<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Avi+Douglen</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Avi+Douglen"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Avi_Douglen"/>
		<updated>2026-04-22T01:11:02Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Israel&amp;diff=254546</id>
		<title>Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Israel&amp;diff=254546"/>
				<updated>2019-09-05T10:22:41Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: /* The Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP_Chapter]]&lt;br /&gt;
[[image:Owasp_Israel_logo.png|center|500px]]&lt;br /&gt;
__NOTOC__ &amp;lt;!-- This removes the Table Of Contents on this page --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Any = Heading 1 = markup will create a new tab until after the &amp;lt;/headertabs&amp;gt; --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1st Tab start --&amp;gt;&lt;br /&gt;
= Welcome =&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&amp;lt;!-- 1st Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2nd Tab start --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Details =&lt;br /&gt;
== The Team ==&lt;br /&gt;
&lt;br /&gt;
* Chapter Co-Chairs: '''[mailto:shira.shamban@owasp.org Shira Shamban]''' and '''[mailto:ori.troyna@owasp.org Ori Troyna]'''&lt;br /&gt;
&lt;br /&gt;
* Chapter Leaders:  '''[mailto:shira.shamban@owasp.org Shira Shamban]''', '''[mailto:ori.troyna@owasp.org Ori Troyna]''' and '''[mailto:avi.douglen@owasp.org Avi Douglen]''' &lt;br /&gt;
* Chapter Board:  '''[mailto:or.katz@owasp.org Or Katz]''', '''[[User:YossiOren|Dr. Yossi Oren]]''', '''Josh Grossman''', '''[mailto:Ofer.maor@owasp.org Ofer Maor]'''&lt;br /&gt;
* Chapter Founder: '''[mailto:ofer@shezaf.com Ofer Shezaf]'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Avi Douglen, Ofer Maor, Yossi Oren&lt;br /&gt;
* Mailing List Management: Shira Shamban, Ori Troyna, Or Katz&lt;br /&gt;
&lt;br /&gt;
== General Activity ==&lt;br /&gt;
* An annual conference, usually in September or October. &lt;br /&gt;
* Periodic meetings. If you would like to host a meeting or speak in one contact [mailto:avi.douglen@owasp.org Avi Douglen] or [mailto:or.katz@owasp.org Or Katz].&lt;br /&gt;
* Translation of OWASP resources to Hebrew&lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
&amp;lt;!-- 2nd Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 3rd Tab start --&amp;gt;&lt;br /&gt;
= Current Activity =&lt;br /&gt;
&lt;br /&gt;
== Meetings ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:115%;font-weight:bold;&amp;quot;&amp;gt; Get ready for OWASP [https://2018.appsecil.org/ AppSec Israel 2018], to be held on 5-6 September, 2018! &amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;meetup group=&amp;quot;OWASP-Israel&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hebrew Translations ==  &lt;br /&gt;
&lt;br /&gt;
; '''The OWASP Top 10, 2013 version was translated to Hebrew! &amp;lt;br&amp;gt; '''&lt;br /&gt;
It is now [[OWASP_Top10_Hebrew|available for download]].&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_Risk_Rating_Methodology|OWASP Risk Rating Methodology]], part of the [[OWASP_Testing_Project|OWASP Testing Project]], has been translated to Hebrew, and is available for download in [[Media:OWASP_Risk_Rating_Methodology-Hebrew.pdf|PDF format]]. &lt;br /&gt;
Much thanks to Tal Argoni from TriadSec.&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
* Security discussion forum in Hebrew - on [https://www.facebook.com/groups/owasp.il/ Facebook]. [[file:Facebook_logo_small.jpg|100px|link=https://www.facebook.com/groups/owasp.il/]]&lt;br /&gt;
* [https://www.linkedin.com/groups/39702 LinkedIn Group] for networking and announcements. [[file:Delhi_linkedin.jpg|100px|link=https://www.linkedin.com/groups/39702]]&lt;br /&gt;
* [https://owasp.slack.com/messages/chapter-israel/ Chat room] for security in Hebrew. [[file:Slack.png|90px|link=https://owasp.slack.com/messages/chapter-israel/]]  &lt;br /&gt;
* [https://twitter.com/OWASP_IL Twitter] account. [[file:twitter_wide.jpg|75px|link=https://twitter.com/OWASP_IL]]&lt;br /&gt;
* [[OWASP_IL_Sponsorship|Sponsorship opportunities]], including #AppSecIL conference sponsorship. &lt;br /&gt;
* [http://www.meetup.com/OWASP-Israel/ Ongoing Meetings and socialization on Meetup]. [[file:Meetup-logo-2x.png|75px|link=http://www.meetup.com/OWASP-Israel/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up! Contact [mailto:avi.douglen@owasp.org Avi Douglen] with any ideas you have.&lt;br /&gt;
&amp;lt;!-- 3rd Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 4th Tab start --&amp;gt;&lt;br /&gt;
= Previous Annual Conferences =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot; |&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[https://2017.appsecil.org/ AppSec Israel 2017]'''&lt;br /&gt;
| '''October 17-18, 2017'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''more than 800 attendees!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [https://2017.appsecil.org/ AppSec Israel 2017] website to download presentations and videos&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2016|AppSec Israel 2016]]'''&lt;br /&gt;
| '''September 19th 2016'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''more than 650 attendees!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2016_Presentations|presentations info page]] to download presentations and videos&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2015|AppSec Israel 2015]]'''&lt;br /&gt;
| '''October 13th, 2015'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''over 550 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2015_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2014|AppSec Israel 2014]]'''&lt;br /&gt;
| '''September 2nd, 2014'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
| '''over 450 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2014_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2013|OWASP Israel 2013]]'''&lt;br /&gt;
| '''October 1st, 2013'''&lt;br /&gt;
|&lt;br /&gt;
| '''480 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2012|OWASP Israel 2012 conference]]'''&lt;br /&gt;
| '''Sep 5th, 2012'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2011|OWASP Israel 2011 Conference]]'''&lt;br /&gt;
| '''Sep 15th, 2011'''&lt;br /&gt;
| '''IDC in Herzeliya'''&lt;br /&gt;
| '''350 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2010|OWASP Israel 2010 Conference]]'''&lt;br /&gt;
| '''Sep 6th, 2010'''&lt;br /&gt;
| '''IDC in Herzliya'''&lt;br /&gt;
| '''150 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2009|OWASP Israel 2009]]'''&lt;br /&gt;
| '''Sunday, September 6th 2009'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference&lt;br /&gt;
at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''September 14th, 2008'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| '''250 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]'''&lt;br /&gt;
| '''June 3rd, 2008'''&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |OWASP sponsored the IDC Security Road Show event in Israel. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''Dec 3rd 2007'''&lt;br /&gt;
| '''Interdisciplinary Center (IDC) Herzliya'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya.&lt;br /&gt;
The conference really set itself as an event you must come to if you have anything to do with application security. [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 4th Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5th Tab start --&amp;gt;&lt;br /&gt;
= Previous Meetings =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot; |&lt;br /&gt;
! width=&amp;quot;250&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2017|OWASP Israel June 2017]]&lt;br /&gt;
| June 20th, 2017&lt;br /&gt;
| Intuit Israel, HaHarash St. 4, Hod Hasharon&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2017|OWASP Israel April 2017]]&lt;br /&gt;
| April 3rd, 2017&lt;br /&gt;
| Checkmarx's offices, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan&lt;br /&gt;
| 75 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2017|OWASP Israel January 2017]]&lt;br /&gt;
| January 18th, 2017&lt;br /&gt;
| Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal&lt;br /&gt;
| 120 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2016|OWASP Israel June 2016]]&lt;br /&gt;
| June 14, 2016&lt;br /&gt;
| Amdocs Auditorium in Raanana&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2016|OWASP Israel April 2016]]&lt;br /&gt;
| April 12, 2016&lt;br /&gt;
| HP Enterprise in Yehud&lt;br /&gt;
| 150 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_February_2016|OWASP Israel February 2016]]&lt;br /&gt;
| February 2, 2016&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2015|OWASP Israel June 2015]]&lt;br /&gt;
| June 16, 2015&lt;br /&gt;
| Microsoft in Herzeliya&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_March_2015|OWASP Israel March 2015]]&lt;br /&gt;
| March 30, 2015&lt;br /&gt;
| NCR in Raanana&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2014|OWASP Israel June 2014]]&lt;br /&gt;
| June 16, 2014&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
| 110 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2014|OWASP Israel April 2014]]&lt;br /&gt;
| April 23, 2014&lt;br /&gt;
| Akamai in Herzliya Pituach&lt;br /&gt;
| 100 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2014|OWASP Israel January 2014]]&lt;br /&gt;
| January 14th, 2014&lt;br /&gt;
| Amdocs in Ra'anana &lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_05|OWASP Israel May 2013]]&lt;br /&gt;
| May 28th, 2013&lt;br /&gt;
| RSA&lt;br /&gt;
| 80 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_02|OWASP Israel February 2013]]&lt;br /&gt;
| February 12th, 2013&lt;br /&gt;
| E&amp;amp;Y&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |[[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_06|OWASP Israel Jun-2010]]&lt;br /&gt;
| Jun 22nd, 2010&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_02|OWASP Israel Feb-2010]]&lt;br /&gt;
| Feb 9th, 2010&lt;br /&gt;
| Amdocs in Ra'anana&lt;br /&gt;
| 70 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_01|OWASP Israel Jan-2010]]&lt;br /&gt;
| Jan 12th, 2010 &lt;br /&gt;
| Breach Security in Herzliya&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_12|OWASP Israel Dec-2009]]&lt;br /&gt;
| Dec 2009&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]]&lt;br /&gt;
| May 7th, 2009&lt;br /&gt;
| IBM in Park Azorim in Petach-Tikva&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]]&lt;br /&gt;
| March 26th, 2009&lt;br /&gt;
| Tel-Aviv University&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, 2bsecure ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, Breach Security ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, Xiom ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]]&lt;br /&gt;
| January 28th, 2009&lt;br /&gt;
| Checkpoint&lt;br /&gt;
| 100 people&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 5th Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Above the following line = Heading 1 = will create a new tab --&amp;gt;&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&amp;lt;!-- Below this line = Heading 1 = will not create tabs anymore --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Sponsors = &lt;br /&gt;
&lt;br /&gt;
The OWASP Israel chapter's yearly activity is being supported by the generous sponsorship of the following companies: &lt;br /&gt;
&lt;br /&gt;
[[image:OWASPIL_Sponsors_2018.png|center]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]] &lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Israel&amp;diff=247538</id>
		<title>Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Israel&amp;diff=247538"/>
				<updated>2019-02-15T13:09:50Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP_Chapter]]&lt;br /&gt;
[[image:Owasp_Israel_logo.png|center|500px]]&lt;br /&gt;
__NOTOC__ &amp;lt;!-- This removes the Table Of Contents on this page --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Any = Heading 1 = markup will create a new tab until after the &amp;lt;/headertabs&amp;gt; --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1st Tab start --&amp;gt;&lt;br /&gt;
= Welcome =&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&amp;lt;!-- 1st Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2nd Tab start --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Details =&lt;br /&gt;
== The Team ==&lt;br /&gt;
&lt;br /&gt;
Chairman: '''[mailto:or.katz@owasp.org Or Katz]'''.&lt;br /&gt;
&lt;br /&gt;
* Chapter Leaders:  '''[mailto:or.katz@owasp.org Or Katz]''', '''[mailto:avi.douglen@owasp.org Avi Douglen]''', ''' Ofer Maor'''&lt;br /&gt;
* Chapter Board:  '''[[User:YossiOren|Dr. Yossi Oren]]''', '''Shira Shamban''', '''Josh Grossman''', '''Ori Troyna''', '''[[User:Eyigal|Yigal Elefant]]'''&lt;br /&gt;
* Chapter Founder: '''[mailto:ofer@shezaf.com Ofer Shezaf]'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Avi Douglen, Ofer Maor, Yossi Oren, [[User:Eyigal|Yigal Elefant]]&lt;br /&gt;
* Mailing List Management: Or Katz, Avi Douglen, Ofer Maor&lt;br /&gt;
&lt;br /&gt;
== General Activity ==&lt;br /&gt;
* An annual conference, usually in September or October. &lt;br /&gt;
* Periodic meetings. If you would like to host a meeting or speak in one contact [mailto:avi.douglen@owasp.org Avi Douglen] or [mailto:or.katz@owasp.org Or Katz].&lt;br /&gt;
* Translation of OWASP resources to Hebrew&lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
&amp;lt;!-- 2nd Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 3rd Tab start --&amp;gt;&lt;br /&gt;
= Current Activity =&lt;br /&gt;
&lt;br /&gt;
== Meetings ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:115%;font-weight:bold;&amp;quot;&amp;gt; Get ready for OWASP [https://2018.appsecil.org/ AppSec Israel 2018], to be held on 5-6 September, 2018! &amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;meetup group=&amp;quot;OWASP-Israel&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hebrew Translations ==  &lt;br /&gt;
&lt;br /&gt;
; '''The OWASP Top 10, 2013 version was translated to Hebrew! &amp;lt;br&amp;gt; '''&lt;br /&gt;
It is now [[OWASP_Top10_Hebrew|available for download]].&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_Risk_Rating_Methodology|OWASP Risk Rating Methodology]], part of the [[OWASP_Testing_Project|OWASP Testing Project]], has been translated to Hebrew, and is available for download in [[Media:OWASP_Risk_Rating_Methodology-Hebrew.pdf|PDF format]]. &lt;br /&gt;
Much thanks to Tal Argoni from TriadSec.&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
* Security discussion forum in Hebrew - on [https://www.facebook.com/groups/owasp.il/ Facebook]. [[file:Facebook_logo_small.jpg|100px|link=https://www.facebook.com/groups/owasp.il/]]&lt;br /&gt;
* [https://www.linkedin.com/groups/39702 LinkedIn Group] for networking and announcements. [[file:Delhi_linkedin.jpg|100px|link=https://www.linkedin.com/groups/39702]]&lt;br /&gt;
* [https://owasp.slack.com/messages/chapter-israel/ Chat room] for security in Hebrew. [[file:Slack.png|90px|link=https://owasp.slack.com/messages/chapter-israel/]]  &lt;br /&gt;
* [https://twitter.com/OWASP_IL Twitter] account. [[file:twitter_wide.jpg|75px|link=https://twitter.com/OWASP_IL]]&lt;br /&gt;
* [[OWASP_IL_Sponsorship|Sponsorship opportunities]], including #AppSecIL conference sponsorship. &lt;br /&gt;
* [http://www.meetup.com/OWASP-Israel/ Ongoing Meetings and socialization on Meetup]. [[file:Meetup-logo-2x.png|75px|link=http://www.meetup.com/OWASP-Israel/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up! Contact [mailto:avi.douglen@owasp.org Avi Douglen] with any ideas you have.&lt;br /&gt;
&amp;lt;!-- 3rd Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 4th Tab start --&amp;gt;&lt;br /&gt;
= Previous Annual Conferences =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot; |&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[https://2017.appsecil.org/ AppSec Israel 2017]'''&lt;br /&gt;
| '''October 17-18, 2017'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''more than 800 attendees!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [https://2017.appsecil.org/ AppSec Israel 2017] website to download presentations and videos&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2016|AppSec Israel 2016]]'''&lt;br /&gt;
| '''September 19th 2016'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''more than 650 attendees!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2016_Presentations|presentations info page]] to download presentations and videos&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2015|AppSec Israel 2015]]'''&lt;br /&gt;
| '''October 13th, 2015'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''over 550 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2015_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2014|AppSec Israel 2014]]'''&lt;br /&gt;
| '''September 2nd, 2014'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
| '''over 450 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2014_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2013|OWASP Israel 2013]]'''&lt;br /&gt;
| '''October 1st, 2013'''&lt;br /&gt;
|&lt;br /&gt;
| '''480 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2012|OWASP Israel 2012 conference]]'''&lt;br /&gt;
| '''Sep 5th, 2012'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2011|OWASP Israel 2011 Conference]]'''&lt;br /&gt;
| '''Sep 15th, 2011'''&lt;br /&gt;
| '''IDC in Herzeliya'''&lt;br /&gt;
| '''350 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2010|OWASP Israel 2010 Conference]]'''&lt;br /&gt;
| '''Sep 6th, 2010'''&lt;br /&gt;
| '''IDC in Herzliya'''&lt;br /&gt;
| '''150 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2009|OWASP Israel 2009]]'''&lt;br /&gt;
| '''Sunday, September 6th 2009'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference&lt;br /&gt;
at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''September 14th, 2008'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| '''250 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]'''&lt;br /&gt;
| '''June 3rd, 2008'''&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |OWASP sponsored the IDC Security Road Show event in Israel. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''Dec 3rd 2007'''&lt;br /&gt;
| '''Interdisciplinary Center (IDC) Herzliya'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya.&lt;br /&gt;
The conference really set itself as an event you must come to if you have anything to do with application security. [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 4th Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5th Tab start --&amp;gt;&lt;br /&gt;
= Previous Meetings =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot; |&lt;br /&gt;
! width=&amp;quot;250&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2017|OWASP Israel June 2017]]&lt;br /&gt;
| June 20th, 2017&lt;br /&gt;
| Intuit Israel, HaHarash St. 4, Hod Hasharon&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2017|OWASP Israel April 2017]]&lt;br /&gt;
| April 3rd, 2017&lt;br /&gt;
| Checkmarx's offices, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan&lt;br /&gt;
| 75 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2017|OWASP Israel January 2017]]&lt;br /&gt;
| January 18th, 2017&lt;br /&gt;
| Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal&lt;br /&gt;
| 120 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2016|OWASP Israel June 2016]]&lt;br /&gt;
| June 14, 2016&lt;br /&gt;
| Amdocs Auditorium in Raanana&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2016|OWASP Israel April 2016]]&lt;br /&gt;
| April 12, 2016&lt;br /&gt;
| HP Enterprise in Yehud&lt;br /&gt;
| 150 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_February_2016|OWASP Israel February 2016]]&lt;br /&gt;
| February 2, 2016&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2015|OWASP Israel June 2015]]&lt;br /&gt;
| June 16, 2015&lt;br /&gt;
| Microsoft in Herzeliya&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_March_2015|OWASP Israel March 2015]]&lt;br /&gt;
| March 30, 2015&lt;br /&gt;
| NCR in Raanana&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2014|OWASP Israel June 2014]]&lt;br /&gt;
| June 16, 2014&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
| 110 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2014|OWASP Israel April 2014]]&lt;br /&gt;
| April 23, 2014&lt;br /&gt;
| Akamai in Herzliya Pituach&lt;br /&gt;
| 100 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2014|OWASP Israel January 2014]]&lt;br /&gt;
| January 14th, 2014&lt;br /&gt;
| Amdocs in Ra'anana &lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_05|OWASP Israel May 2013]]&lt;br /&gt;
| May 28th, 2013&lt;br /&gt;
| RSA&lt;br /&gt;
| 80 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_02|OWASP Israel February 2013]]&lt;br /&gt;
| February 12th, 2013&lt;br /&gt;
| E&amp;amp;Y&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |[[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_06|OWASP Israel Jun-2010]]&lt;br /&gt;
| Jun 22nd, 2010&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_02|OWASP Israel Feb-2010]]&lt;br /&gt;
| Feb 9th, 2010&lt;br /&gt;
| Amdocs in Ra'anana&lt;br /&gt;
| 70 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_01|OWASP Israel Jan-2010]]&lt;br /&gt;
| Jan 12th, 2010 &lt;br /&gt;
| Breach Security in Herzliya&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_12|OWASP Israel Dec-2009]]&lt;br /&gt;
| Dec 2009&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]]&lt;br /&gt;
| May 7th, 2009&lt;br /&gt;
