's US OWASP conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: Novermber 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
Main Conference: November 14th-15th&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: Wednesday-Thursday - Nov 14th-15th==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda agenda] will follow the (current) standard OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days. In addition, on the first day, there will be a third track focused on Web Services Security.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP contributors and leading Application Security professionals, and will include one panel each day.&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec San Jose 2007 agenda is still being developed.&lt;br /&gt;
&lt;br /&gt;
==Training: Monday-Tuesday - Nov 12th-13th== &lt;br /&gt;
&lt;br /&gt;
OWASP has arranged for a suite of two day Application Security training courses to be offered prior to the conference. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Advanced_Asp.Net_Exploits_and_Countermeasures_-_2-Day_Course_-_Nov_12-13.2C_2007 | Advanced Asp.Net Exploits and Countermeasures]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be &lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21090</id>
		<title>7th OWASP AppSec Conference - San Jose 2007/Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21090"/>
				<updated>2007-08-24T15:14:14Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* T3. Advanced ASP.NET Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Conference Training Day - Two Day Training Courses - November 12th-13th, 2007 ==&lt;br /&gt;
&lt;br /&gt;
OWASP has arranged to have four 2-day Application Security training courses prior to the conference.&lt;br /&gt;
&lt;br /&gt;
The first two courses will be provided by a long time contributor to OWASP, Aspect Security. The third course is being taught by Dinis Cruz, the OWASP Evangelist and one of the longest active members at OWASP. The fourth course will be provided by another active OWASP member, the Arctec Group. All of these courses were offered in their 1-day format at the last two OWASP AppSec conferences and were well received. This is the first OWASP conference where we have been able to expand these classes to their 2-day format.&lt;br /&gt;
&lt;br /&gt;
These courses are being offered to attendees of the OWASP conference at a significant discount to their standard commercial price. Most of the course fee will go to OWASP to support the OWASP Foundation's efforts.&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; width=&amp;quot;60%&amp;quot; cellpadding=&amp;quot;2&amp;quot; cellspacing=&amp;quot;5&amp;quot; style=&amp;quot;vertical-align:top;background-color:#cedff2&amp;quot;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T1&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T2&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T3&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Advanced Asp.Net Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T4&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Web Services and XML Security - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;*Note: Information corresponding to each training course is located below.&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pricing'''&lt;br /&gt;
&lt;br /&gt;
$1300 for conference attendees. [Note: This fee includes snacks, and LUNCH]&lt;br /&gt;
&lt;br /&gt;
$1450 - Tutorial only pricing (if not attending the conference)&lt;br /&gt;
&lt;br /&gt;
$675 - Student Pricing&lt;br /&gt;
&lt;br /&gt;
'''Location'''&lt;br /&gt;
&lt;br /&gt;
At eBay in San Jose. Same location as the conference.&lt;br /&gt;
&lt;br /&gt;
'''Course Times'''&lt;br /&gt;
&lt;br /&gt;
Each class begins at 9 AM and runs until 5 PM each day.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
== T1. Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful two day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T2. Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including 1) Java EE security overview, 2) all coding examples are specifically focused on Java and Java servers, and 3) the addition of 3 hands on coding labs where the students find and then fix security vulnerabilities in an application developed for the class.&lt;br /&gt;
&lt;br /&gt;
This course is a compressed version of Aspect's standard 3-day Secure Coding for Java EE course.&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful one day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
For this Java focused course, students will additionally have the opportunity to find and exploit, and then fix vulnerabilities in three different labs using Eclipse.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T3. Advanced ASP.NET Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