| IBM in Park Azorim in Petach-Tikva&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]]&lt;br /&gt;
| March 26th, 2009&lt;br /&gt;
| Tel-Aviv University&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, 2bsecure ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, Breach Security ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, Xiom ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]]&lt;br /&gt;
| January 28th, 2009&lt;br /&gt;
| Checkpoint&lt;br /&gt;
| 100 people&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 5th Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Above the following line = Heading 1 = will create a new tab --&amp;gt;&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&amp;lt;!-- Below this line = Heading 1 = will not create tabs anymore --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Sponsors = &lt;br /&gt;
&lt;br /&gt;
The OWASP Israel chapter's yearly activity is being supported by the generous sponsorship of the following companies: &lt;br /&gt;
&lt;br /&gt;
[[image:OWASPIL_Sponsors_2018.png|center]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]] &lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Israel&amp;diff=242889</id>
		<title>Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Israel&amp;diff=242889"/>
				<updated>2018-08-28T07:27:58Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Swapped tabs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP_Chapter]]&lt;br /&gt;
[[image:Owasp_Israel_logo.png|center|500px]]&lt;br /&gt;
__NOTOC__ &amp;lt;!-- This removes the Table Of Contents on this page --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Any = Heading 1 = markup will create a new tab until after the &amp;lt;/headertabs&amp;gt; --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1st Tab start --&amp;gt;&lt;br /&gt;
= Welcome =&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&amp;lt;!-- 1st Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 2nd Tab start --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Details =&lt;br /&gt;
== The Team ==&lt;br /&gt;
&lt;br /&gt;
Chairman: '''[mailto:or.katz@owasp.org Or Katz]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board: '''[mailto:or.katz@owasp.org Or Katz]''', '''[mailto:avi.douglen@owasp.org Avi Douglen]''', ''' Ofer Maor''', '''Erez Metula''', '''Hemed Gur Ary''', '''[[User:YossiOren|Dr. Yossi Oren]]'''&lt;br /&gt;
* Chapter Founder: '''[mailto:ofer@shezaf.com Ofer Shezaf]'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Avi Douglen, Ofer Maor, Yossi Oren, [[User:Eyigal|Yigal Elefant]]&lt;br /&gt;
* Mailing List Management: Avi Douglen, Ofer Maor, Or Katz&lt;br /&gt;
&lt;br /&gt;
== General Activity ==&lt;br /&gt;
* An annual conference, usually in September or October. &lt;br /&gt;
* Periodic meetings. If you would like to host a meeting or speak in one contact [mailto:avi.douglen@owasp.org Avi Douglen] or [mailto:or.katz@owasp.org Or Katz].&lt;br /&gt;
* Translation of OWASP resources to Hebrew&lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
&amp;lt;!-- 2nd Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 3rd Tab start --&amp;gt;&lt;br /&gt;
= Current Activity =&lt;br /&gt;
&lt;br /&gt;
== Meetings ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:115%;font-weight:bold;&amp;quot;&amp;gt; Get ready for OWASP [https://2018.appsecil.org/ AppSec Israel 2018], to be held on 5-6 September, 2018! &amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;meetup group=&amp;quot;OWASP-Israel&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hebrew Translations ==  &lt;br /&gt;
&lt;br /&gt;
; '''The OWASP Top 10, 2013 version was translated to Hebrew! &amp;lt;br&amp;gt; '''&lt;br /&gt;
It is now [[OWASP_Top10_Hebrew|available for download]].&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_Risk_Rating_Methodology|OWASP Risk Rating Methodology]], part of the [[OWASP_Testing_Project|OWASP Testing Project]], has been translated to Hebrew, and is available for download in [[Media:OWASP_Risk_Rating_Methodology-Hebrew.pdf|PDF format]]. &lt;br /&gt;
Much thanks to Tal Argoni from TriadSec.&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
* Security discussion forum in Hebrew - on [https://www.facebook.com/groups/owasp.il/ Facebook]. [[file:Facebook_logo_small.jpg|100px|link=https://www.facebook.com/groups/owasp.il/]]&lt;br /&gt;
* [https://www.linkedin.com/groups/39702 LinkedIn Group] for networking and announcements. [[file:Delhi_linkedin.jpg|100px|link=https://www.linkedin.com/groups/39702]]&lt;br /&gt;
* [https://owasp.slack.com/messages/chapter-israel/ Chat room] for security in Hebrew. [[file:Slack.png|90px|link=https://owasp.slack.com/messages/chapter-israel/]]  &lt;br /&gt;
* [https://twitter.com/OWASP_IL Twitter] account. [[file:twitter_wide.jpg|75px|link=https://twitter.com/OWASP_IL]]&lt;br /&gt;
* [[OWASP_IL_Sponsorship|Sponsorship opportunities]], including #AppSecIL conference sponsorship. &lt;br /&gt;
* [http://www.meetup.com/OWASP-Israel/ Ongoing Meetings and socialization on Meetup]. [[file:Meetup-logo-2x.png|75px|link=http://www.meetup.com/OWASP-Israel/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up! Contact [mailto:avi.douglen@owasp.org Avi Douglen] with any ideas you have.&lt;br /&gt;
&amp;lt;!-- 3rd Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 4th Tab start --&amp;gt;&lt;br /&gt;
= Previous Annual Conferences =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot; |&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[https://2017.appsecil.org/ AppSec Israel 2017]'''&lt;br /&gt;
| '''October 17-18, 2017'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''more than 800 attendees!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [https://2017.appsecil.org/ AppSec Israel 2017] website to download presentations and videos&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2016|AppSec Israel 2016]]'''&lt;br /&gt;
| '''September 19th 2016'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''more than 650 attendees!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2016_Presentations|presentations info page]] to download presentations and videos&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2015|AppSec Israel 2015]]'''&lt;br /&gt;
| '''October 13th, 2015'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''over 550 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2015_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2014|AppSec Israel 2014]]'''&lt;br /&gt;
| '''September 2nd, 2014'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
| '''over 450 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2014_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2013|OWASP Israel 2013]]'''&lt;br /&gt;
| '''October 1st, 2013'''&lt;br /&gt;
|&lt;br /&gt;
| '''480 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2012|OWASP Israel 2012 conference]]'''&lt;br /&gt;
| '''Sep 5th, 2012'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2011|OWASP Israel 2011 Conference]]'''&lt;br /&gt;
| '''Sep 15th, 2011'''&lt;br /&gt;
| '''IDC in Herzeliya'''&lt;br /&gt;
| '''350 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2010|OWASP Israel 2010 Conference]]'''&lt;br /&gt;
| '''Sep 6th, 2010'''&lt;br /&gt;
| '''IDC in Herzliya'''&lt;br /&gt;
| '''150 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2009|OWASP Israel 2009]]'''&lt;br /&gt;
| '''Sunday, September 6th 2009'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference&lt;br /&gt;
at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''September 14th, 2008'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| '''250 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]'''&lt;br /&gt;
| '''June 3rd, 2008'''&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |OWASP sponsored the IDC Security Road Show event in Israel. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''Dec 3rd 2007'''&lt;br /&gt;
| '''Interdisciplinary Center (IDC) Herzliya'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya.&lt;br /&gt;
The conference really set itself as an event you must come to if you have anything to do with application security. [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 4th Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5th Tab start --&amp;gt;&lt;br /&gt;
= Previous Meetings =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot; |&lt;br /&gt;
! width=&amp;quot;250&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2017|OWASP Israel June 2017]]&lt;br /&gt;
| June 20th, 2017&lt;br /&gt;
| Intuit Israel, HaHarash St. 4, Hod Hasharon&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2017|OWASP Israel April 2017]]&lt;br /&gt;
| April 3rd, 2017&lt;br /&gt;
| Checkmarx's offices, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan&lt;br /&gt;
| 75 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2017|OWASP Israel January 2017]]&lt;br /&gt;
| January 18th, 2017&lt;br /&gt;
| Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal&lt;br /&gt;
| 120 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2016|OWASP Israel June 2016]]&lt;br /&gt;
| June 14, 2016&lt;br /&gt;
| Amdocs Auditorium in Raanana&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2016|OWASP Israel April 2016]]&lt;br /&gt;
| April 12, 2016&lt;br /&gt;
| HP Enterprise in Yehud&lt;br /&gt;
| 150 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_February_2016|OWASP Israel February 2016]]&lt;br /&gt;
| February 2, 2016&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2015|OWASP Israel June 2015]]&lt;br /&gt;
| June 16, 2015&lt;br /&gt;
| Microsoft in Herzeliya&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_March_2015|OWASP Israel March 2015]]&lt;br /&gt;
| March 30, 2015&lt;br /&gt;
| NCR in Raanana&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2014|OWASP Israel June 2014]]&lt;br /&gt;
| June 16, 2014&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
| 110 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2014|OWASP Israel April 2014]]&lt;br /&gt;
| April 23, 2014&lt;br /&gt;
| Akamai in Herzliya Pituach&lt;br /&gt;
| 100 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2014|OWASP Israel January 2014]]&lt;br /&gt;
| January 14th, 2014&lt;br /&gt;
| Amdocs in Ra'anana &lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_05|OWASP Israel May 2013]]&lt;br /&gt;
| May 28th, 2013&lt;br /&gt;
| RSA&lt;br /&gt;
| 80 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_02|OWASP Israel February 2013]]&lt;br /&gt;
| February 12th, 2013&lt;br /&gt;
| E&amp;amp;Y&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |[[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_06|OWASP Israel Jun-2010]]&lt;br /&gt;
| Jun 22nd, 2010&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_02|OWASP Israel Feb-2010]]&lt;br /&gt;
| Feb 9th, 2010&lt;br /&gt;
| Amdocs in Ra'anana&lt;br /&gt;
| 70 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_01|OWASP Israel Jan-2010]]&lt;br /&gt;
| Jan 12th, 2010 &lt;br /&gt;
| Breach Security in Herzliya&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_12|OWASP Israel Dec-2009]]&lt;br /&gt;
| Dec 2009&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]]&lt;br /&gt;
| May 7th, 2009&lt;br /&gt;
| IBM in Park Azorim in Petach-Tikva&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]]&lt;br /&gt;
| March 26th, 2009&lt;br /&gt;
| Tel-Aviv University&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, 2bsecure ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, Breach Security ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, Xiom ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]]&lt;br /&gt;
| January 28th, 2009&lt;br /&gt;
| Checkpoint&lt;br /&gt;
| 100 people&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 5th Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Above the following line = Heading 1 = will create a new tab --&amp;gt;&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&amp;lt;!-- Below this line = Heading 1 = will not create tabs anymore --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Sponsors = &lt;br /&gt;
&lt;br /&gt;
The OWASP Israel chapter's yearly activity is being supported by the generous sponsorship of the following companies: &lt;br /&gt;
&lt;br /&gt;
[[image:OWASPIL_Sponsors.png|center]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]] &lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Israel&amp;diff=240781</id>
		<title>Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Israel&amp;diff=240781"/>
				<updated>2018-05-18T15:01:32Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP_Chapter]]&lt;br /&gt;
[[image:Owasp_Israel_logo.png|center|500px]]&lt;br /&gt;
__NOTOC__ &amp;lt;!-- This removes the Table Of Contents on this page --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Any = Heading 1 = markup will create a new tab until after the &amp;lt;/headertabs&amp;gt; --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1st Tab start --&amp;gt;&lt;br /&gt;
= Welcome =&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&amp;lt;!-- 1st Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2nd Tab start --&amp;gt;&lt;br /&gt;
= Current Activity =&lt;br /&gt;
&lt;br /&gt;
== Meetings ==&lt;br /&gt;
&lt;br /&gt;
* Get ready for OWASP [[AppSec Israel 2017]], to be held on October 17-18, 2017!&lt;br /&gt;
* OWASP Europe 2018 is planned to be in Israel. For sponsorship, questions, suggestions and more, contanct '''[mailto:avi.douglen@owasp.org Avi Douglen]'''&lt;br /&gt;
* [http://www.meetup.com/OWASP-Israel/ Ongoing Meetings and socialization on Meetup]. [[file:Meetup-logo-2x.png|75px|link=http://www.meetup.com/OWASP-Israel/]]&lt;br /&gt;
&lt;br /&gt;
== Hebrew Translations ==  &lt;br /&gt;
&lt;br /&gt;
; '''The OWASP Top 10, 2013 version was translated to Hebrew! &amp;lt;br&amp;gt; '''&lt;br /&gt;
It is now [[OWASP_Top10_Hebrew|available for download]].&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_Risk_Rating_Methodology|OWASP Risk Rating Methodology]], part of the [[OWASP_Testing_Project|OWASP Testing Project]], has been translated to Hebrew, and is available for download in [[Media:OWASP_Risk_Rating_Methodology-Hebrew.pdf|PDF format]]. &lt;br /&gt;
Much thanks to Tal Argoni from TriadSec.&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
* Security discussion forum in Hebrew - on [https://www.facebook.com/groups/owasp.il/ Facebook]. [[file:Facebook_logo_small.jpg|100px|link=https://www.facebook.com/groups/owasp.il/]]&lt;br /&gt;
* [https://www.linkedin.com/groups/39702 LinkedIn Group] for networking and announcements. [[file:Delhi_linkedin.jpg|100px|link=https://www.linkedin.com/groups/39702]]&lt;br /&gt;
* [https://owasp.slack.com/messages/chapter-israel/ Chat room] for security in Hebrew. [[file:Slack.png|90px|link=https://owasp.slack.com/messages/chapter-israel/]]  &lt;br /&gt;
* [https://twitter.com/OWASP_IL Twitter] account. [[file:twitter_wide.jpg|75px|link=https://twitter.com/OWASP_IL]]&lt;br /&gt;
* [[OWASP_IL_Sponsorship|Sponsorship opportunities]], including #AppSecIL conference sponsorship. &lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up! Contact [mailto:avi.douglen@owasp.org Avi Douglen] with any ideas you have.&lt;br /&gt;
&amp;lt;!-- 2nd Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3rd Tab start --&amp;gt;&lt;br /&gt;
= Chapter Details =&lt;br /&gt;
== The Team ==&lt;br /&gt;
&lt;br /&gt;
Chairman: '''[mailto:or.katz@owasp.org Or Katz]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board: '''[mailto:or.katz@owasp.org Or Katz]''', '''[mailto:avi.douglen@owasp.org Avi Douglen]''', ''' Ofer Maor''', '''Erez Metula''', '''Hemed Gur Ary''', '''[[User:YossiOren|Dr. Yossi Oren]]'''&lt;br /&gt;
* Chapter Founder: '''[mailto:ofer@shezaf.com Ofer Shezaf]'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Avi Douglen, Ofer Maor, Yossi Oren, [[User:Eyigal|Yigal Elefant]]&lt;br /&gt;
* Mailing List Management: Avi Douglen, Ofer Maor, Or Katz&lt;br /&gt;
&lt;br /&gt;
== General Activity ==&lt;br /&gt;
* An annual conference, usually in September or October. &lt;br /&gt;
* Periodic meetings. If you would like to host a meeting or speak in one contact [mailto:avi.douglen@owasp.org Avi Douglen] or [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
* Translation of OWASP resources to Hebrew&lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
&amp;lt;!-- 3rd Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 4th Tab start --&amp;gt;&lt;br /&gt;
= Previous Annual Conferences =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot; |&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2016|AppSec Israel 2016]]'''&lt;br /&gt;
| '''September 19th 2016'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''more than 650 attendees!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2016_Presentations|presentations info page]] to download presentations and videos&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2015|AppSec Israel 2015]]'''&lt;br /&gt;
| '''October 13th, 2015'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''over 550 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2015_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2014|AppSec Israel 2014]]'''&lt;br /&gt;
| '''September 2nd, 2014'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
| '''over 450 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2014_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2013|OWASP Israel 2013]]'''&lt;br /&gt;
| '''October 1st, 2013'''&lt;br /&gt;
|&lt;br /&gt;
| '''480 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2012|OWASP Israel 2012 conference]]'''&lt;br /&gt;
| '''Sep 5th, 2012'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2011|OWASP Israel 2011 Conference]]'''&lt;br /&gt;
| '''Sep 15th, 2011'''&lt;br /&gt;
| '''IDC in Herzeliya'''&lt;br /&gt;
| '''350 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2010|OWASP Israel 2010 Conference]]'''&lt;br /&gt;
| '''Sep 6th, 2010'''&lt;br /&gt;
| '''IDC in Herzliya'''&lt;br /&gt;
| '''150 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2009|OWASP Israel 2009]]'''&lt;br /&gt;
| '''Sunday, September 6th 2009'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference&lt;br /&gt;
at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''September 14th, 2008'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| '''250 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]'''&lt;br /&gt;
| '''June 3rd, 2008'''&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |OWASP sponsored the IDC Security Road Show event in Israel. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''Dec 3rd 2007'''&lt;br /&gt;
| '''Interdisciplinary Center (IDC) Herzliya'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya.&lt;br /&gt;
The conference really set itself as an event you must come to if you have anything to do with application security. [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 4th Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5th Tab start --&amp;gt;&lt;br /&gt;
= Previous Meetings =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot; |&lt;br /&gt;
! width=&amp;quot;250&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2017|OWASP Israel June 2017]]&lt;br /&gt;
| June 20th, 2017&lt;br /&gt;
| Intuit Israel, HaHarash St. 4, Hod Hasharon&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2017|OWASP Israel April 2017]]&lt;br /&gt;
| April 3rd, 2017&lt;br /&gt;
| Checkmarx's offices, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan&lt;br /&gt;
| 75 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2017|OWASP Israel January 2017]]&lt;br /&gt;
| January 18th, 2017&lt;br /&gt;
| Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal&lt;br /&gt;
| 120 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2016|OWASP Israel June 2016]]&lt;br /&gt;
| June 14, 2016&lt;br /&gt;
| Amdocs Auditorium in Raanana&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2016|OWASP Israel April 2016]]&lt;br /&gt;
| April 12, 2016&lt;br /&gt;
| HP Enterprise in Yehud&lt;br /&gt;
| 150 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_February_2016|OWASP Israel February 2016]]&lt;br /&gt;
| February 2, 2016&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2015|OWASP Israel June 2015]]&lt;br /&gt;
| June 16, 2015&lt;br /&gt;
| Microsoft in Herzeliya&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_March_2015|OWASP Israel March 2015]]&lt;br /&gt;
| March 30, 2015&lt;br /&gt;
| NCR in Raanana&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2014|OWASP Israel June 2014]]&lt;br /&gt;
| June 16, 2014&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
| 110 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2014|OWASP Israel April 2014]]&lt;br /&gt;
| April 23, 2014&lt;br /&gt;
| Akamai in Herzliya Pituach&lt;br /&gt;
| 100 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2014|OWASP Israel January 2014]]&lt;br /&gt;
| January 14th, 2014&lt;br /&gt;
| Amdocs in Ra'anana &lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_05|OWASP Israel May 2013]]&lt;br /&gt;
| May 28th, 2013&lt;br /&gt;
| RSA&lt;br /&gt;
| 80 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_02|OWASP Israel February 2013]]&lt;br /&gt;
| February 12th, 2013&lt;br /&gt;
| E&amp;amp;Y&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |[[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_06|OWASP Israel Jun-2010]]&lt;br /&gt;
| Jun 22nd, 2010&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_02|OWASP Israel Feb-2010]]&lt;br /&gt;
| Feb 9th, 2010&lt;br /&gt;
| Amdocs in Ra'anana&lt;br /&gt;
| 70 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_01|OWASP Israel Jan-2010]]&lt;br /&gt;
| Jan 12th, 2010 &lt;br /&gt;
| Breach Security in Herzliya&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_12|OWASP Israel Dec-2009]]&lt;br /&gt;
| Dec 2009&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]]&lt;br /&gt;
| May 7th, 2009&lt;br /&gt;
| IBM in Park Azorim in Petach-Tikva&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]]&lt;br /&gt;
| March 26th, 2009&lt;br /&gt;
| Tel-Aviv University&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, 2bsecure ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, Breach Security ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, Xiom ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]]&lt;br /&gt;
| January 28th, 2009&lt;br /&gt;
| Checkpoint&lt;br /&gt;
| 100 people&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 5th Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Above the following line = Heading 1 = will create a new tab --&amp;gt;&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&amp;lt;!-- Below this line = Heading 1 = will not create tabs anymore --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Sponsors = &lt;br /&gt;
&lt;br /&gt;
The OWASP Israel chapter's yearly activity is being supported by the generous sponsorship of the following companies: &lt;br /&gt;
&lt;br /&gt;
[[image:OWASPIL_Sponsors.png|center]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]] &lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Israel&amp;diff=240754</id>
		<title>Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Israel&amp;diff=240754"/>
				<updated>2018-05-16T21:19:41Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: /* Chapter Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP_Chapter]]&lt;br /&gt;
[[image:Owasp_Israel_logo.png|center|500px]]&lt;br /&gt;
__NOTOC__ &amp;lt;!-- This removes the Table Of Contents on this page --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Any = Heading 1 = markup will create a new tab until after the &amp;lt;/headertabs&amp;gt; --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1st Tab start --&amp;gt;&lt;br /&gt;
= Welcome =&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&amp;lt;!-- 1st Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2nd Tab start --&amp;gt;&lt;br /&gt;
= Current Activity =&lt;br /&gt;
&lt;br /&gt;
== Meetings ==&lt;br /&gt;
&lt;br /&gt;
* Get ready for OWASP [[AppSec Israel 2017]], to be held on October 17-18, 2017!&lt;br /&gt;
* OWASP Europe 2018 is planned to be in Israel. For sponsorship, questions, suggestions and more, contanct '''[mailto:avi.douglen@owasp.org Avi Douglen]'''&lt;br /&gt;
* [http://www.meetup.com/OWASP-Israel/ Ongoing Meetings and socialization on Meetup]. [[file:Meetup-logo-2x.png|75px|link=http://www.meetup.com/OWASP-Israel/]]&lt;br /&gt;
&lt;br /&gt;
== Hebrew Translations ==  &lt;br /&gt;
&lt;br /&gt;
; '''The OWASP Top 10, 2013 version was translated to Hebrew! &amp;lt;br&amp;gt; '''&lt;br /&gt;
It is now [[OWASP_Top10_Hebrew|available for download]].&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_Risk_Rating_Methodology|OWASP Risk Rating Methodology]], part of the [[OWASP_Testing_Project|OWASP Testing Project]], has been translated to Hebrew, and is available for download in [[Media:OWASP_Risk_Rating_Methodology-Hebrew.pdf|PDF format]]. &lt;br /&gt;
Much thanks to Tal Argoni from TriadSec.&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
* Security discussion forum in Hebrew - on [https://www.facebook.com/groups/owasp.il/ Facebook]. [[file:Facebook_logo_small.jpg|100px|link=https://www.facebook.com/groups/owasp.il/]]&lt;br /&gt;
* [https://www.linkedin.com/groups/39702 LinkedIn Group] for networking and announcements. [[file:Delhi_linkedin.jpg|100px|link=https://www.linkedin.com/groups/39702]]&lt;br /&gt;
* [https://owasp.slack.com/messages/chapter-israel/ Chat room] for security in Hebrew. [[file:Slack.png|90px|link=https://owasp.slack.com/messages/chapter-israel/]]  &lt;br /&gt;
* [https://twitter.com/OWASP_IL Twitter] account. [[file:twitter_wide.jpg|75px|link=https://twitter.com/OWASP_IL]]&lt;br /&gt;
* [[OWASP_IL_Sponsorship|Sponsorship opportunities]], including #AppSecIL conference sponsorship. &lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up! Contact [mailto:avi.douglen@owasp.org Avi Douglen] with any ideas you have.&lt;br /&gt;
&amp;lt;!-- 2nd Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3rd Tab start --&amp;gt;&lt;br /&gt;
= Chapter Details =&lt;br /&gt;
== The Team ==&lt;br /&gt;
&lt;br /&gt;
Chapter leader: '''[mailto:avi.douglen@owasp.org Avi Douglen]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board: '''[mailto:avi.douglen@owasp.org Avi Douglen]''', '''Or Katz''', ''' Ofer Maor''', '''Erez Metula''', '''Hemed Gur Ary''', '''[[User:YossiOren|Dr. Yossi Oren]]'''&lt;br /&gt;
* Chapter Founder: '''[mailto:ofer@shezaf.com Ofer Shezaf]'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Avi Douglen, Ofer Maor, Yossi Oren, [[User:Eyigal|Yigal Elefant]]&lt;br /&gt;
* Mailing List Management: Avi Douglen, Ofer Maor, Or Katz   &lt;br /&gt;
&lt;br /&gt;
== General Activity ==&lt;br /&gt;
* An annual conference, usually in September or October. &lt;br /&gt;
* Periodic meetings. If you would like to host a meeting or speak in one contact [mailto:avi.douglen@owasp.org Avi Douglen] or [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
* Translation of OWASP resources to Hebrew&lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
&amp;lt;!-- 3rd Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 4th Tab start --&amp;gt;&lt;br /&gt;
= Previous Annual Conferences =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot; |&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2016|AppSec Israel 2016]]'''&lt;br /&gt;
| '''September 19th 2016'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''more than 650 attendees!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2016_Presentations|presentations info page]] to download presentations and videos&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2015|AppSec Israel 2015]]'''&lt;br /&gt;
| '''October 13th, 2015'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''over 550 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2015_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2014|AppSec Israel 2014]]'''&lt;br /&gt;
| '''September 2nd, 2014'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
| '''over 450 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2014_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2013|OWASP Israel 2013]]'''&lt;br /&gt;
| '''October 1st, 2013'''&lt;br /&gt;
|&lt;br /&gt;
| '''480 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2012|OWASP Israel 2012 conference]]'''&lt;br /&gt;
| '''Sep 5th, 2012'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2011|OWASP Israel 2011 Conference]]'''&lt;br /&gt;
| '''Sep 15th, 2011'''&lt;br /&gt;
| '''IDC in Herzeliya'''&lt;br /&gt;
| '''350 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2010|OWASP Israel 2010 Conference]]'''&lt;br /&gt;
| '''Sep 6th, 2010'''&lt;br /&gt;
| '''IDC in Herzliya'''&lt;br /&gt;
| '''150 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2009|OWASP Israel 2009]]'''&lt;br /&gt;
| '''Sunday, September 6th 2009'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference&lt;br /&gt;
at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''September 14th, 2008'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| '''250 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]'''&lt;br /&gt;
| '''June 3rd, 2008'''&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |OWASP sponsored the IDC Security Road Show event in Israel. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''Dec 3rd 2007'''&lt;br /&gt;
| '''Interdisciplinary Center (IDC) Herzliya'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya.&lt;br /&gt;
The conference really set itself as an event you must come to if you have anything to do with application security. [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 4th Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5th Tab start --&amp;gt;&lt;br /&gt;
= Previous Meetings =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot; |&lt;br /&gt;
! width=&amp;quot;250&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2017|OWASP Israel June 2017]]&lt;br /&gt;
| June 20th, 2017&lt;br /&gt;
| Intuit Israel, HaHarash St. 4, Hod Hasharon&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2017|OWASP Israel April 2017]]&lt;br /&gt;
| April 3rd, 2017&lt;br /&gt;
| Checkmarx's offices, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan&lt;br /&gt;
| 75 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2017|OWASP Israel January 2017]]&lt;br /&gt;
| January 18th, 2017&lt;br /&gt;
| Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal&lt;br /&gt;
| 120 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2016|OWASP Israel June 2016]]&lt;br /&gt;
| June 14, 2016&lt;br /&gt;
| Amdocs Auditorium in Raanana&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2016|OWASP Israel April 2016]]&lt;br /&gt;
| April 12, 2016&lt;br /&gt;
| HP Enterprise in Yehud&lt;br /&gt;
| 150 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_February_2016|OWASP Israel February 2016]]&lt;br /&gt;
| February 2, 2016&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2015|OWASP Israel June 2015]]&lt;br /&gt;
| June 16, 2015&lt;br /&gt;
| Microsoft in Herzeliya&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_March_2015|OWASP Israel March 2015]]&lt;br /&gt;
| March 30, 2015&lt;br /&gt;
| NCR in Raanana&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2014|OWASP Israel June 2014]]&lt;br /&gt;
| June 16, 2014&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
| 110 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2014|OWASP Israel April 2014]]&lt;br /&gt;
| April 23, 2014&lt;br /&gt;
| Akamai in Herzliya Pituach&lt;br /&gt;
| 100 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2014|OWASP Israel January 2014]]&lt;br /&gt;
| January 14th, 2014&lt;br /&gt;
| Amdocs in Ra'anana &lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_05|OWASP Israel May 2013]]&lt;br /&gt;
| May 28th, 2013&lt;br /&gt;
| RSA&lt;br /&gt;
| 80 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_02|OWASP Israel February 2013]]&lt;br /&gt;
| February 12th, 2013&lt;br /&gt;
| E&amp;amp;Y&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |[[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_06|OWASP Israel Jun-2010]]&lt;br /&gt;
| Jun 22nd, 2010&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_02|OWASP Israel Feb-2010]]&lt;br /&gt;
| Feb 9th, 2010&lt;br /&gt;
| Amdocs in Ra'anana&lt;br /&gt;
| 70 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_01|OWASP Israel Jan-2010]]&lt;br /&gt;
| Jan 12th, 2010 &lt;br /&gt;
| Breach Security in Herzliya&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_12|OWASP Israel Dec-2009]]&lt;br /&gt;
| Dec 2009&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]]&lt;br /&gt;
| May 7th, 2009&lt;br /&gt;
| IBM in Park Azorim in Petach-Tikva&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]]&lt;br /&gt;
| March 26th, 2009&lt;br /&gt;
| Tel-Aviv University&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, 2bsecure ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, Breach Security ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, Xiom ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]]&lt;br /&gt;
| January 28th, 2009&lt;br /&gt;
| Checkpoint&lt;br /&gt;
| 100 people&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 5th Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Above the following line = Heading 1 = will create a new tab --&amp;gt;&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&amp;lt;!-- Below this line = Heading 1 = will not create tabs anymore --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Sponsors = &lt;br /&gt;
&lt;br /&gt;
The OWASP Israel chapter's yearly activity is being supported by the generous sponsorship of the following companies: &lt;br /&gt;
&lt;br /&gt;
[[image:OWASPIL_Sponsors.png|center]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]] &lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPIL_Sponsors.png&amp;diff=240753</id>
		<title>File:OWASPIL Sponsors.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPIL_Sponsors.png&amp;diff=240753"/>
				<updated>2018-05-16T21:19:18Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Avi Douglen uploaded a new version of File:OWASPIL Sponsors.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPIL_Sponsors.png&amp;diff=240752</id>
		<title>File:OWASPIL Sponsors.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPIL_Sponsors.png&amp;diff=240752"/>
				<updated>2018-05-16T21:16:56Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Avi Douglen uploaded a new version of File:OWASPIL Sponsors.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPIL_Sponsors.png&amp;diff=240750</id>
		<title>File:OWASPIL Sponsors.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPIL_Sponsors.png&amp;diff=240750"/>
				<updated>2018-05-16T20:55:34Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Joel_Test_for_AppSec&amp;diff=237898</id>
		<title>Joel Test for AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Joel_Test_for_AppSec&amp;diff=237898"/>
				<updated>2018-02-19T23:51:38Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Created page with &amp;quot;At the [https://owaspsummit.org/ OWASP Summit 2017], there was held a session on [https://owaspsummit.org/Outcomes/Education/Recruiting-AppSec-Talent.html Recruiting AppSec Ta...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;At the [https://owaspsummit.org/ OWASP Summit 2017], there was held a session on [https://owaspsummit.org/Outcomes/Education/Recruiting-AppSec-Talent.html Recruiting AppSec Talent] with the purpose of improving the recruitment cycle, including improving job postings and suggested next steps for AppSec Managers looking for long-term growth of their team. &lt;br /&gt;
&lt;br /&gt;
We discussed the gap between companies’ needs to recruit talented AppSec people, and attracting the best AppSec people to work at their company. The [https://www.joelonsoftware.com/2000/08/09/the-joel-test-12-steps-to-better-code/ Joel Test] is a quick indicator of Development culture: an irresponsible, sloppy test to rate the quality of a software team. We adapted the Joel Test to be a quick indicator of a company’s AppSec culture. The test’s purpose is to help companies attract the right talent and help talent to find the right company&lt;br /&gt;
&lt;br /&gt;
First draft of the AppSec Joel Test (in no specific order):&lt;br /&gt;
* Does the company fund ongoing education for AppSec hires?&lt;br /&gt;
* Do developers undergo periodic AppSec training?&lt;br /&gt;
* Do AppSec people have a quiet working environment?&lt;br /&gt;
* Are there both offense and defense teams; do they work together?&lt;br /&gt;
* Can the AppSec team delay release (or fix) a new version or product?&lt;br /&gt;
* Is the AppSec team involved throughout the development lifecycle process?&lt;br /&gt;
* Can I access developers directly?&lt;br /&gt;
* Are security bugs treated like functional bugs?&lt;br /&gt;
* Is there some form of SDL / Maturity model / or other process in place?&lt;br /&gt;
* Can AppSec people choose their own tools (paid for by the company)?&lt;br /&gt;
* Is there a dedicated Incident Response team?&lt;br /&gt;
* Does the company contribute to Open Source and community efforts (or support personal contributions)?&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2017_OWASP_World_Tour_Israel&amp;diff=232889</id>
		<title>2017 OWASP World Tour Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2017_OWASP_World_Tour_Israel&amp;diff=232889"/>
				<updated>2017-09-05T14:53:13Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Created page with &amp;quot;'''More information coming! Check back soon!'''  '''[https://appsecil.org/ AppSec Israel Conference - Main Page]'''  '''This is a free 1 day training event, however registrati...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''More information coming! Check back soon!'''&lt;br /&gt;
&lt;br /&gt;
'''[https://appsecil.org/ AppSec Israel Conference - Main Page]'''&lt;br /&gt;
&lt;br /&gt;
'''This is a free 1 day training event, however registration is required to attend.''' &lt;br /&gt;
&lt;br /&gt;
'''Date:''' Tuesday, October 17, 2017&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 9:00am - 5:00pm&lt;br /&gt;
&lt;br /&gt;
'''Location:''' College of Management (Michlala l’Minhal) &amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The College of Management (ColMan) is in Rishon LeZion (about 20 minutes south of Tel Aviv). &lt;br /&gt;
The address is Eli Weisel 2, Rishon LeZiyon. There is plenty of parking available, entrance is via gate 4.&lt;br /&gt;
&lt;br /&gt;
For directions and public transportation options, please see the information at this link: http://www.colman.ac.il/about/roads/Pages/default.aspx&lt;br /&gt;
&lt;br /&gt;
=='''Call for Trainers'''==&lt;br /&gt;
&lt;br /&gt;
https://owasp.submittable.com/submit/91874/owasp-global-training-tour-tel-aviv-isreal (closed)&lt;br /&gt;
&lt;br /&gt;
=='''Registration'''==&lt;br /&gt;
&lt;br /&gt;
Full details and registration will be available on the [https://appsecil.org/Training AppSecIL website].&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_World_Tour&amp;diff=232888</id>
		<title>OWASP World Tour</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_World_Tour&amp;diff=232888"/>
				<updated>2017-09-05T14:47:00Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:OWASP WT Banners wiki wiki (corrected).jpg|frameless|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
== OWASP World Tour - The Main Idea ==&lt;br /&gt;
OWASP is committed to improving the quality of the worlds software security.  We advocate approaching application security as a people, process, and technology problem because the most effective approaches to application security include improvements in all of these areas.  As part of this Philosophy, OWASP is offering basic AppSec training for Developers in hopes of including security throughout the entire SDLC.  The 2017 cities for this training are Boston, Tel Aviv, and Tokyo.  &lt;br /&gt;
&lt;br /&gt;
In accordance with the [[OWASP Strategic Goals|2017 strategic goal]], each of these one-day training events will target an audience of 500 developers and be delivered by Professional Trainers hired by OWASP.  You can register for free at the Registration page linked from each individual event page.  &lt;br /&gt;
&lt;br /&gt;
== Call for Trainers ==&lt;br /&gt;
https://owasp.submittable.com/submit &lt;br /&gt;
&lt;br /&gt;
== Events for 2017 ==&lt;br /&gt;
* [[2017 OWASP World Tour Tokyo|Tokyo Bootcamp]], September 30th&lt;br /&gt;
* [[2017 Global World Tour Boston|Boston OWASP Application Security Training]], October 9th, 2017&lt;br /&gt;
* [[2017 OWASP World Tour Israel|AppSec Israel Training Day]], October 17th, 2017&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_World_Tour&amp;diff=232887</id>
		<title>OWASP World Tour</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_World_Tour&amp;diff=232887"/>
				<updated>2017-09-05T14:46:07Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Added link to OWT-TA - AppSecIL&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:OWASP WT Banners wiki wiki (corrected).jpg|frameless|1024x1024px]]&lt;br /&gt;
&lt;br /&gt;
== OWASP World Tour - The Main Idea ==&lt;br /&gt;
OWASP is committed to improving the quality of the worlds software security.  We advocate approaching application security as a people, process, and technology problem because the most effective approaches to application security include improvements in all of these areas.  As part of this Philosophy, OWASP is offering basic AppSec training for Developers in hopes of including security throughout the entire SDLC.  The 2017 cities for this training are Boston, Tel Aviv, and Tokyo.  &lt;br /&gt;
&lt;br /&gt;
In accordance with the [[OWASP Strategic Goals|2017 strategic goal]], each of these one-day training events will target an audience of 500 developers and be delivered by Professional Trainers hired by OWASP.  You can register for free at the Registration page linked from each individual event page.  &lt;br /&gt;
&lt;br /&gt;
== Call for Trainers ==&lt;br /&gt;
https://owasp.submittable.com/submit &lt;br /&gt;
&lt;br /&gt;
== Events for 2017 ==&lt;br /&gt;
* [[2017 OWASP World Tour Tokyo|Tokyo Bootcamp]], September 30th&lt;br /&gt;
* [[2017 Global World Tour Boston|Boston OWASP Application Security Training]], October 9th, 2017&lt;br /&gt;
* [[2017 World Tour Israel|AppSec Israel Training Day]], October 17th, 2017&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_IL_Sponsorship&amp;diff=232886</id>
		<title>OWASP IL Sponsorship</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_IL_Sponsorship&amp;diff=232886"/>
				<updated>2017-09-05T13:59:43Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Legacy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Israel]]  &lt;br /&gt;
&lt;br /&gt;
OWASP is an open source, non-profit organization. While our activities are free for all, we do have costs, and need your help to make our activities better. &amp;lt;br&amp;gt;&lt;br /&gt;
We are also open to any other non-financial sponsorship ideas that you may have. These are some simple ways in which you can help us:   &lt;br /&gt;
&lt;br /&gt;
=== Please note this is an outdated legacy page. All details for supporting us have moved to [[Israel|our Chapter page]]. ===&lt;br /&gt;
&lt;br /&gt;