In this two day course you will push ASP.NET to the limit and will be shown how ASP.NET applications and environments can be exploited by skilled attackers. Advanced exploitation techniques will be presented together with low-level technical analysis of the .NET Framework. You will also learn advanced defense techniques such as: Building an ASP.NET Security Protection layer (also called a Web Application Firewall) and Real time patching of vulnerabilities in the target application, the .NET Framework or the CLR.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
The Course is made of 2 modules &lt;br /&gt;
&lt;br /&gt;
'''Module 1: Security principles and .NET Framework Architecture; Guerrilla Threat Modeling; Exploiting ASP.NET Applications'''&lt;br /&gt;
&lt;br /&gt;
* Analysis of the .NET Framework and its core components (CLR, Garbage Collector, Verifier, Security Manager)&lt;br /&gt;
* Using quick-and-dirty threat models to discover vulnerabilities in the target application&lt;br /&gt;
* Exploiting vulnerabilities in ASP.NET applications: Data Validation, Authorization, Authentication, SessionState, XSS, Cookies, AJAX, Web Services, Remoting, etc. (using basic and advanced techniques)&lt;br /&gt;
* Exploiting Buffer Overflows and Windows vulnerabilities via ASP.NET Applications&lt;br /&gt;
&lt;br /&gt;
'''Module 2: Exploiting Full Trust and Partial Trust ASP.NET Environments; Advanced ASP.NET Countermeasures'''&lt;br /&gt;
&lt;br /&gt;
* Practical demonstrations of the power of Full Trust ASP.NET:&lt;br /&gt;
* Rooting the CLR (e.g. patching the .Net Framework and CLR), Reflection, IIS Metabase, Shellcode injection, Launching internal attacks to compromise the server and the data center&lt;br /&gt;
* Full Trust non-verification and Type Safety attacks (via MSIL manipulation)&lt;br /&gt;
* Exploiting Insecure Partial Trust ASP.NET Environments&lt;br /&gt;
* Applying real-time security patches in the target application, .NET Framework and CLR&lt;br /&gt;
* Solutions to create secure Data Validation and Authorization architectures&lt;br /&gt;
* Creating secure ASP.NET hosting environments&lt;br /&gt;
* Building an ASP.NET Security Protection layer (also called Web Application Firewall);&lt;br /&gt;
&lt;br /&gt;
You will walk away from this class with a much better understanding of some of the weaknesses of .NET applications, particularly the internals of the .NET framework. You will also get the chance to put your skills to the test against a target application over the course of the class.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
A laptop with VMWare Player pre-installed. A VMWare image containing all necessary lab tools will be provided.&lt;br /&gt;
&lt;br /&gt;
'''Prerequisites'''&lt;br /&gt;
&lt;br /&gt;
This is an advanced course targeted at industry professionals who want to understand the weaknesses and the power of the .Net Framework.&lt;br /&gt;
&lt;br /&gt;
To get the most of this course and to be able to do the extensive practice material provided (using a VMWare image), the participants must:&lt;br /&gt;
&lt;br /&gt;
* Have a good understanding of a .NET Language (Ideally C#)&lt;br /&gt;
* Be familiar with MSIL/Assembly&lt;br /&gt;
* Have some experience with debugging user-land applications&lt;br /&gt;
* Have commercial experience on either application development or security auditing.&lt;br /&gt;
&lt;br /&gt;
The material is presented at a pace adjusted for experienced developers and/or security consultants.&lt;br /&gt;
&lt;br /&gt;
'''Trainer'''&lt;br /&gt;
&lt;br /&gt;
Dinis Cruz is the OWASP Evangelist, current OWASP .NET Project leader and the main developer of several of OWASP .NET tools (SAM'SHE, ANBS, SiteGenerator, PenTest Reporter, Asp.Net Reflector, Online IIS Metabase Explorer).&lt;br /&gt;
&lt;br /&gt;
Since the 1.1 release of the .NET Framework, Dinis has been one of the strongest proponents of the need to write .NET applications that can be executed in secure Partially Trusted .NET environments, and has done extensive research on: Rooting the CLR, exposing the dangers of Full Trust ASP.NET Code, Type Confusion vulnerabilities in Full Trust (i.e. non verifiable) code, creating .Net Security Protection Layers and using Reflection to dynamically manipulate .Net Client applications.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by Dinis Cruz (OWASP Chief Evangelist)&lt;br /&gt;
&lt;br /&gt;
== T4. Web Services and XML Security - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software.&lt;br /&gt;
&lt;br /&gt;
Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system!&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
Topics covered include understanding how web application risks (such as those in OWASP Guide and OWASP Top Ten) apply in a Web Services world, and Web Services security topics including:&lt;br /&gt;