== Commercial Sponsoring an OWASP IL conference == &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| OWASP Israel chapter hosts a Regional Conference once a year, usually in September or October. This year, we are holding the Conference in partnership with the School of Computer Science at the College of Management, in Rishon, Israel. [[Israel#Previous_OWASP_Israel_Conferences_and_Meetings|These conferences]] are always very successful and a large number of people attend.&lt;br /&gt;
&lt;br /&gt;
We encourage companies to sponsor our conferences and help pay for such expenses such as refreshments, photography, video etc. The conferences are not commercial and the cost goes directly to cover expenses. Since the conferences draw an increasingly large number of people, our expenses are also rising accordingly.    &lt;br /&gt;
&lt;br /&gt;
If you or your company benefits from OWASP materials and/or conferences, we encourage you to support us! Moreover, the associated publicity and community goodwill can go a long way. We have several levels of sponsorship available, appropriate for the different organizations that wish to support our activities. Of course, if you are a Corporate Member of OWASP (at any level) and allocate a percentage (20-40%) of your membership fees to the Israel chapter, we can consider those funds as conference sponsorship.  It is also possible to be creative and find non-financial ways to support us and contribute to the successful running of the conference. (If you have any other ideas please contact [mailto:avi.douglen@owasp.org AviD] directly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Past sponsors include Check Point, Microsoft, F5, IBM, Ernst &amp;amp; Young, Checkmarx, Imperva, Quotium, Akamai, Synopsys and many others'''&lt;br /&gt;
&lt;br /&gt;
| https://www.owasp.org/images/9/96/OWASP_IL_Conf_graphics_small.jpg &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What You Get for Sponsoring ===&lt;br /&gt;
All sponsors, regardless of sponsorship level receive the following: &lt;br /&gt;
&lt;br /&gt;
* Many thanks, and hopefully a very good feeling of helping the community.&lt;br /&gt;
&lt;br /&gt;
* Access to all the tools, guides, and libraries OWASP makes available for everybody - if you benefit from these, support the organization! &lt;br /&gt;
&lt;br /&gt;
* Logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* In general, if there is something else specific that you may want, and is within the OWASP guidelines, please let us know.&lt;br /&gt;
&lt;br /&gt;
==== Platinum Sponsors (3 max) ==== &lt;br /&gt;
&lt;br /&gt;
* Largest booth area, where you can put up a &amp;quot;roll up&amp;quot; poster or two, and even a &amp;quot;pop-up&amp;quot; style booth (space permitting) to hand out your brochures and freebies. &lt;br /&gt;
&lt;br /&gt;
* Prime booth location and first choice. &lt;br /&gt;
&lt;br /&gt;
* Largest logo on the top of the conference page. &lt;br /&gt;
&lt;br /&gt;
* Logo on the chapter page for the whole year. &lt;br /&gt;
&lt;br /&gt;
* Recognition in all conference literature. &lt;br /&gt;
&lt;br /&gt;
* Explicit mention in conference Opening Speech.&lt;br /&gt;
&lt;br /&gt;
==== Gold Sponsors ====&lt;br /&gt;
&lt;br /&gt;
* A table top style mini booth where you can put up a &amp;quot;roll up&amp;quot; poster or two and hand out your brochures and freebies.&lt;br /&gt;
&lt;br /&gt;
* Good booth location and early choice. &lt;br /&gt;
&lt;br /&gt;
* Large logo near the top of the conference page. &lt;br /&gt;
&lt;br /&gt;
* Logo on the chapter page for the whole year.  &lt;br /&gt;
&lt;br /&gt;
* Recognition in all conference literature. &lt;br /&gt;
&lt;br /&gt;
* Collective mention in conference Opening Speech.&lt;br /&gt;
&lt;br /&gt;
==== Silver Sponsors ====&lt;br /&gt;
&lt;br /&gt;
* A small table top style mini booth where you can put up a &amp;quot;roll up&amp;quot; poster and hand out your brochures and freebies.&lt;br /&gt;
&lt;br /&gt;
* Smaller logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Recognition in some conference literature. &lt;br /&gt;
&lt;br /&gt;
* Passive mention in conference Opening Speech. &lt;br /&gt;
&lt;br /&gt;
==== Community Supporters ==== &lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Community Supporter&amp;quot; level of sponsorship is intended for non-profits, government offices, small startups, and other organizations with limited finances, but wish to show their support for the local OWASP chapter. &lt;br /&gt;
&lt;br /&gt;
* Small logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Community Supporters do not get a booth or table at the sponsor's display area, but you can leave a stack of fliers or swag at a central table. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What You Don't Get ===&lt;br /&gt;
* List of people registering or attending. You can collect these by yourself in the booth, for example by offering a prize for people filling in details.&lt;br /&gt;
&lt;br /&gt;
* A lecture for money. The conference program is strictly selected on professional terms.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What We Need Your Money For ===&lt;br /&gt;
&lt;br /&gt;
OWASP is very strictly not-for-profit. We use the sponsorship funds to help make our events even more compelling to the audience while striving to make them free for participants. We want more people to come to our events so we can educate them about making applications more secure.   &lt;br /&gt;
&lt;br /&gt;
We use the money collected from sponsors for things such as:&lt;br /&gt;
&lt;br /&gt;
* '''Lecture videos''' - recording presentations enables them to be available also to people who cannot make it to the conference, and further publicize the contents of the event. &lt;br /&gt;
&lt;br /&gt;
* '''Venue costs''' - this year's conference is being hosted in partnership with the College of Management, so we have minimal direct costs for use of the halls. However there are additional associated costs, for some of the involved logistics such as hiring required equipment. &lt;br /&gt;
&lt;br /&gt;
* '''Refreshments''' - we want to keep people a long time, and we certainly bring good and interesting speakers, yet we don't want people to go home when they become hungry.&lt;br /&gt;
&lt;br /&gt;
* '''Name tags''' - we feel that professional networking and getting to know each other is an important facet of the community, and name tags make this easier.&lt;br /&gt;
&lt;br /&gt;
* '''Promotion''' - Till now, our events are publicized mostly by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
&lt;br /&gt;
* '''Printed Materials''' - We are not very keen on killing trees, but some people learn more from actual printed paper. We would like to hand out certain printed materials in our conferences.&lt;br /&gt;
&lt;br /&gt;
By the way, if you feel that you can contribute to any of these in anyway besides money, we will be happy to hear about it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What Should You Prepare as a Sponsor ===&lt;br /&gt;
As a sponsor, you are not obliged to do anything. Sponsorship can be a philanthropy. However, in order to take advantage of the benefits listed above, we recommend the following:&lt;br /&gt;
&lt;br /&gt;
* Send us a logo file to put on the conference web page. (Note the maximum logo size according to the sponsorship level). &lt;br /&gt;
&lt;br /&gt;
* Prepare a roll-up type poster or equivalent for your table top booth.&lt;br /&gt;
&lt;br /&gt;
* Prepare brochures for handling out to conference attendees.&lt;br /&gt;
&lt;br /&gt;
* You might also want to hold a sweepstake between people who fill in their details in order to collect leads. We will be happy to announce the prize on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Come 30 minutes before the conference starts to setup your booth.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further details contact [mailto:avi.douglen@owasp.org AviD] or [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
&lt;br /&gt;
== Not-for-Profit / Barter Sponsorship of OWASP IL Conferences ==&lt;br /&gt;
&lt;br /&gt;
We are happy to allow any information security related not-for-profit organization to present at our conference expo. You will get, for free, the same benefits that the commercial vendors get. The only condition is that if you hold similar events we would like to present at those events in return.&lt;br /&gt;
&lt;br /&gt;
We extend the same type of barter to commercial organizations that hold events. If you organize an information security related event, we would let you promote it in our expo in return for having presence in your event.&lt;br /&gt;
&lt;br /&gt;
Contact [mailto:avi.douglen@owasp.org AviD] for further details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Hosting a meeting ==&lt;br /&gt;
&lt;br /&gt;
We also host regular meetings and look for companies to host or sponsor these meetings. A company that hosts such a meeting is responsible for a meeting location and the refreshments. We need a room that can host at least 150 people. Pizza and drinks are the common refreshments, but alternatives are also OK. Keep in mind that food should be Kosher.&lt;br /&gt;
&lt;br /&gt;
If you want to host such a meeting, contact [mailto:avi.douglen@owasp.org AviD].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Membership ==&lt;br /&gt;
&lt;br /&gt;
In addition to sponsoring OWASP Israel, you can also join OWASP as a member. For details, please refer to [http://www.owasp.org/index.php/Membership this page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel Meetings]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP2017_HackingBLEApplications_TalMelamed.pdf&amp;diff=232176</id>
		<title>File:OWASP2017 HackingBLEApplications TalMelamed.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP2017_HackingBLEApplications_TalMelamed.pdf&amp;diff=232176"/>
				<updated>2017-08-11T00:56:23Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Avi Douglen uploaded a new version of File:OWASP2017 HackingBLEApplications TalMelamed.pdf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hacking BLE Applications&lt;br /&gt;
Tal Melamed&lt;br /&gt;
OWASP IL 2017&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSec_Israel_2017_Sponsorships.pdf&amp;diff=231776</id>
		<title>File:AppSec Israel 2017 Sponsorships.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSec_Israel_2017_Sponsorships.pdf&amp;diff=231776"/>
				<updated>2017-07-20T11:03:29Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Israel&amp;diff=231430</id>
		<title>Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Israel&amp;diff=231430"/>
				<updated>2017-07-07T14:19:37Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Added June'17 meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[:Category:Israel]]&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
&lt;br /&gt;
[[image:Owasp_Israel_logo.png|center|500px]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;!-- Any = Heading 1 = markup will create a new tab until after the &amp;lt;/headertabs&amp;gt; --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1st Tab start --&amp;gt;&lt;br /&gt;
= Welcome =&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&amp;lt;!-- 1st Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2nd Tab start --&amp;gt;&lt;br /&gt;
= Current Activity =&lt;br /&gt;
&lt;br /&gt;
== Meetings ==&lt;br /&gt;
&lt;br /&gt;
* OWASP Europe 2018 is planned to be in Israel. For sponsorship, questions, suggestions and more, contanct '''[mailto:avi.douglen@owasp.org Avi Douglen]'''&lt;br /&gt;
* [http://www.meetup.com/OWASP-Israel/ Ongoing Meetings and socialization on Meetup]. [[file:Meetup-logo-2x.png|75px|link=http://www.meetup.com/OWASP-Israel/]]&lt;br /&gt;
&lt;br /&gt;
== Hebrew Translations ==  &lt;br /&gt;
&lt;br /&gt;
; '''The OWASP Top 10, 2013 version was translated to Hebrew! &amp;lt;br&amp;gt; &lt;br /&gt;
It is now [[OWASP_Top10_Hebrew|available for download]].'''&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_Risk_Rating_Methodology|OWASP Risk Rating Methodology]], part of the [[OWASP_Testing_Project|OWASP Testing Project]], has been translated to Hebrew, and is available for download in [[Media:OWASP_Risk_Rating_Methodology-Hebrew.pdf|PDF format]]. &lt;br /&gt;
Much thanks to Tal Argoni from TriadSec.&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
* Security discussion forum in Hebrew - on [https://www.facebook.com/groups/owasp.il/ Facebook]. [[file:Facebook_logo_small.jpg|100px|link=https://www.facebook.com/groups/owasp.il/]]&lt;br /&gt;
* [https://www.linkedin.com/groups/39702 LinkedIn Group] for networking and announcements. [[file:Delhi_linkedin.jpg|100px|link=https://www.linkedin.com/groups/39702]]&lt;br /&gt;
* [https://owasp.slack.com/messages/chapter-israel/ Chat room] for security in Hebrew. [[file:Slack.png|90px|link=https://owasp.slack.com/messages/chapter-israel/]]  &lt;br /&gt;
* [https://twitter.com/OWASP_IL Twitter] account. [[file:twitter_wide.jpg|75px|link=https://twitter.com/OWASP_IL]]&lt;br /&gt;
* [[OWASP_IL_Sponsorship|Sponsorship opportunities]], including #AppSecIL conference sponsorship. &lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up! Contact [mailto:avi.douglen@owasp.org Avi Douglen] with any ideas you have.&lt;br /&gt;
&amp;lt;!-- 2nd Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3rd Tab start --&amp;gt;&lt;br /&gt;
= Chapter Details =&lt;br /&gt;
== The Team ==&lt;br /&gt;
&lt;br /&gt;
Chapter leader: '''[mailto:avi.douglen@owasp.org Avi Douglen]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board: '''[mailto:avi.douglen@owasp.org Avi Douglen]''', '''Or Katz''', ''' Ofer Maor''', '''Erez Metula''', '''Hemed Gur Ary''', '''[[User:YossiOren|Dr. Yossi Oren]]'''&lt;br /&gt;
* Chapter Founder: '''[mailto:ofer@shezaf.com Ofer Shezaf]'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Avi Douglen, Ofer Maor, Yossi Oren, [[User:Eyigal|Yigal Elefant]]&lt;br /&gt;
* Mailing List Management: Avi Douglen, Ofer Maor, Or Katz   &lt;br /&gt;
&lt;br /&gt;
== General Activity ==&lt;br /&gt;
* An annual conference, usually in September or October. &lt;br /&gt;
* Periodic meetings. If you would like to host a meeting or speak in one contact [mailto:avi.douglen@owasp.org Avi Douglen] or [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
* Translation of OWASP resources to Hebrew&lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
&amp;lt;!-- 3rd Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 4th Tab start --&amp;gt;&lt;br /&gt;
= Previous Annual Conferences =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot;|&lt;br /&gt;
! width=&amp;quot;250&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2016|AppSec Israel 2016]]'''&lt;br /&gt;
| '''September 19th 2016'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''more than 650 attendees!'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2016_Presentations|presentations info page]] to download presentations and videos&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2015|AppSec Israel 2015]]'''&lt;br /&gt;
| '''October 13th, 2015'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''over 550 participants!'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2015_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2014|AppSec Israel 2014]]'''&lt;br /&gt;
| '''September 2nd, 2014'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
| '''over 450 participants!'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2014_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2013|OWASP Israel 2013]]'''&lt;br /&gt;
| '''October 1st, 2013'''&lt;br /&gt;
|&lt;br /&gt;
| '''480 participants!'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2012|OWASP Israel 2012 conference]]'''&lt;br /&gt;
| '''Sep 5th, 2012'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2011|OWASP Israel 2011 Conference]]'''&lt;br /&gt;
| '''Sep 15th, 2011'''&lt;br /&gt;
| '''IDC in Herzeliya'''&lt;br /&gt;
| '''350 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2010|OWASP Israel 2010 Conference]]'''&lt;br /&gt;
| '''Sep 6th, 2010'''&lt;br /&gt;
| '''IDC in Herzliya'''&lt;br /&gt;
| '''150 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2009|OWASP Israel 2009]]'''&lt;br /&gt;
| '''Sunday, September 6th 2009'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''September 14th, 2008'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| '''250 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]'''&lt;br /&gt;
| '''June 3rd, 2008'''&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |OWASP sponsored the IDC Security Road Show event in Israel. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''Dec 3rd 2007'''&lt;br /&gt;
| '''Interdisciplinary Center (IDC) Herzliya'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya. The conference really set itself as an event you must come to if you have anything to do with application security. [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 4th Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5th Tab start --&amp;gt;&lt;br /&gt;
= Previous Meetings =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot;|&lt;br /&gt;
! width=&amp;quot;250&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2017|OWASP Israel June 2017]]&lt;br /&gt;
| June 20th, 2017&lt;br /&gt;
| Intuit Israel, HaHarash St. 4, Hod Hasharon&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2017|OWASP Israel April 2017]]&lt;br /&gt;
| April 3rd, 2017&lt;br /&gt;
| Checkmarx's offices, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan&lt;br /&gt;
| 75 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2017|OWASP Israel January 2017]]&lt;br /&gt;
| January 18th, 2017&lt;br /&gt;
| Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal&lt;br /&gt;
| 120 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2016|OWASP Israel June 2016]]&lt;br /&gt;
| June 14, 2016&lt;br /&gt;
| Amdocs Auditorium in Raanana&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2016|OWASP Israel April 2016]]&lt;br /&gt;
| April 12, 2016&lt;br /&gt;
| HP Enterprise in Yehud&lt;br /&gt;
| 150 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_February_2016|OWASP Israel February 2016]]&lt;br /&gt;
| February 2, 2016&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2015|OWASP Israel June 2015]]&lt;br /&gt;
| June 16, 2015&lt;br /&gt;
| Microsoft in Herzeliya&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_March_2015|OWASP Israel March 2015]]&lt;br /&gt;
| March 30, 2015&lt;br /&gt;
| NCR in Raanana&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2014|OWASP Israel June 2014]]&lt;br /&gt;
| June 16, 2014&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
| 110 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2014|OWASP Israel April 2014]]&lt;br /&gt;
| April 23, 2014&lt;br /&gt;
| Akamai in Herzliya Pituach&lt;br /&gt;
| 100 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2014|OWASP Israel January 2014]]&lt;br /&gt;
| January 14th, 2014&lt;br /&gt;
| Amdocs in Ra'anana &lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_05|OWASP Israel May 2013]]&lt;br /&gt;
| May 28th, 2013&lt;br /&gt;
| RSA&lt;br /&gt;
| 80 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_02|OWASP Israel February 2013]]&lt;br /&gt;
| February 12th, 2013&lt;br /&gt;
| E&amp;amp;Y&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |[[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_06|OWASP Israel Jun-2010]]&lt;br /&gt;
| Jun 22nd, 2010&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_02|OWASP Israel Feb-2010]]&lt;br /&gt;
| Feb 9th, 2010&lt;br /&gt;
| Amdocs in Ra'anana&lt;br /&gt;
| 70 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_01|OWASP Israel Jan-2010]]&lt;br /&gt;
| Jan 12th, 2010 &lt;br /&gt;
| Breach Security in Herzliya&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_12|OWASP Israel Dec-2009]]&lt;br /&gt;
| Dec 2009&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]]&lt;br /&gt;
| May 7th, 2009&lt;br /&gt;
| IBM in Park Azorim in Petach-Tikva&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]]&lt;br /&gt;
| March 26th, 2009&lt;br /&gt;
| Tel-Aviv University&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, 2bsecure ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, Breach Security ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, Xiom ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]]&lt;br /&gt;
| January 28th, 2009&lt;br /&gt;
| Checkpoint&lt;br /&gt;
| 100 people&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 5th Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Above the following line = Heading 1 = will create a new tab --&amp;gt;&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&amp;lt;!-- Below this line = Heading 1 = will not create tabs anymore --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Sponsors = &lt;br /&gt;
&lt;br /&gt;
The OWASP Israel chapter's yearly activity is being supported by the generous sponsorship of the following companies: &lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Israel_Sponsors}} &lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]] [[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_June_2017&amp;diff=231363</id>
		<title>OWASP Israel June 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_June_2017&amp;diff=231363"/>
				<updated>2017-07-06T10:50:12Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The 3rd meeting of the Israeli chapter of OWASP in 2017 was held on Tuesday, June 20th, at 17:00. &lt;br /&gt;
&lt;br /&gt;
The meeting was hosted by Intuit Israel, HaHarash St. 4, Hod Hasharon, Israel.&lt;br /&gt;
&lt;br /&gt;
Attendance was free as always, here is the link to the Meetup event:   &lt;br /&gt;
https://www.meetup.com/OWASP-Israel/events/240224137/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda: ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
''' 17:00 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
'''Gathering, food, and drinks (KOSHER)'''  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:30 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
''' Introductions and Opening Notes '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:45 – Encrypting Data at Scale ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Gleb Keselman, Intuit Data Protection Services ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Intuit's internal key management service served, just over a month ago, to encrypt the tax and financial history of more than 30 million American citizens. Overall, this required 2 billion cryptographic operations to encrypt and decrypt application data.  &lt;br /&gt;
&lt;br /&gt;
Scaling a key management service requires a combination of system-level best practices along with novel cryptographic solutions. We will discuss how we are able to achieve a high level of security, combined with ease of use for developers and great performance.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 18:30 – &amp;quot;... well then, we have an OWASP Top 10 opportunity&amp;quot; ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Josh Grossman, Comsec Group ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A couple of months ago the draft 2017 version of the OWASP Top 10 list was released and with it came some surprises and some controversy.  &lt;br /&gt;
&lt;br /&gt;
Whilst the Top 10 is very widely used, many people do not realise how it is actually produced and what it is based on. When I dug into the process behind it, the picture became even more concerning.   &lt;br /&gt;
&lt;br /&gt;
In this session, I will explain the basis of the latest Top 10 list, summarise the reaction to the recent release and give my take on what I think should be done next. I will also suggest how we can use the Top 10 list and other OWASP projects to give better application security advice and also how we can contribute back. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:15 - Coffee Break ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:30 – Cloud Security for Startups - From A to E(xit) ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Shahar Maor, Outbrain ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Eitan Satmary, Wix ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Founding a startup is a hard work. The daily roller coaster can exhaust you fast. And on top of that, you need to cope with information security challenges, compliance and tough questions from customers.  &lt;br /&gt;
&lt;br /&gt;
The Israeli chapter of the Cloud Security Alliance is helping the local startup community cope with those challenges. Over the last couple of years we have identified a gap in the InfoSec knowledge and produced a Best Practices manual, designed for startups that rely on Cloud infrastructure. This talk is a digest of a paper created by the Israeli Chapter of the CSA to help Software-as-a-Service startups (SaaS-SUs) gain and maintain client trust, by building solid security foundations. &lt;br /&gt;
&lt;br /&gt;
Link to the paper: https://chapters.cloudsecurityalliance.org/israel/papers/ &lt;br /&gt;
&lt;br /&gt;
[[Category:Israel]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_June_2017&amp;diff=231362</id>
		<title>OWASP Israel June 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_June_2017&amp;diff=231362"/>
				<updated>2017-07-06T10:47:40Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Created page with &amp;quot;The 3rd meeting of the Israeli chapter of OWASP in 2017 was held on Tuesday, June 20th, at 17:00.   The meeting was hosted by Intuit Israel, HaHarash St. 4, Hod Hasharon, Isra...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The 3rd meeting of the Israeli chapter of OWASP in 2017 was held on Tuesday, June 20th, at 17:00. &lt;br /&gt;
&lt;br /&gt;
The meeting was hosted by Intuit Israel, HaHarash St. 4, Hod Hasharon, Israel.&lt;br /&gt;
&lt;br /&gt;
Attendance was free as always, here is the link to the Meetup event:   &lt;br /&gt;
https://www.meetup.com/OWASP-Israel/events/240224137/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda: ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
''' 17:00 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
'''Gathering, food, and drinks (KOSHER)'''  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:30 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
''' Introductions and Opening Notes '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:45 – Encrypting Data at Scale ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Gleb Keselman, Intuit Data Protection Services ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Intuit's internal key management service served, just over a month ago, to encrypt the tax and financial history of more than 30 million American citizens. Overall, this required 2 billion cryptographic operations to encrypt and decrypt application data.  &lt;br /&gt;
&lt;br /&gt;
Scaling a key management service requires a combination of system-level best practices along with novel cryptographic solutions. We will discuss how we are able to achieve a high level of security, combined with ease of use for developers and great performance.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 18:30 – &amp;quot;... well then, we have an OWASP Top 10 opportunity&amp;quot; ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Josh Grossman, Comsec Group ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A couple of months ago the draft 2017 version of the OWASP Top 10 list was released and with it came some surprises and some controversy.  &lt;br /&gt;
&lt;br /&gt;
Whilst the Top 10 is very widely used, many people do not realise how it is actually produced and what it is based on. When I dug into the process behind it, the picture became even more concerning.   &lt;br /&gt;
&lt;br /&gt;
In this session, I will explain the basis of the latest Top 10 list, summarise the reaction to the recent release and give my take on what I think should be done next. I will also suggest how we can use the Top 10 list and other OWASP projects to give better application security advice and also how we can contribute back. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:15 - Coffee Break ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:30 – Cloud Security for Startups - From A to E(xit) ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Shahar Maor, Outbrain ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Eitan Satmary, Wix ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Founding a startup is a hard work. The daily roller coaster can exhaust you fast. And on top of that, you need to cope with information security challenges, compliance and tough questions from customers.  &lt;br /&gt;
&lt;br /&gt;
The Israeli chapter of the Cloud Security Alliance is helping the local startup community cope with those challenges. Over the last couple of years we have identified a gap in the InfoSec knowledge and produced a Best Practices manual, designed for startups that rely on Cloud infrastructure. This talk is a digest of a paper created by the Israeli Chapter of the CSA to help Software-as-a-Service startups (SaaS-SUs) gain and maintain client trust, by building solid security foundations. &lt;br /&gt;
&lt;br /&gt;
Link to the paper: https://chapters.cloudsecurityalliance.org/israel/papers/ &lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_IL_Sponsorship&amp;diff=229580</id>
		<title>OWASP IL Sponsorship</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_IL_Sponsorship&amp;diff=229580"/>
				<updated>2017-05-12T00:57:08Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Israel]]  &lt;br /&gt;
&lt;br /&gt;
OWASP is an open source, non-profit organization. While our activities are free for all, we do have costs, and need your help to make our activities better. &amp;lt;br&amp;gt;&lt;br /&gt;
We are also open to any other non-financial sponsorship ideas that you may have. These are some simple ways in which you can help us:   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Commercial Sponsoring an OWASP IL conference == &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| OWASP Israel chapter hosts a Regional Conference once a year, usually in September or October. This year, we are holding the Conference in partnership with the School of Computer Science at the College of Management, in Rishon, Israel. [[Israel#Previous_OWASP_Israel_Conferences_and_Meetings|These conferences]] are always very successful and a large number of people attend.&lt;br /&gt;
&lt;br /&gt;
We encourage companies to sponsor our conferences and help pay for such expenses such as refreshments, photography, video etc. The conferences are not commercial and the cost goes directly to cover expenses. Since the conferences draw an increasingly large number of people, our expenses are also rising accordingly.    &lt;br /&gt;
&lt;br /&gt;
If you or your company benefits from OWASP materials and/or conferences, we encourage you to support us! Moreover, the associated publicity and community goodwill can go a long way. We have several levels of sponsorship available, appropriate for the different organizations that wish to support our activities. Of course, if you are a Corporate Member of OWASP (at any level) and allocate a percentage (20-40%) of your membership fees to the Israel chapter, we can consider those funds as conference sponsorship.  It is also possible to be creative and find non-financial ways to support us and contribute to the successful running of the conference. (If you have any other ideas please contact [mailto:douglen@hotmail.com AviD] directly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Past sponsors include Check Point, Microsoft, F5, IBM, Ernst &amp;amp; Young, Checkmarx, Imperva, Quotium, Akamai, Synopsys and many others'''&lt;br /&gt;
&lt;br /&gt;
| https://www.owasp.org/images/9/96/OWASP_IL_Conf_graphics_small.jpg &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What You Get for Sponsoring ===&lt;br /&gt;
All sponsors, regardless of sponsorship level receive the following: &lt;br /&gt;
&lt;br /&gt;
* Many thanks, and hopefully a very good feeling of helping the community.&lt;br /&gt;
&lt;br /&gt;
* Access to all the tools, guides, and libraries OWASP makes available for everybody - if you benefit from these, support the organization! &lt;br /&gt;
&lt;br /&gt;
* Logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* In general, if there is something else specific that you may want, and is within the OWASP guidelines, please let us know.&lt;br /&gt;
&lt;br /&gt;
==== Platinum Sponsors (3 max) ==== &lt;br /&gt;
&lt;br /&gt;
* Largest booth area, where you can put up a &amp;quot;roll up&amp;quot; poster or two, and even a &amp;quot;pop-up&amp;quot; style booth (space permitting) to hand out your brochures and freebies. &lt;br /&gt;
&lt;br /&gt;
* Prime booth location and first choice. &lt;br /&gt;
&lt;br /&gt;
* Largest logo on the top of the conference page. &lt;br /&gt;
&lt;br /&gt;
* Logo on the chapter page for the whole year. &lt;br /&gt;
&lt;br /&gt;
* Recognition in all conference literature. &lt;br /&gt;
&lt;br /&gt;
* Explicit mention in conference Opening Speech.&lt;br /&gt;
&lt;br /&gt;
==== Gold Sponsors ====&lt;br /&gt;
&lt;br /&gt;
* A table top style mini booth where you can put up a &amp;quot;roll up&amp;quot; poster or two and hand out your brochures and freebies.&lt;br /&gt;
&lt;br /&gt;
* Good booth location and early choice. &lt;br /&gt;
&lt;br /&gt;
* Large logo near the top of the conference page. &lt;br /&gt;
&lt;br /&gt;
* Logo on the chapter page for the whole year.  &lt;br /&gt;
&lt;br /&gt;
* Recognition in all conference literature. &lt;br /&gt;
&lt;br /&gt;
* Collective mention in conference Opening Speech.&lt;br /&gt;
&lt;br /&gt;
==== Silver Sponsors ====&lt;br /&gt;
&lt;br /&gt;
* A small table top style mini booth where you can put up a &amp;quot;roll up&amp;quot; poster and hand out your brochures and freebies.&lt;br /&gt;
&lt;br /&gt;
* Smaller logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Recognition in some conference literature. &lt;br /&gt;
&lt;br /&gt;
* Passive mention in conference Opening Speech. &lt;br /&gt;
&lt;br /&gt;
==== Community Supporters ==== &lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Community Supporter&amp;quot; level of sponsorship is intended for non-profits, government offices, small startups, and other organizations with limited finances, but wish to show their support for the local OWASP chapter. &lt;br /&gt;
&lt;br /&gt;
* Small logo on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Community Supporters do not get a booth or table at the sponsor's display area, but you can leave a stack of fliers or swag at a central table. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What You Don't Get ===&lt;br /&gt;
* List of people registering or attending. You can collect these by yourself in the booth, for example by offering a prize for people filling in details.&lt;br /&gt;
&lt;br /&gt;
* A lecture for money. The conference program is strictly selected on professional terms.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What We Need Your Money For ===&lt;br /&gt;
&lt;br /&gt;
OWASP is very strictly not-for-profit. We use the sponsorship funds to help make our events even more compelling to the audience while striving to make them free for participants. We want more people to come to our events so we can educate them about making applications more secure.   &lt;br /&gt;
&lt;br /&gt;
We use the money collected from sponsors for things such as:&lt;br /&gt;
&lt;br /&gt;
* '''Lecture videos''' - recording presentations enables them to be available also to people who cannot make it to the conference, and further publicize the contents of the event. &lt;br /&gt;
&lt;br /&gt;
* '''Venue costs''' - this year's conference is being hosted in partnership with the College of Management, so we have minimal direct costs for use of the halls. However there are additional associated costs, for some of the involved logistics such as hiring required equipment. &lt;br /&gt;
&lt;br /&gt;
* '''Refreshments''' - we want to keep people a long time, and we certainly bring good and interesting speakers, yet we don't want people to go home when they become hungry.&lt;br /&gt;
&lt;br /&gt;
* '''Name tags''' - we feel that professional networking and getting to know each other is an important facet of the community, and name tags make this easier.&lt;br /&gt;
&lt;br /&gt;
* '''Promotion''' - Till now, our events are publicized mostly by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
&lt;br /&gt;
* '''Printed Materials''' - We are not very keen on killing trees, but some people learn more from actual printed paper. We would like to hand out certain printed materials in our conferences.&lt;br /&gt;
&lt;br /&gt;
By the way, if you feel that you can contribute to any of these in anyway besides money, we will be happy to hear about it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What Should You Prepare as a Sponsor ===&lt;br /&gt;
As a sponsor, you are not obliged to do anything. Sponsorship can be a philanthropy. However, in order to take advantage of the benefits listed above, we recommend the following:&lt;br /&gt;
&lt;br /&gt;
* Send us a logo file to put on the conference web page. (Note the maximum logo size according to the sponsorship level). &lt;br /&gt;
&lt;br /&gt;
* Prepare a roll-up type poster or equivalent for your table top booth.&lt;br /&gt;
&lt;br /&gt;
* Prepare brochures for handling out to conference attendees.&lt;br /&gt;
&lt;br /&gt;
* You might also want to hold a sweepstake between people who fill in their details in order to collect leads. We will be happy to announce the prize on the conference page. &lt;br /&gt;
&lt;br /&gt;
* Come 30 minutes before the conference starts to setup your booth.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For further details contact [mailto:douglen@hotmail.com AviD] or [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
&lt;br /&gt;
== Not-for-Profit / Barter Sponsorship of OWASP IL Conferences ==&lt;br /&gt;
&lt;br /&gt;
We are happy to allow any information security related not-for-profit organization to present at our conference expo. You will get, for free, the same benefits that the commercial vendors get. The only condition is that if you hold similar events we would like to present at those events in return.&lt;br /&gt;
&lt;br /&gt;
We extend the same type of barter to commercial organizations that hold events. If you organize an information security related event, we would let you promote it in our expo in return for having presence in your event.&lt;br /&gt;
&lt;br /&gt;
Contact [mailto:douglen@hotmail.com AviD] for further details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Hosting a meeting ==&lt;br /&gt;
&lt;br /&gt;
We also host regular meetings and look for companies to host or sponsor these meetings. A company that hosts such a meeting is responsible for a meeting location and the refreshments. We need a room that can host at least 150 people. Pizza and drinks are the common refreshments, but alternatives are also OK. Keep in mind that food should be Kosher.&lt;br /&gt;
&lt;br /&gt;
If you want to host such a meeting, contact [mailto:douglen@hotmail.com AviD].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Membership ==&lt;br /&gt;
&lt;br /&gt;
In addition to sponsoring OWASP Israel, you can also join OWASP as a member. For details, please refer to [http://www.owasp.org/index.php/Membership this page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel Meetings]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=229459</id>
		<title>Category:Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=229459"/>
				<updated>2017-05-08T11:04:42Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Added sponsors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp_Israel_logo.png|center|500px]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter leader is '''[mailto:avi.douglen@owasp.org Avi Douglen]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board: '''[mailto:avi.douglen@owasp.org Avi Douglen]''', '''Or Katz''', ''' Ofer Maor''', '''Erez Metula''', '''Hemed Gur Ary''', '''[[User:YossiOren|Dr. Yossi Oren]]'''&lt;br /&gt;
* Chapter Founder: '''[mailto:ofer@shezaf.com Ofer Shezaf]'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Avi Douglen, Ofer Maor, Yossi Oren&lt;br /&gt;
* Mailing List Management: Avi Douglen, Ofer Maor, Or Katz   &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Israel&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Activity ==&lt;br /&gt;
&lt;br /&gt;
* An annual conference, usually in September or October. &lt;br /&gt;
* Periodic meetings. If you would like to host a meeting or speak in one contact [mailto:avi.douglen@owasp.org Avi Douglen] or [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew translation]].&lt;br /&gt;
* Security discussion forum in Hebrew - on [https://www.facebook.com/groups/owasp.il/ Facebook]. &lt;br /&gt;
* [https://www.linkedin.com/groups/39702 LinkedIn Group] for networking and announcements. &lt;br /&gt;
* [https://owasp.slack.com/messages/chapter-israel/ Chat room for security in Hebrew].&lt;br /&gt;
* [http://www.meetup.com/OWASP-Israel/ Meetings and socialization on Meetup].&lt;br /&gt;
* [https://twitter.com/OWASP_IL Twitter account]. &lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
* [[OWASP_IL_Sponsorship|Sponsorship opportunities]], including #AppSecIL conference sponsorship. &lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up! Contact [mailto:avi.douglen@owasp.org Avi Douglen] with any ideas you have.&lt;br /&gt;
&lt;br /&gt;
== Hebrew Translations ==  &lt;br /&gt;
&lt;br /&gt;
; '''The OWASP Top 10, 2013 version was translated to Hebrew! &amp;lt;br&amp;gt; &lt;br /&gt;
It is now [[OWASP_Top10_Hebrew|available for download]].'''&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_Risk_Rating_Methodology|OWASP Risk Rating Methodology]], part of the [[OWASP_Testing_Project|OWASP Testing Project]], has been translated to Hebrew, and is available for download in [[Media:OWASP_Risk_Rating_Methodology-Hebrew.pdf|PDF format]]. &lt;br /&gt;
Much thanks to Tal Argoni from TriadSec.&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors == &lt;br /&gt;
&lt;br /&gt;