&lt;br /&gt;
* Web Services attack patterns&lt;br /&gt;
* Common XML attack patterns&lt;br /&gt;
* Data and XML security using WS-Security, SAML, XML Encryption and XML Digital Signature&lt;br /&gt;
* Identity services and federation with SAML and Liberty&lt;br /&gt;
* Hardening Web Services servers&lt;br /&gt;
* Input validation for Web Services&lt;br /&gt;
* Integrating Web Services securely with backend resources and applications using WS-Trust&lt;br /&gt;
* Secure Exception handling in Web Services&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by [http://www.arctecgroup.net http://www.owasp.org/images/b/bc/Arctec_logo.jpeg]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21089</id>
		<title>7th OWASP AppSec Conference - San Jose 2007/Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training&amp;diff=21089"/>
				<updated>2007-08-24T15:12:09Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* T1. Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Conference Training Day - Two Day Training Courses - November 12th-13th, 2007 ==&lt;br /&gt;
&lt;br /&gt;
OWASP has arranged to have four 2-day Application Security training courses prior to the conference.&lt;br /&gt;
&lt;br /&gt;
The first two courses will be provided by a long time contributor to OWASP, Aspect Security. The third course is being taught by Dinis Cruz, the OWASP Evangelist and one of the longest active members at OWASP. The fourth course will be provided by another active OWASP member, the Arctec Group. All of these courses were offered in their 1-day format at the last two OWASP AppSec conferences and were well received. This is the first OWASP conference where we have been able to expand these classes to their 2-day format.&lt;br /&gt;
&lt;br /&gt;
These courses are being offered to attendees of the OWASP conference at a significant discount to their standard commercial price. Most of the course fee will go to OWASP to support the OWASP Foundation's efforts.&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot; width=&amp;quot;60%&amp;quot; cellpadding=&amp;quot;2&amp;quot; cellspacing=&amp;quot;5&amp;quot; style=&amp;quot;vertical-align:top;background-color:#cedff2&amp;quot;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T1&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T2&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T3&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Advanced Asp.Net Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;T4&amp;lt;/div&amp;gt;&lt;br /&gt;
! &amp;lt;div style=&amp;quot;margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;&amp;quot;&amp;gt;Web Services and XML Security - 2-Day Course - Nov 12-13, 2007&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;*Note: Information corresponding to each training course is located below.&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pricing'''&lt;br /&gt;
&lt;br /&gt;
$1300 for conference attendees. [Note: This fee includes snacks, and LUNCH]&lt;br /&gt;
&lt;br /&gt;
$1450 - Tutorial only pricing (if not attending the conference)&lt;br /&gt;
&lt;br /&gt;
$675 - Student Pricing&lt;br /&gt;
&lt;br /&gt;
'''Location'''&lt;br /&gt;
&lt;br /&gt;
At eBay in San Jose. Same location as the conference.&lt;br /&gt;
&lt;br /&gt;
'''Course Times'''&lt;br /&gt;
&lt;br /&gt;
Each class begins at 9 AM and runs until 5 PM each day.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
== T1. Building and Testing Secure Web Applications - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful two day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T2. Secure Coding for Java EE - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including 1) Java EE security overview, 2) all coding examples are specifically focused on Java and Java servers, and 3) the addition of 3 hands on coding labs where the students find and then fix security vulnerabilities in an application developed for the class.&lt;br /&gt;
&lt;br /&gt;
This course is a compressed version of Aspect's standard 3-day Secure Coding for Java EE course.&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts.&lt;br /&gt;
&lt;br /&gt;
This powerful one day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
This course starts with a module designed to raise awareness of just how insecure most web applications are. We demonstrate how easily hackers are able to attack web applications, and what some of the most common and most significant vulnerabilities are. The course then provides an overview of how web applications work from a security perspective.&lt;br /&gt;
&lt;br /&gt;