The OWASP Israel chapter's yearly activity is being supported by the generous sponsorship of the following companies: &lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Israel_Sponsors}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous OWASP Israel Conferences and Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2017|OWASP Israel April 2017]] took place in Checkmarx's offices, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan, on April 3rd, 2016. Around 75 people attended. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_January_2017|OWASP Israel January 2017]] took place in Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal, on January 18th, 2016. Around 120 people attended. &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2016|AppSec Israel 2016]] Conference was held on Monday, September 19th, at the College of Management, with more than 650 attendees! (Use the [[AppSec_Israel_2016_Presentations|presentations info page]] to download presentations and videos)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2016|OWASP Israel June 2016]] took place in the Amdocs Auditorium in Raanana, on June 14, 2016. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2016|OWASP Israel April 2016]] was held at HP Enterprise in Yehud, on April 12, 2016, with over 150 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_February_2016|OWASP Israel February 2016]] was held at F5 Networks in Tel Aviv, on February 2, 2016. &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2015|AppSec Israel 2015]] Conference was held on October 13th, at the College of Management, with over 550 participants! (Use the [[AppSec_Israel_2015_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2015|OWASP Israel June 2015]] was held at Microsoft in Herzeliya, on June 16, 2015, with around 120 participants.   &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_March_2015|OWASP Israel March 2015]] was held at NCR in Raanana, on March 30, 2015, with over 120 participants.  &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2014|AppSec Israel 2014]] Conference was held on September 2nd, at the IDC, with over 450 participants! (Use the [[AppSec_Israel_2014_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2014|OWASP Israel June 2014]] was held at F5 Networks in Tel Aviv, on June 16, 2014, with over 110 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2014|OWASP Israel April 2014]] was held at Akamai in Herzliya Pituach, on April 23, 2014, with close to 100 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_January_2014|OWASP Israel January 2014]] was held at Amdocs in Ra'anana on January 14th, 2014, with over 120 participants.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2013|OWASP Israel 2013]] Conference held on October 1st with close to 480 participants! (Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2013_05|OWASP Israel May 2013]] was held at RSA on May 28th 2013 with 80 participants.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2013_02|OWASP Israel February 2013]]  meeting was held at E&amp;amp;Y on February 12th 2013 ([[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]).&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2012|OWASP Israel 2012 conference]] Was held at the IDC on Sep 5th 2012.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2011|OWASP Israel 2011 Conference]] Was held in the IDC in Herzliya on Sep 15th 2011, with about 350 attendees. &lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010|OWASP Israel 2010 Conference]] Was held in the IDC in Herzliya on Sep 6th 2010 with about 150 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_06|OWASP Israel Jun-2010]] meeting was held in IBM/Watchfire in Herzliya on Jun 22nd 2010.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_02|OWASP Israel Feb-2010]] meeting was held in Amdocs in Ra'anana on Feb 9th 2010 with over 70 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_01|OWASP Israel Jan-2010]] meeting was held in Breach Security in Herzliya on Jan 12th 2010 with over 60 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2009_12|OWASP Israel Dec-2009]] meeting was held in IBM/Watchfire in Herzliya in Dec 2009.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009|OWASP Israel 2009]] conference was held at the Interdisciplinary Center Herzliya on Sunday, September 6th 2009. &lt;br /&gt;
: You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]].&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]] was held at IBM in Park Azorim in Petach-Tikva on May 7th. The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]] was held at the Tel-Aviv University on March 26th, with approximately 60 attendees. The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, [http://www.2bsecure.co.il 2bsecure] ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, [http://www.breach.com Breach Security] ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, [http://www.xiom.com Xiom] ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]] was held at Checkpoint on January 28th, with over a 100 people attending. The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference at the Interdisciplinary Center Herzliya (IDC)]] was held on September 14th with 250 attendees.&lt;br /&gt;
&lt;br /&gt;
; OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]&lt;br /&gt;
: OWASP sponsored the IDC Security Road Show event in Israel on June 3rd 2008. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]&lt;br /&gt;
: the 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya. The conference really set itself as an event you must come to if you have anything to do with application security. [ [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]] [[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:OWASP_Israel_Sponsors&amp;diff=229458</id>
		<title>Template:OWASP Israel Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:OWASP_Israel_Sponsors&amp;diff=229458"/>
				<updated>2017-05-08T11:00:34Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Created page with &amp;quot;&amp;lt;span style=&amp;quot;color:gray; font-size:1.8em; font-family:sans-serif; &amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/span&amp;gt; &amp;lt;hr/&amp;gt;&amp;lt;br/&amp;gt;  {| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto; border-spacing:10px; border-c...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;span style=&amp;quot;color:gray; font-size:1.8em; font-family:sans-serif; &amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/span&amp;gt; &amp;lt;hr/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin:auto; border-spacing:10px; border-collapse:collapse;&amp;quot;&lt;br /&gt;
| style=&amp;quot;padding: 10px;&amp;quot; | [[image:Intuit_IL_250.gif|center|link=http://careers.intuit.com/|250x100px]]&lt;br /&gt;
| style=&amp;quot;padding: 10px;&amp;quot; | [[image:SafeBreach_logo.png|center|link=https://www.safebreach.com/|250x100px]] &lt;br /&gt;
| style=&amp;quot;padding: 10px;&amp;quot; | [[image:GE_digital_logo.png|center|link=https://www.ge.com/digital/|250x100px]] &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:gold; font-size:1.5em; font-family:sans-serif; &amp;quot;&amp;gt;Gold Sponsors&amp;lt;/span&amp;gt; &amp;lt;hr/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin: auto;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[image:OWASPIL_ColMan.jpg|link=https://www.colman.ac.il/|225x90px]] &lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[image:AppSecLabsIL_New.jpg|link=https://www.appsec-labs.com/|225x90px]] &lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[image:Akamai_LogoIL_Gold.png|link=https://www.akamai.com/|225x90px]] &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; |[[image:Synopsys_375.jpg|center|link=https://www.synopsys.com/software/pages/default.aspx|225x90px]]&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[image:Imperva_logox375.png|link=https://www.imperva.com/|225x90px]]&lt;br /&gt;
| style=&amp;quot;text-align:center;&amp;quot; | [[image:PMO_Israel_logo.png|link=|225x90px]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Intuit_IL_250.gif&amp;diff=229457</id>
		<title>File:Intuit IL 250.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Intuit_IL_250.gif&amp;diff=229457"/>
				<updated>2017-05-08T10:59:43Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_April_2017&amp;diff=228481</id>
		<title>OWASP Israel April 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_April_2017&amp;diff=228481"/>
				<updated>2017-04-07T12:59:00Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The 2nd meeting in 2017 of the Israeli chapter of OWASP will hold a meeting on Monday, April 3rd, at 17:00. &lt;br /&gt;
&lt;br /&gt;
The meeting will be held at Checkmarx's office, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan. &lt;br /&gt;
&lt;br /&gt;
Attendance is free of course, but you must register if you are planning to attend:   &lt;br /&gt;
https://www.meetup.com/OWASP-Israel/events/238112640/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda: ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
''' 17:00 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
'''Gathering, food, and drinks (KOSHER)'''  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:30 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
''' Introductions and Opening Notes '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:45 – The Borders are Dissolving – Application Security Crystal Ball ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Maty Siman, Checkmarx ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Over several years applications have become central to anything we do. Whether web, mobile or even IoT applications, they all control almost every aspect of our daily lives. For that exact same reason they have also become the hacker’s new best friend. But it seems that there is a change happening and it isn’t being discussed as often as it should. Data and financial gain is still considered the end goal but the how is dramatically changing. &lt;br /&gt;
&lt;br /&gt;
Join us to try to envision what kind of attacks we will be seeing in the near future, how and who will be taking or dropping responsibility and how modern development practices may benefit attack techniques.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 18:30 - Automated security tests using ZAP and Webdriver.io ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Omer Levi Hevroni, Soluto  ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
([[Media:OWASPIL-2017-04-03_Automated-tests-ZAP-Webdriverio_OmerLeviHevroni.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Webdriver.io is a great framework for writing automation tests for your webapp. With a very small configuration you can easily integrate ZAP`s passive scan into those tests, and upgrade those tests into automated security scanning – by enjoying from all the useful things that ZAP is able to detect. I am going to cover how we did this at Soluto – and as we run everything using Docker containers, it is very easy to reproduce this setup for any webapp with existing Webdriver.io/Selenium tests. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:15 – Coffee break  ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:30 – WebShell AV signature bypass and identification ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Gil Cohen, Comsec ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
([[Media:OWASPIL-2017-04-03_WebShell-AV-Signature-Bypass_GilCohen.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Ever wondered how easy or hard it is to trick a signature based defensive product? Ever wanted to bypass such a product to upload your own malicious web-shell file to an attacked web server? This lecture is for you!&lt;br /&gt;
In a very lightweight, straightforward and eye-opening talk I’m going to show how easy it is to upload a slightly modified version of the famous C99 webshell, to get full control over a web server, and how ineffective are signature based modules of defensive products. I’m also going to show tips on how to identify a web-shell, and present 2 open-source tools that try to do just that.&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPIL-2017-04-03_WebShell-AV-Signature-Bypass_GilCohen.pdf&amp;diff=228480</id>
		<title>File:OWASPIL-2017-04-03 WebShell-AV-Signature-Bypass GilCohen.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPIL-2017-04-03_WebShell-AV-Signature-Bypass_GilCohen.pdf&amp;diff=228480"/>
				<updated>2017-04-07T12:58:50Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=228479</id>
		<title>Category:Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=228479"/>
				<updated>2017-04-07T12:57:16Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp_Israel_logo.png|center|500px]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter leader is '''[mailto:avi.douglen@owasp.org Avi Douglen]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board: '''[mailto:avi.douglen@owasp.org Avi Douglen]''', '''Or Katz''', ''' Ofer Maor''', '''Erez Metula''', '''Hemed Gur Ary''', '''[[User:YossiOren|Dr. Yossi Oren]]'''&lt;br /&gt;
* Chapter Founder: '''[mailto:ofer@shezaf.com Ofer Shezaf]'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Avi Douglen, Ofer Maor, Yossi Oren&lt;br /&gt;
* Mailing List Management: Avi Douglen, Ofer Maor, Or Katz   &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Israel&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Activity ==&lt;br /&gt;
&lt;br /&gt;
* An annual conference, usually in September or October. &lt;br /&gt;
* Periodic meetings. If you would like to host a meeting or speak in one contact [mailto:avi.douglen@owasp.org Avi Douglen] or [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew translation]].&lt;br /&gt;
* Security discussion forum in Hebrew - on [https://www.facebook.com/groups/owasp.il/ Facebook]. &lt;br /&gt;
* [https://www.linkedin.com/groups/39702 LinkedIn Group] for networking and announcements. &lt;br /&gt;
* [https://owasp.slack.com/messages/chapter-israel/ Chat room for security in Hebrew].&lt;br /&gt;
* [http://www.meetup.com/OWASP-Israel/ Meetings and socialization on Meetup].&lt;br /&gt;
* [https://twitter.com/OWASP_IL Twitter account]. &lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
* [[OWASP_IL_Sponsorship|Sponsorship opportunities]], including #AppSecIL conference sponsorship. &lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up! Contact [mailto:avi.douglen@owasp.org Avi Douglen] with any ideas you have.&lt;br /&gt;
&lt;br /&gt;
== Hebrew Translations ==  &lt;br /&gt;
&lt;br /&gt;
; '''The OWASP Top 10, 2013 version was translated to Hebrew! &amp;lt;br&amp;gt; &lt;br /&gt;
It is now [[OWASP_Top10_Hebrew|available for download]].'''&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_Risk_Rating_Methodology|OWASP Risk Rating Methodology]], part of the [[OWASP_Testing_Project|OWASP Testing Project]], has been translated to Hebrew, and is available for download in [[Media:OWASP_Risk_Rating_Methodology-Hebrew.pdf|PDF format]]. &lt;br /&gt;
Much thanks to Tal Argoni from TriadSec.&lt;br /&gt;
&lt;br /&gt;
== Previous OWASP Israel Conferences and Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2017|OWASP Israel April 2017]] took place in Checkmarx's offices, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan, on April 3rd, 2016. Around 75 people attended. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_January_2017|OWASP Israel January 2017]] took place in Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal, on January 18th, 2016. Around 120 people attended. &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2016|AppSec Israel 2016]] Conference was held on Monday, September 19th, at the College of Management, with more than 650 attendees! (Use the [[AppSec_Israel_2016_Presentations|presentations info page]] to download presentations and videos)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2016|OWASP Israel June 2016]] took place in the Amdocs Auditorium in Raanana, on June 14, 2016. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2016|OWASP Israel April 2016]] was held at HP Enterprise in Yehud, on April 12, 2016, with over 150 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_February_2016|OWASP Israel February 2016]] was held at F5 Networks in Tel Aviv, on February 2, 2016. &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2015|AppSec Israel 2015]] Conference was held on October 13th, at the College of Management, with over 550 participants! (Use the [[AppSec_Israel_2015_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2015|OWASP Israel June 2015]] was held at Microsoft in Herzeliya, on June 16, 2015, with around 120 participants.   &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_March_2015|OWASP Israel March 2015]] was held at NCR in Raanana, on March 30, 2015, with over 120 participants.  &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2014|AppSec Israel 2014]] Conference was held on September 2nd, at the IDC, with over 450 participants! (Use the [[AppSec_Israel_2014_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2014|OWASP Israel June 2014]] was held at F5 Networks in Tel Aviv, on June 16, 2014, with over 110 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2014|OWASP Israel April 2014]] was held at Akamai in Herzliya Pituach, on April 23, 2014, with close to 100 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_January_2014|OWASP Israel January 2014]] was held at Amdocs in Ra'anana on January 14th, 2014, with over 120 participants.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2013|OWASP Israel 2013]] Conference held on October 1st with close to 480 participants! (Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2013_05|OWASP Israel May 2013]] was held at RSA on May 28th 2013 with 80 participants.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2013_02|OWASP Israel February 2013]]  meeting was held at E&amp;amp;Y on February 12th 2013 ([[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]).&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2012|OWASP Israel 2012 conference]] Was held at the IDC on Sep 5th 2012.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2011|OWASP Israel 2011 Conference]] Was held in the IDC in Herzliya on Sep 15th 2011, with about 350 attendees. &lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010|OWASP Israel 2010 Conference]] Was held in the IDC in Herzliya on Sep 6th 2010 with about 150 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_06|OWASP Israel Jun-2010]] meeting was held in IBM/Watchfire in Herzliya on Jun 22nd 2010.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_02|OWASP Israel Feb-2010]] meeting was held in Amdocs in Ra'anana on Feb 9th 2010 with over 70 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_01|OWASP Israel Jan-2010]] meeting was held in Breach Security in Herzliya on Jan 12th 2010 with over 60 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2009_12|OWASP Israel Dec-2009]] meeting was held in IBM/Watchfire in Herzliya in Dec 2009.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009|OWASP Israel 2009]] conference was held at the Interdisciplinary Center Herzliya on Sunday, September 6th 2009. &lt;br /&gt;
: You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]].&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]] was held at IBM in Park Azorim in Petach-Tikva on May 7th. The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]] was held at the Tel-Aviv University on March 26th, with approximately 60 attendees. The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, [http://www.2bsecure.co.il 2bsecure] ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, [http://www.breach.com Breach Security] ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, [http://www.xiom.com Xiom] ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]] was held at Checkpoint on January 28th, with over a 100 people attending. The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference at the Interdisciplinary Center Herzliya (IDC)]] was held on September 14th with 250 attendees.&lt;br /&gt;
&lt;br /&gt;
; OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]&lt;br /&gt;
: OWASP sponsored the IDC Security Road Show event in Israel on June 3rd 2008. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]&lt;br /&gt;
: the 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya. The conference really set itself as an event you must come to if you have anything to do with application security. [ [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]] [[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_April_2017&amp;diff=228298</id>
		<title>OWASP Israel April 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_April_2017&amp;diff=228298"/>
				<updated>2017-04-04T12:11:25Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The 2nd meeting in 2017 of the Israeli chapter of OWASP will hold a meeting on Monday, April 3rd, at 17:00. &lt;br /&gt;
&lt;br /&gt;
The meeting will be held at Checkmarx's office, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan. &lt;br /&gt;
&lt;br /&gt;
Attendance is free of course, but you must register if you are planning to attend:   &lt;br /&gt;
https://www.meetup.com/OWASP-Israel/events/238112640/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda: ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
''' 17:00 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
'''Gathering, food, and drinks (KOSHER)'''  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:30 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
''' Introductions and Opening Notes '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:45 – The Borders are Dissolving – Application Security Crystal Ball ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Maty Siman, Checkmarx ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Over several years applications have become central to anything we do. Whether web, mobile or even IoT applications, they all control almost every aspect of our daily lives. For that exact same reason they have also become the hacker’s new best friend. But it seems that there is a change happening and it isn’t being discussed as often as it should. Data and financial gain is still considered the end goal but the how is dramatically changing. &lt;br /&gt;
&lt;br /&gt;
Join us to try to envision what kind of attacks we will be seeing in the near future, how and who will be taking or dropping responsibility and how modern development practices may benefit attack techniques.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 18:30 - Automated security tests using ZAP and Webdriver.io ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Omer Levi Hevroni, Soluto  ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
([[Media:OWASPIL-2017-04-03_Automated-tests-ZAP-Webdriverio_OmerLeviHevroni.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Webdriver.io is a great framework for writing automation tests for your webapp. With a very small configuration you can easily integrate ZAP`s passive scan into those tests, and upgrade those tests into automated security scanning – by enjoying from all the useful things that ZAP is able to detect. I am going to cover how we did this at Soluto – and as we run everything using Docker containers, it is very easy to reproduce this setup for any webapp with existing Webdriver.io/Selenium tests. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:15 – Coffee break  ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:30 – WebShell AV signature bypass and identification ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Gil Cohen, Comsec ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ever wondered how easy or hard it is to trick a signature based defensive product? Ever wanted to bypass such a product to upload your own malicious web-shell file to an attacked web server? This lecture is for you!&lt;br /&gt;
In a very lightweight, straightforward and eye-opening talk I’m going to show how easy it is to upload a slightly modified version of the famous C99 webshell, to get full control over a web server, and how ineffective are signature based modules of defensive products. I’m also going to show tips on how to identify a web-shell, and present 2 open-source tools that try to do just that.&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPIL-2017-04-03_Automated-tests-ZAP-Webdriverio_OmerLeviHevroni.pdf&amp;diff=228297</id>
		<title>File:OWASPIL-2017-04-03 Automated-tests-ZAP-Webdriverio OmerLeviHevroni.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPIL-2017-04-03_Automated-tests-ZAP-Webdriverio_OmerLeviHevroni.pdf&amp;diff=228297"/>
				<updated>2017-04-04T12:11:06Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_April_2017&amp;diff=228296</id>
		<title>OWASP Israel April 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_April_2017&amp;diff=228296"/>
				<updated>2017-04-04T12:08:30Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The 2nd meeting in 2017 of the Israeli chapter of OWASP will hold a meeting on Monday, April 3rd, at 17:00. &lt;br /&gt;
&lt;br /&gt;
The meeting will be held at Checkmarx's office, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan. &lt;br /&gt;
&lt;br /&gt;
Attendance is free of course, but you must register if you are planning to attend:   &lt;br /&gt;
https://www.meetup.com/OWASP-Israel/events/238112640/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda: ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
''' 17:00 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
'''Gathering, food, and drinks (KOSHER)'''  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:30 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
''' Introductions and Opening Notes '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:45 – The Borders are Dissolving – Application Security Crystal Ball ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Maty Siman, Checkmarx ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Over several years applications have become central to anything we do. Whether web, mobile or even IoT applications, they all control almost every aspect of our daily lives. For that exact same reason they have also become the hacker’s new best friend. But it seems that there is a change happening and it isn’t being discussed as often as it should. Data and financial gain is still considered the end goal but the how is dramatically changing. &lt;br /&gt;
&lt;br /&gt;
Join us to try to envision what kind of attacks we will be seeing in the near future, how and who will be taking or dropping responsibility and how modern development practices may benefit attack techniques.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 18:30 - Automated security tests using ZAP and Webdriver.io ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Omer Levi Hevroni, Soluto  ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
([[Media:OWASPIL-2017-04-03_Automated-tests-ZAP-Webdriverio_OmerLeviHevroni.pptx|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Webdriver.io is a great framework for writing automation tests for your webapp. With a very small configuration you can easily integrate ZAP`s passive scan into those tests, and upgrade those tests into automated security scanning – by enjoying from all the useful things that ZAP is able to detect. I am going to cover how we did this at Soluto – and as we run everything using Docker containers, it is very easy to reproduce this setup for any webapp with existing Webdriver.io/Selenium tests. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:15 – Coffee break  ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:30 – WebShell AV signature bypass and identification ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Gil Cohen, Comsec ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ever wondered how easy or hard it is to trick a signature based defensive product? Ever wanted to bypass such a product to upload your own malicious web-shell file to an attacked web server? This lecture is for you!&lt;br /&gt;
In a very lightweight, straightforward and eye-opening talk I’m going to show how easy it is to upload a slightly modified version of the famous C99 webshell, to get full control over a web server, and how ineffective are signature based modules of defensive products. I’m also going to show tips on how to identify a web-shell, and present 2 open-source tools that try to do just that.&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_April_2017&amp;diff=228039</id>
		<title>OWASP Israel April 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_April_2017&amp;diff=228039"/>
				<updated>2017-03-28T22:45:07Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Created page with &amp;quot;The 2nd meeting in 2017 of the Israeli chapter of OWASP will hold a meeting on Monday, April 3rd, at 17:00.   The meeting will be held at Checkmarx's office, in the Amot Atriu...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The 2nd meeting in 2017 of the Israeli chapter of OWASP will hold a meeting on Monday, April 3rd, at 17:00. &lt;br /&gt;
&lt;br /&gt;
The meeting will be held at Checkmarx's office, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan. &lt;br /&gt;
&lt;br /&gt;
Attendance is free of course, but you must register if you are planning to attend:   &lt;br /&gt;
https://www.meetup.com/OWASP-Israel/events/238112640/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda: ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
''' 17:00 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
'''Gathering, food, and drinks (KOSHER)'''  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:30 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
''' Introductions and Opening Notes '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:45 – The Borders are Dissolving – Application Security Crystal Ball ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Amit Ashbel, Checkmarx ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Over several years applications have become central to anything we do. Whether web, mobile or even IoT applications, they all control almost every aspect of our daily lives. For that exact same reason they have also become the hacker’s new best friend. But it seems that there is a change happening and it isn’t being discussed as often as it should. Data and financial gain is still considered the end goal but the how is dramatically changing. &lt;br /&gt;
&lt;br /&gt;
Join us to try to envision what kind of attacks we will be seeing in the near future, how and who will be taking or dropping responsibility and how modern development practices may benefit attack techniques.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 18:30 - Automated security tests using ZAP and Webdriver.io ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Omer Levi Hevroni, Soluto  ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Webdriver.io is a great framework for writing automation tests for your webapp. With a very small configuration you can easily integrate ZAP`s passive scan into those tests, and upgrade those tests into automated security scanning – by enjoying from all the useful things that ZAP is able to detect. I am going to cover how we did this at Soluto – and as we run everything using Docker containers, it is very easy to reproduce this setup for any webapp with existing Webdriver.io/Selenium tests. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:15 – Coffee break  ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:30 – WebShell AV signature bypass and identification ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Gil Cohen, Comsec ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ever wondered how easy or hard it is to trick a signature based defensive product? Ever wanted to bypass such a product to upload your own malicious web-shell file to an attacked web server? This lecture is for you!&lt;br /&gt;
In a very lightweight, straightforward and eye-opening talk I’m going to show how easy it is to upload a slightly modified version of the famous C99 webshell, to get full control over a web server, and how ineffective are signature based modules of defensive products. I’m also going to show tips on how to identify a web-shell, and present 2 open-source tools that try to do just that.&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=228038</id>
		<title>Category:Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=228038"/>
				<updated>2017-03-28T22:36:15Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp_Israel_logo.png|center|500px]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter leader is '''[mailto:avi.douglen@owasp.org Avi Douglen]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board: '''[mailto:avi.douglen@owasp.org Avi Douglen]''', '''Or Katz''', ''' Ofer Maor''', '''Erez Metula''', '''Hemed Gur Ary''', '''[[User:YossiOren|Dr. Yossi Oren]]'''&lt;br /&gt;
* Chapter Founder: '''[mailto:ofer@shezaf.com Ofer Shezaf]'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Avi Douglen, Ofer Maor, Yossi Oren&lt;br /&gt;
* Mailing List Management: Avi Douglen, Ofer Maor, Or Katz   &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Israel&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Activity ==&lt;br /&gt;
&lt;br /&gt;
* An annual conference, usually in September or October. &lt;br /&gt;
* Periodic meetings. If you would like to host a meeting or speak in one contact [mailto:avi.douglen@owasp.org Avi Douglen] or [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew translation]].&lt;br /&gt;
* Security discussion forum in Hebrew - on [https://www.facebook.com/groups/owasp.il/ Facebook]. &lt;br /&gt;
* [https://www.linkedin.com/groups/39702 LinkedIn Group] for networking and announcements. &lt;br /&gt;
* [https://owasp.slack.com/messages/chapter-israel/ Chat room for security in Hebrew].&lt;br /&gt;
* [http://www.meetup.com/OWASP-Israel/ Meetings and socialization on Meetup].&lt;br /&gt;
* [https://twitter.com/OWASP_IL Twitter account]. &lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
* [[OWASP_IL_Sponsorship|Sponsorship opportunities]], including #AppSecIL conference sponsorship. &lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up! Contact [mailto:avi.douglen@owasp.org Avi Douglen] with any ideas you have.&lt;br /&gt;
&lt;br /&gt;
== Hebrew Translations ==  &lt;br /&gt;
&lt;br /&gt;
; '''The OWASP Top 10, 2013 version was translated to Hebrew! &amp;lt;br&amp;gt; &lt;br /&gt;
It is now [[OWASP_Top10_Hebrew|available for download]].'''&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_Risk_Rating_Methodology|OWASP Risk Rating Methodology]], part of the [[OWASP_Testing_Project|OWASP Testing Project]], has been translated to Hebrew, and is available for download in [[Media:OWASP_Risk_Rating_Methodology-Hebrew.pdf|PDF format]]. &lt;br /&gt;
Much thanks to Tal Argoni from TriadSec.&lt;br /&gt;
&lt;br /&gt;
== Previous OWASP Israel Conferences and Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2017|OWASP Israel April 2017]] will take place in Checkmarx's offices, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan, on April 3rd, 2016. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_January_2017|OWASP Israel January 2017]] took place in Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal, on January 18th, 2016. Around 120 people attended. &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2016|AppSec Israel 2016]] Conference was held on Monday, September 19th, at the College of Management, with more than 650 attendees! (Use the [[AppSec_Israel_2016_Presentations|presentations info page]] to download presentations and videos)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2016|OWASP Israel June 2016]] took place in the Amdocs Auditorium in Raanana, on June 14, 2016. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2016|OWASP Israel April 2016]] was held at HP Enterprise in Yehud, on April 12, 2016, with over 150 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_February_2016|OWASP Israel February 2016]] was held at F5 Networks in Tel Aviv, on February 2, 2016. &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2015|AppSec Israel 2015]] Conference was held on October 13th, at the College of Management, with over 550 participants! (Use the [[AppSec_Israel_2015_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2015|OWASP Israel June 2015]] was held at Microsoft in Herzeliya, on June 16, 2015, with around 120 participants.   &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_March_2015|OWASP Israel March 2015]] was held at NCR in Raanana, on March 30, 2015, with over 120 participants.  &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2014|AppSec Israel 2014]] Conference was held on September 2nd, at the IDC, with over 450 participants! (Use the [[AppSec_Israel_2014_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2014|OWASP Israel June 2014]] was held at F5 Networks in Tel Aviv, on June 16, 2014, with over 110 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2014|OWASP Israel April 2014]] was held at Akamai in Herzliya Pituach, on April 23, 2014, with close to 100 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_January_2014|OWASP Israel January 2014]] was held at Amdocs in Ra'anana on January 14th, 2014, with over 120 participants.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2013|OWASP Israel 2013]] Conference held on October 1st with close to 480 participants! (Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2013_05|OWASP Israel May 2013]] was held at RSA on May 28th 2013 with 80 participants.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2013_02|OWASP Israel February 2013]]  meeting was held at E&amp;amp;Y on February 12th 2013 ([[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]).&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2012|OWASP Israel 2012 conference]] Was held at the IDC on Sep 5th 2012.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2011|OWASP Israel 2011 Conference]] Was held in the IDC in Herzliya on Sep 15th 2011, with about 350 attendees. &lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010|OWASP Israel 2010 Conference]] Was held in the IDC in Herzliya on Sep 6th 2010 with about 150 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_06|OWASP Israel Jun-2010]] meeting was held in IBM/Watchfire in Herzliya on Jun 22nd 2010.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_02|OWASP Israel Feb-2010]] meeting was held in Amdocs in Ra'anana on Feb 9th 2010 with over 70 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_01|OWASP Israel Jan-2010]] meeting was held in Breach Security in Herzliya on Jan 12th 2010 with over 60 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2009_12|OWASP Israel Dec-2009]] meeting was held in IBM/Watchfire in Herzliya in Dec 2009.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009|OWASP Israel 2009]] conference was held at the Interdisciplinary Center Herzliya on Sunday, September 6th 2009. &lt;br /&gt;
: You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]].&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]] was held at IBM in Park Azorim in Petach-Tikva on May 7th. The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]] was held at the Tel-Aviv University on March 26th, with approximately 60 attendees. The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, [http://www.2bsecure.co.il 2bsecure] ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, [http://www.breach.com Breach Security] ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, [http://www.xiom.com Xiom] ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]] was held at Checkpoint on January 28th, with over a 100 people attending. The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference at the Interdisciplinary Center Herzliya (IDC)]] was held on September 14th with 250 attendees.&lt;br /&gt;
&lt;br /&gt;
; OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]&lt;br /&gt;
: OWASP sponsored the IDC Security Road Show event in Israel on June 3rd 2008. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]&lt;br /&gt;
: the 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya. The conference really set itself as an event you must come to if you have anything to do with application security. [ [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]] [[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=226183</id>
		<title>Category:Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=226183"/>
				<updated>2017-02-09T02:26:32Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: /* OWASP Top 10 in Hebrew */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp_Israel_logo.png|center|500px]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter leader is '''[mailto:avi.douglen@owasp.org Avi Douglen]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board: '''[mailto:avi.douglen@owasp.org Avi Douglen]''', '''Or Katz''', ''' Ofer Maor''', '''Erez Metula''', '''Hemed Gur Ary''', '''[[User:YossiOren|Dr. Yossi Oren]]'''&lt;br /&gt;
* Chapter Founder: '''[mailto:ofer@shezaf.com Ofer Shezaf]'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Avi Douglen, Ofer Maor, Yossi Oren&lt;br /&gt;
* Mailing List Management: Avi Douglen, Ofer Maor, Or Katz   &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Israel&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Activity ==&lt;br /&gt;
&lt;br /&gt;
* An annual conference, usually in September or October. &lt;br /&gt;
* Periodic meetings. If you would like to host a meeting or speak in one contact [mailto:avi.douglen@owasp.org Avi Douglen] or [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew translation]].&lt;br /&gt;
* Security discussion forum in Hebrew - on [https://www.facebook.com/groups/owasp.il/ Facebook]. &lt;br /&gt;
* [https://www.linkedin.com/groups/39702 LinkedIn Group] for networking and announcements. &lt;br /&gt;
* [https://owasp.slack.com/messages/chapter-israel/ Chat room for security in Hebrew].&lt;br /&gt;
* [http://www.meetup.com/OWASP-Israel/ Meetings and socialization on Meetup].&lt;br /&gt;
* [https://twitter.com/OWASP_IL Twitter account]. &lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
* [[OWASP_IL_Sponsorship|Sponsorship opportunities]], including #AppSecIL conference sponsorship. &lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up! Contact [mailto:avi.douglen@owasp.org Avi Douglen] with any ideas you have.&lt;br /&gt;
&lt;br /&gt;
== Hebrew Translations ==  &lt;br /&gt;
&lt;br /&gt;
; '''The OWASP Top 10, 2013 version was translated to Hebrew! &amp;lt;br&amp;gt; &lt;br /&gt;
It is now [[OWASP_Top10_Hebrew|available for download]].'''&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_Risk_Rating_Methodology|OWASP Risk Rating Methodology]], part of the [[OWASP_Testing_Project|OWASP Testing Project]], has been translated to Hebrew, and is available for download in [[Media:OWASP_Risk_Rating_Methodology-Hebrew.pdf|PDF format]]. &lt;br /&gt;
Much thanks to Tal Argoni from TriadSec.&lt;br /&gt;
&lt;br /&gt;