The next modules detail a number of specific security areas. We describe common vulnerabilities, present best practices, and discuss recommended approaches for avoiding such vulnerabilities. This course includes coverage of the following common vulnerability areas:&lt;br /&gt;
&lt;br /&gt;
* Unvalidated Parameters *&lt;br /&gt;
* Broken Access Control *&lt;br /&gt;
* Broken Account and Session Management *&lt;br /&gt;
* Cross-Site Scripting (XSS) Flaws *&lt;br /&gt;
* Buffer Overflows *&lt;br /&gt;
* Command Injection Flaws *&lt;br /&gt;
* Error Handling Problems *&lt;br /&gt;
* Insecure Use of Cryptography *&lt;br /&gt;
* Denial of Service *&lt;br /&gt;
* Web and Application Server Misconfiguration *&lt;br /&gt;
* Poor Logging Practices&lt;br /&gt;
* Caching, Pooling, and Reuse Errors&lt;br /&gt;
* Code Quality&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; The OWASP Top Ten Most Critical Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
For each area, the course covers the following:&lt;br /&gt;
&lt;br /&gt;
* Theoretical foundations&lt;br /&gt;
* Recommended security policies&lt;br /&gt;
* Common pitfalls when implementing&lt;br /&gt;
* Details on historical exploits&lt;br /&gt;
* Best practices for implementation&lt;br /&gt;
&lt;br /&gt;
'''Hands on Exercises'''&lt;br /&gt;
&lt;br /&gt;
To cement the principles delivered via the lecture portion of the course, students can participate in a number of hands-on security testing exercises. During the hands-on exercises students will attack a live web application (i.e., WebGoat) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises.&lt;br /&gt;
&lt;br /&gt;
For this Java focused course, students will additionally have the opportunity to find and exploit, and then fix vulnerabilities in three different labs using Eclipse.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
If you are interested in participating in the hands on portion of the course, please bring a Windows based laptop that supports Java.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by longtime OWASP contributor: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
== T3. Advanced ASP.NET Exploits and Countermeasures - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
In this one day course you will push ASP.NET to the limit and will be shown how ASP.NET applications and environments can be exploited by skilled attackers. Advanced exploitation techniques will be presented together with low-level technical analysis of the .NET Framework. You will also learn advanced defense techniques such as: Building an ASP.NET Security Protection layer (also called a Web Application Firewall) and Real time patching of vulnerabilities in the target application, the .NET Framework or the CLR.&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
The Course is made of 2 modules (one in the morning and one in the afternoon)&lt;br /&gt;
&lt;br /&gt;
'''Module 1: Security principles and .NET Framework Architecture; Guerrilla Threat Modeling; Exploiting ASP.NET Applications'''&lt;br /&gt;
&lt;br /&gt;
* Analysis of the .NET Framework and its core components (CLR, Garbage Collector, Verifier, Security Manager)&lt;br /&gt;
* Using quick-and-dirty threat models to discover vulnerabilities in the target application&lt;br /&gt;
* Exploiting vulnerabilities in ASP.NET applications: Data Validation, Authorization, Authentication, SessionState, XSS, Cookies, AJAX, Web Services, Remoting, etc. (using basic and advanced techniques)&lt;br /&gt;
* Exploiting Buffer Overflows and Windows vulnerabilities via ASP.NET Applications&lt;br /&gt;
&lt;br /&gt;
'''Module 2: Exploiting Full Trust and Partial Trust ASP.NET Environments; Advanced ASP.NET Countermeasures'''&lt;br /&gt;
&lt;br /&gt;
* Practical demonstrations of the power of Full Trust ASP.NET:&lt;br /&gt;
* Rooting the CLR (e.g. patching the .Net Framework and CLR), Reflection, IIS Metabase, Shellcode injection, Launching internal attacks to compromise the server and the data center&lt;br /&gt;
* Full Trust non-verification and Type Safety attacks (via MSIL manipulation)&lt;br /&gt;
* Exploiting Insecure Partial Trust ASP.NET Environments&lt;br /&gt;
* Applying real-time security patches in the target application, .NET Framework and CLR&lt;br /&gt;
* Solutions to create secure Data Validation and Authorization architectures&lt;br /&gt;
* Creating secure ASP.NET hosting environments&lt;br /&gt;
* Building an ASP.NET Security Protection layer (also called Web Application Firewall);&lt;br /&gt;
&lt;br /&gt;
You will walk away from this class with a much better understanding of some of the weaknesses of .NET applications, particularly the internals of the .NET framework. You will also get the chance to put your skills to the test against a target application over the course of the class.&lt;br /&gt;
&lt;br /&gt;
'''Requirements'''&lt;br /&gt;
&lt;br /&gt;
A laptop with VMWare Player pre-installed. A VMWare image containing all necessary lab tools will be provided.&lt;br /&gt;
&lt;br /&gt;
'''Prerequisites'''&lt;br /&gt;
&lt;br /&gt;
This is an advanced course targeted at industry professionals who want to understand the weaknesses and the power of the .Net Framework.&lt;br /&gt;
&lt;br /&gt;
To get the most of this course and to be able to do the extensive practice material provided (using a VMWare image), the participants must:&lt;br /&gt;
&lt;br /&gt;
* Have a good understanding of a .NET Language (Ideally C#)&lt;br /&gt;
* Be familiar with MSIL/Assembly&lt;br /&gt;
* Have some experience with debugging user-land applications&lt;br /&gt;
* Have commercial experience on either application development or security auditing.&lt;br /&gt;
&lt;br /&gt;
The material is presented at a pace adjusted for experienced developers and/or security consultants.&lt;br /&gt;
&lt;br /&gt;
'''Trainer'''&lt;br /&gt;
&lt;br /&gt;
Dinis Cruz is the OWASP Evangelist, current OWASP .NET Project leader and the main developer of several of OWASP .NET tools (SAM'SHE, ANBS, SiteGenerator, PenTest Reporter, Asp.Net Reflector, Online IIS Metabase Explorer).&lt;br /&gt;
&lt;br /&gt;
Since the 1.1 release of the .NET Framework, Dinis has been one of the strongest proponents of the need to write .NET applications that can be executed in secure Partially Trusted .NET environments, and has done extensive research on: Rooting the CLR, exposing the dangers of Full Trust ASP.NET Code, Type Confusion vulnerabilities in Full Trust (i.e. non verifiable) code, creating .Net Security Protection Layers and using Reflection to dynamically manipulate .Net Client applications.&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by Dinis Cruz (OWASP Chief Evangelist)&lt;br /&gt;
&lt;br /&gt;
== T4. Web Services and XML Security - 2-Day Course - Nov 12-13, 2007 ==&lt;br /&gt;
&lt;br /&gt;
'''Course Overview'''&lt;br /&gt;
&lt;br /&gt;
The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software.&lt;br /&gt;
&lt;br /&gt;
Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system!&lt;br /&gt;
&lt;br /&gt;
'''Details'''&lt;br /&gt;
&lt;br /&gt;
Topics covered include understanding how web application risks (such as those in OWASP Guide and OWASP Top Ten) apply in a Web Services world, and Web Services security topics including:&lt;br /&gt;
&lt;br /&gt;
* Web Services attack patterns&lt;br /&gt;
* Common XML attack patterns&lt;br /&gt;
* Data and XML security using WS-Security, SAML, XML Encryption and XML Digital Signature&lt;br /&gt;
* Identity services and federation with SAML and Liberty&lt;br /&gt;
* Hardening Web Services servers&lt;br /&gt;
* Input validation for Web Services&lt;br /&gt;
* Integrating Web Services securely with backend resources and applications using WS-Trust&lt;br /&gt;
* Secure Exception handling in Web Services&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Registration will be available via the OWASP Conference Cvent site.&lt;br /&gt;
&lt;br /&gt;
'''Tutorial Provider'''&lt;br /&gt;
&lt;br /&gt;
This tutorial is provided by [http://www.arctecgroup.net http://www.owasp.org/images/b/bc/Arctec_logo.jpeg]&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21088</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21088"/>
				<updated>2007-08-24T15:11:15Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Agenda and Presentations - November 14th-15th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;We are still in the planning stages for the next OWASP U.S. conference, eBay in San Jose, CA Nov 12-15, 2007.&lt;br /&gt;
&lt;br /&gt;
Web Services Track: The conference will have 3 tracks on the first day instead of 2. The 3rd track will be focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
Application Security Vendor Expo: This conference will also have a vendor expo for the first time Application Security product vendors can demonstrate the technical capabilities of their products. More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
&lt;br /&gt;
This year's US OWASP conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: Novermber 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
Main Conference: November 14th-15th&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations - Nov 14th-15th==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda agenda] will follow the (current) standard OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days. In addition, on the first day, there will be a third track focused on Web Services Security.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP contributors and leading Application Security professionals, and will include one panel each day.&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec San Jose 2007 agenda is still being developed.&lt;br /&gt;
&lt;br /&gt;
==Training: Monday-Tuesday - Nov 12th-13th== &lt;br /&gt;
&lt;br /&gt;
OWASP has arranged for a suite of two day Application Security training courses to be offered prior to the conference. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Advanced_Asp.Net_Exploits_and_Countermeasures_-_2-Day_Course_-_Nov_12-13.2C_2007 | Advanced Asp.Net Exploits and Countermeasures]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be &lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21087</id>
		<title>OWASP &amp; WASC AppSec 2007 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_%26_WASC_AppSec_2007_Conference&amp;diff=21087"/>
				<updated>2007-08-24T15:10:48Z</updated>
		
		<summary type="html">&lt;p&gt;Aspectmichelle: /* Agenda and Presentations - Oct 17th-18th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;We are still in the planning stages for the next OWASP U.S. conference, eBay in San Jose, CA Nov 12-15, 2007.&lt;br /&gt;
&lt;br /&gt;
Web Services Track: The conference will have 3 tracks on the first day instead of 2. The 3rd track will be focused on Web Services Security which is a new area for OWASP. If you are interested in speaking at this conference on a Web Services Security topic, please contact Gunnar Peterson, who is organizing that track.&lt;br /&gt;
&lt;br /&gt;
Application Security Vendor Expo: This conference will also have a vendor expo for the first time Application Security product vendors can demonstrate the technical capabilities of their products. More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
&lt;br /&gt;
This year's US OWASP conference will be held at eBay at their facility at: 2211 North First Street in San Jose, CA Nov 12th-15th.&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training | Training Days: Novermber 12th-13th]]&lt;br /&gt;
&lt;br /&gt;
Main Conference: November 14th-15th&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations - November 14th-15th==&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda agenda] will follow the (current) standard OWASP conference format of two tracks, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing presentations back in the main auditorium both days. In addition, on the first day, there will be a third track focused on Web Services Security.&lt;br /&gt;
&lt;br /&gt;
This conference will include presentations from many different OWASP contributors and leading Application Security professionals, and will include one panel each day.&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec San Jose 2007 agenda is still being developed.&lt;br /&gt;
&lt;br /&gt;
==Training: Monday-Tuesday - Nov 12th-13th== &lt;br /&gt;
&lt;br /&gt;
OWASP has arranged for a suite of two day Application Security training courses to be offered prior to the conference. The tutorials being offered are:&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Building and Testing Secure Web Applications]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Secure Coding for Java EE]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Advanced_Asp.Net_Exploits_and_Countermeasures_-_2-Day_Course_-_Nov_12-13.2C_2007 | Advanced Asp.Net Exploits and Countermeasures]]&lt;br /&gt;
&lt;br /&gt;
[[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Web Services and XML Security]]&lt;br /&gt;
&lt;br /&gt;
==Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Standard: $400, OWASP Members: $350, Students: $225, Early Registration Discount (by Oct 12): $50 ($25 for students)&lt;br /&gt;
&lt;br /&gt;
Conference Dinner (Evening of Nov 14th): $50&lt;br /&gt;
&lt;br /&gt;
Conference Tutorial (Two day tutorials Nov 12-13): $1300, $1450 [If not attending the conference], Student Fee: $675 &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Web Services Security Track Chair: Gunnar Peterson - Arctec Group - gunnar 'at' arctecgroup.net&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' list.org&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Frank Piessens - KU Leuven - Frank.Piessens 'at' cs.kuleuven.ac.be &lt;br /&gt;
&lt;br /&gt;
== [[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring either of the 2007 OWASP conferences, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
[http://www.fortifysoftware.com https://www.owasp.org/images/d/d1/Fortify.JPG]&lt;br /&gt;
&lt;br /&gt;
We are also going to have vendor booths at this conference for the first time. If you are interested in demonstrating your application security product to a sophisticated audience of application security professionals, please contact us for more information. Please contact either Dave Wichers (the OWASP Conferences Chair) or Pravir Chandra, who will be organizing the vendor area for this conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Aspectmichelle</name></author>	</entry>

	</feed>