== Previous OWASP Israel Conferences and Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_January_2017|OWASP Israel January 2017]] will take place in Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal, on January 18th, 2016. &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2016|AppSec Israel 2016]] Conference was held on Monday, September 19th, at the College of Management, with more than 650 attendees! (Use the [[AppSec_Israel_2016_Presentations|presentations info page]] to download presentations and videos)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2016|OWASP Israel June 2016]] took place in the Amdocs Auditorium in Raanana, on June 14, 2016. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2016|OWASP Israel April 2016]] was held at HP Enterprise in Yehud, on April 12, 2016, with over 150 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_February_2016|OWASP Israel February 2016]] was held at F5 Networks in Tel Aviv, on February 2, 2016. &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2015|AppSec Israel 2015]] Conference was held on October 13th, at the College of Management, with over 550 participants! (Use the [[AppSec_Israel_2015_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2015|OWASP Israel June 2015]] was held at Microsoft in Herzeliya, on June 16, 2015, with around 120 participants.   &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_March_2015|OWASP Israel March 2015]] was held at NCR in Raanana, on March 30, 2015, with over 120 participants.  &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2014|AppSec Israel 2014]] Conference was held on September 2nd, at the IDC, with over 450 participants! (Use the [[AppSec_Israel_2014_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2014|OWASP Israel June 2014]] was held at F5 Networks in Tel Aviv, on June 16, 2014, with over 110 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2014|OWASP Israel April 2014]] was held at Akamai in Herzliya Pituach, on April 23, 2014, with close to 100 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_January_2014|OWASP Israel January 2014]] was held at Amdocs in Ra'anana on January 14th, 2014, with over 120 participants.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2013|OWASP Israel 2013]] Conference held on October 1st with close to 480 participants! (Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2013_05|OWASP Israel May 2013]] was held at RSA on May 28th 2013 with 80 participants.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2013_02|OWASP Israel February 2013]]  meeting was held at E&amp;amp;Y on February 12th 2013 ([[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]).&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2012|OWASP Israel 2012 conference]] Was held at the IDC on Sep 5th 2012.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2011|OWASP Israel 2011 Conference]] Was held in the IDC in Herzliya on Sep 15th 2011, with about 350 attendees. &lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010|OWASP Israel 2010 Conference]] Was held in the IDC in Herzliya on Sep 6th 2010 with about 150 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_06|OWASP Israel Jun-2010]] meeting was held in IBM/Watchfire in Herzliya on Jun 22nd 2010.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_02|OWASP Israel Feb-2010]] meeting was held in Amdocs in Ra'anana on Feb 9th 2010 with over 70 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_01|OWASP Israel Jan-2010]] meeting was held in Breach Security in Herzliya on Jan 12th 2010 with over 60 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2009_12|OWASP Israel Dec-2009]] meeting was held in IBM/Watchfire in Herzliya in Dec 2009.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009|OWASP Israel 2009]] conference was held at the Interdisciplinary Center Herzliya on Sunday, September 6th 2009. &lt;br /&gt;
: You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]].&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]] was held at IBM in Park Azorim in Petach-Tikva on May 7th. The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]] was held at the Tel-Aviv University on March 26th, with approximately 60 attendees. The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, [http://www.2bsecure.co.il 2bsecure] ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, [http://www.breach.com Breach Security] ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, [http://www.xiom.com Xiom] ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]] was held at Checkpoint on January 28th, with over a 100 people attending. The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference at the Interdisciplinary Center Herzliya (IDC)]] was held on September 14th with 250 attendees.&lt;br /&gt;
&lt;br /&gt;
; OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]&lt;br /&gt;
: OWASP sponsored the IDC Security Road Show event in Israel on June 3rd 2008. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]&lt;br /&gt;
: the 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya. The conference really set itself as an event you must come to if you have anything to do with application security. [ [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]] [[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project&amp;diff=226182</id>
		<title>OWASP Testing Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project&amp;diff=226182"/>
				<updated>2017-02-09T02:18:04Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: /* Translations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{OWASP Breakers}}&lt;br /&gt;
{{OWASP Book|5691953}}&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
= New OWASP Testing Guide  =&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:120%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Testing Guide v4  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ANNOUNCING THE NEW &amp;quot;OWASP TESTING GUIDE v4&lt;br /&gt;
&lt;br /&gt;
17th September, 2014: OWASP is announcing the new OWASP Testing Guide v4.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A big thank you to all the contributors and reviewers!&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
3rd August 2015, the OWASP Testing Guide v4 book now available!&lt;br /&gt;
&amp;lt;br&amp;gt;You can buy the Guide [http://www.lulu.com/shop/matteo-meucci-and-andrew-muller/testing-guide-40-release/paperback/product-22294314.html here] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Or you can download the Guide [[Media:OTGv4.pdf|here]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:OWTGv4 Cover.png]]&lt;br /&gt;
&lt;br /&gt;
Or browse the guide on the wiki [https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents here]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=https://www.owasp.org/index.php/Breakers]]&lt;br /&gt;
   |&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot;| &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Old OWASP Testing Guides =&lt;br /&gt;
&lt;br /&gt;
== OWASP Testing Guide v3  ==&lt;br /&gt;
&lt;br /&gt;
16th December 2008: OWASP Testing Guide v3 is finished!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*You can download the Guide in PDF [http://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf here] &lt;br /&gt;
*Download the presentation [https://www.owasp.org/images/2/2c/OWASP_EU_Summit_2008_OWASP_Testing_Guide_v3.ppt here] &lt;br /&gt;
*Browse the Testing Guide v3 on the wiki [https://www.owasp.org/index.php/OWASP_Testing_Guide_v3_Table_of_Contents here]&lt;br /&gt;
&lt;br /&gt;
''''NEW: OWASP projects and resources you can use TODAY''''&amp;lt;br&amp;gt;&lt;br /&gt;
16th April 2010 in London, OWASP leaders deliver a course focused on the main OWASP Projects.&amp;lt;br&amp;gt;&lt;br /&gt;
Matteo Meucci will deliver a training course on the OWASP Testing Guide v3. &amp;lt;br&amp;gt;&lt;br /&gt;
More information [http://www.owasp.org/index.php/London/Training/OWASP_projects_and_resources_you_can_use_TODAY here]&lt;br /&gt;
&lt;br /&gt;
Video @ FOSDEM 09: [http://fosdem.unixheads.org/2009/maintracks/owasp.ogv here] &lt;br /&gt;
&lt;br /&gt;
Citations:&lt;br /&gt;
&lt;br /&gt;
http://www.owasp.org/index.php/Testing_Guide_Quotes&lt;br /&gt;
&lt;br /&gt;
== Overview  ==&lt;br /&gt;
&lt;br /&gt;
This project's goal is to create a &amp;quot;best practices&amp;quot; web application penetration testing framework which users can implement in their own organizations and a &amp;quot;low level&amp;quot; web application penetration testing guide that describes how to find certain issues. &lt;br /&gt;
&lt;br /&gt;
Version 3 of the Testing Guide was released in December 2008 after going through a major upgrade through the [[OWASP Summer of Code 2008]]. &lt;br /&gt;
&lt;br /&gt;
= Background and Motivation  =&lt;br /&gt;
&lt;br /&gt;
'''History Behind Project''' The OWASP Testing guide originated in 2003 with Dan Cuthbert as one of the original editors. It was handed over to [[User:EoinKeary|Eoin Keary]] in 2005 and moved onto the new OWASP wiki when it came online. Being in a wiki is easier for people to contribute and has made updating much easier. [[User:Mmeucci|Matteo Meucci]] took on the Testing guide after Eoin and shepherded it through the version 2 and version 3 updates, which have been significant improvements. &lt;br /&gt;
&lt;br /&gt;
= Project History  =&lt;br /&gt;
&lt;br /&gt;
== OWASP Testing Guide v3  ==&lt;br /&gt;
&lt;br /&gt;
Testing Guide v3: plan (archive) &lt;br /&gt;
&lt;br /&gt;
26th April 2008: Version 3 of the Testing Guide started under [[OWASP Summer of Code 2008]]. &lt;br /&gt;
&lt;br /&gt;
6th November 2008: Completed draft created and previewed at [[OWASP EU Summit 2008|OWASP EU Summit 2008 in Portugal]]. &lt;br /&gt;
&lt;br /&gt;
Final stable release in December 2008 &lt;br /&gt;
&lt;br /&gt;
== OWASP Testing Guide v2  ==&lt;br /&gt;
&lt;br /&gt;
'''10th February 2007: The OWASP Testing Guide v2 is now published''' [[User:Mmeucci|Matteo Meucci]] (as part of his [[OWASP Autumn of Code 2006 - Projects: Testing Guide|AoC project]]) has just published the latest version of Testing guide which: &lt;br /&gt;
&lt;br /&gt;
*you can read it on line on the [http://www.owasp.org/index.php/OWASP_Testing_Guide_v2_Table_of_Contents Testing Guide v2 wiki] &lt;br /&gt;
*or download the Guide in [http://www.owasp.org/index.php/Image:OWASP_Testing_Guide_v2_pdf.zip Adobe PDF format] or in [http://www.owasp.org/index.php/Image:OWASP_Testing_Guide_v2_doc.zip Ms Doc format]&lt;br /&gt;
&lt;br /&gt;
'''OWASP Testing Guide v2 in Spanish:''' Now you can get a complete translation in [http://www.owasp.org/index.php/Image:OWASP_Testing_Guide_v2_spanish_doc.zip Ms Doc format] &lt;br /&gt;
&lt;br /&gt;
For comments or questions, please join the [http://lists.owasp.org/mailman/listinfo/owasp-testing OWASP Testing mailing list], read our archive and share your ideas. Alternatively you can contact [[User:EoinKeary|Eoin Keary]] or [[User:Mmeucci|Matteo Meucci]] directly. &lt;br /&gt;
&lt;br /&gt;
Here you can find: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Testing_Guide_Quotes The OWASP Testing Guide 'Quotes'] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Testing_Guide_Presentations Testing Guide presentations]&lt;br /&gt;
&lt;br /&gt;
= Related  =&lt;br /&gt;
&lt;br /&gt;
'''OWASP Testing Guide (v2+v3) Report Generator''' is found at [http://yehg.net/lab/#wasarg http://yehg.net/lab/#wasarg]. &lt;br /&gt;
&lt;br /&gt;
'''THE OWASP Testing Project Live CD''' The OWASP testing project is currently implementing an Application security Live CD. &amp;lt;br&amp;gt; LabRat Version 0.8 Alpha is just weeks away from Beta testing*. &lt;br /&gt;
&lt;br /&gt;
The aim of this CD is to have a complete testing suite on one Disk. The CD shall also contain the forthcoming OWASP Testing guide. &lt;br /&gt;
&lt;br /&gt;
The Live CD now has its own section you can find it here: [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project] &lt;br /&gt;
&lt;br /&gt;
= Feedback and Participation  =&lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Testing project useful. Please contribute back to the project by sending your comments, questions, and suggestions to the OWASP Testing mailing list. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Testing mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-testing subscription page]. &lt;br /&gt;
&lt;br /&gt;
= Translations =&lt;br /&gt;
&lt;br /&gt;
Thanks to the translators all around the world you can download the guide in the following languages:&lt;br /&gt;
&lt;br /&gt;
* Spanish in [http://www.owasp.org/images/8/80/Gu%C3%ADa_de_pruebas_de_OWASP_ver_3.0.pdf PDF] or [http://www.owasp.org/images/d/d7/Gu%C3%ADa_de_pruebas_de_OWASP_ver_3.0.zip MS Word] formats. (v3.0)&lt;br /&gt;
&lt;br /&gt;
* Chinese in [http://www.owasp.org/images/0/06/OWASP%E6%B5%8B%E8%AF%95%E6%8C%87%E5%8D%97%28%E4%B8%AD%E6%96%87%EF%BC%89.pdf PDF] format. (Thanks to the [http://www.owasp.org/index.php/China-Mainland China-mainland chapter]. (v3.0;  translation of v4.0 in process)&lt;br /&gt;
&lt;br /&gt;
* Japanese in [http://www.owasp.org/images/1/1e/OTGv3Japanese.pdf PDF] format here (this is a 1st draft of v3.0, final release coming soon).&lt;br /&gt;
&lt;br /&gt;
* '''Hebrew''' in [[Media:OWASP_Risk_Rating_Methodology-Hebrew.pdf|PDF format]] (Risk Rating Methodology only for now). Thanks to Tal Argoni from TriadSec.&lt;br /&gt;
&lt;br /&gt;
We invite you to explore and help us translate OWASP Testing Guide 4.0 at Crowdin. Please visit URL below to start translating this project:&lt;br /&gt;
&lt;br /&gt;
https://crowdin.com/project/owasp-testing-guide-40/invite&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP Testing Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|Testing Guide]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document|OWASP Stable Quality Document]] [[Category:SAMM-ST-1]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Risk_Rating_Methodology-Hebrew.pdf&amp;diff=226181</id>
		<title>File:OWASP Risk Rating Methodology-Hebrew.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Risk_Rating_Methodology-Hebrew.pdf&amp;diff=226181"/>
				<updated>2017-02-09T02:13:04Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_January_2017&amp;diff=225477</id>
		<title>OWASP Israel January 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_January_2017&amp;diff=225477"/>
				<updated>2017-01-23T16:58:00Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Israeli chapter of OWASP will hold a meeting on Wednesday, January 18th, at 17:00. &lt;br /&gt;
&lt;br /&gt;
The meeting will be held in Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal.  &lt;br /&gt;
&lt;br /&gt;
Attendance is free of course, but you must register if you are planning to attend:   &lt;br /&gt;
https://www.meetup.com/OWASP-Israel/events/236372466/ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda: ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
''' 17:00 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
'''Gathering, food, and drinks (KOSHER)'''  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:30 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
''' Introductions and Opening Notes '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:45 – IP Agnostic Bot Detection ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Michael Groskop, Director of WAF &amp;amp; R&amp;amp;D Security, Radware ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
([[Media:OWASPIL-2017-01-18_IPAgnostic-BotDetection_MichaelGroskop.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Bot-generated attacks targeting web application infrastructure are increasing in both volume and scope. Bots are becoming more sophisticated, leveraging headless browser technologies and use different evasion techniques such as dynamically changing IP addresses.   &lt;br /&gt;
&lt;br /&gt;
In this presentation we will review the challenges associated with IP agnostic detection of bot generated attacks, the complexity involved in distinguishing the good bots from the bad and the actions application developers can take for better thwarting of such attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' &amp;lt;span class=&amp;quot;mw-headline&amp;quot; id=&amp;quot;RUaBLE_BLE_Application_Hacking&amp;quot;&amp;gt;18:30 - R U aBLE? BLE Application Hacking&amp;lt;/span&amp;gt; ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Tal Melamed, Technical Lead, AppSec Labs ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
([[Media:OWASP2017_HackingBLEApplications_TalMelamed.pdf|download presentation]]) &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As IoT devices are increasingly embedded in our every day lives, vulnerabilities have real impact on our digital and physical security.  &lt;br /&gt;
&lt;br /&gt;
Bluetooth Low Energy (BLE), also known as Bluetooth Smart, is part of Bluetooth 4. Today Bluetooth is the most popular protocol used for interfacing IoT and smart devices, wearables and medical equipment. Like most rising technologies, security is often left out.  &lt;br /&gt;
&lt;br /&gt;
In this lecture we will demonstrate how to perform penetration-testing for applications communicating with connected-devices over BLE. What equipment, libraries and projects can be used.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
''' 19:15 – Coffee break  ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:30 – Should I Trust My Vendor? ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Yaniv Simsolo, CTO, Palantir Security ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Modern systems and business models mandate different approaches to security. Sometimes, the business objectives of the vendor override the security objectives that we, the security community, think the product should have. When approaching a complex system design, numerous challenges arise when considering the trust we put on vendors’ hands and vendors’ responsibilities. Similar security challenges exist on the other scale: considering the maturity (or lack thereof) of small scale IoT products.  &lt;br /&gt;
&lt;br /&gt;
Does the aim sanctify the means?   &lt;br /&gt;
&lt;br /&gt;
In certain cases, either mal-coding or business practices result in a very poor security of a product or a service. This can get to extreme cases were the vendor outright attacks its own customers. Such was the case for example when I purchased a brand new laptop from a known manufacturer, and was attacked with viruses and malicious business practices software. Indeed, certain vendors are worse than others.   &lt;br /&gt;
&lt;br /&gt;
In the presentation we will explore notable examples of vendors abusing their customers’ trust and review the (few) mitigation alternatives we may incorporate in our products and systems.&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPIL-2017-01-18_IPAgnostic-BotDetection_MichaelGroskop.pdf&amp;diff=225476</id>
		<title>File:OWASPIL-2017-01-18 IPAgnostic-BotDetection MichaelGroskop.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPIL-2017-01-18_IPAgnostic-BotDetection_MichaelGroskop.pdf&amp;diff=225476"/>
				<updated>2017-01-23T16:57:23Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_June_2016&amp;diff=225475</id>
		<title>OWASP Israel June 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_June_2016&amp;diff=225475"/>
				<updated>2017-01-23T16:56:40Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Israeli chapter of OWASP held a meeting on June 14, at 17:00, in the Amdocs Auditorium.   &lt;br /&gt;
&lt;br /&gt;
The address is Hapnina 8, Ra'anana.    &lt;br /&gt;
&lt;br /&gt;
Over 50 people attended. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetup: http://www.meetup.com/OWASP-Israel/events/229662688/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda: ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
''' 17:00 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
'''Gathering, food, and drinks (KOSHER)'''  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:30 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
''' Introductions and Opening Notes '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:45 – Insiders – The Threat is Already Within ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Sagie Dulce, Shiri Margel, Imperva ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
([[Media:OWASPIL-2016-06-14_Insiders-TheThreatisAlreadyWithin_SagieDulce-ShiriMargel.pdf|download presentation]])‎&lt;br /&gt;
&lt;br /&gt;
In recent years, we have witnessed a growing number of enterprises and government agencies suffer data breaches. While organizations are buffing up their security layers—which is important—most of the focus is on preventing direct threats that come from outside, while detecting threats from within is neglected. &lt;br /&gt;
&lt;br /&gt;
In this talk we will present our research data. Our data shows that insider threats, whether attributed to malicious, negligent or compromised insider, go unnoticed by common security tools. In order to detect insider attacks we suggest a mixture of Behavior Analytics and Deception technology. These technologies were deployed in several production environments. We then collected data from these environments and discovered different forms of insider threats in each and every deployment. Our data suggests that organizations are already experiencing some form of insider attack which current security technology does not address.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 18:30 – 1Password protects you, but who protects 1Password ? ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Adi Ludmer, Perimiterx ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
([[Media:OWASPIL-2016-06-14_1PasswordProtection_AdiLudmer.pdf|download presentation]])‎  &lt;br /&gt;
&lt;br /&gt;
1Password is one of the most popular Password managers in the world.&lt;br /&gt;
&lt;br /&gt;
The most important quality for tools in this category is the level of trust that they provide us when we let them guard our most sensitive data.&lt;br /&gt;
&lt;br /&gt;
In this talk we will explain (and demonstrate) several flaws in the design of 1Password’s architecture, that could potentially be exploited and put our sensitive data which is stored there at risk.&lt;br /&gt;
&lt;br /&gt;
We will also explain several flaws which have already been disclosed, and give some recommendations for how to use Password managers in a safer way. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:15 – Coffee break  ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:30 – Proxy based assertion ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Erez Kalman, Amdocs ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
([[Media:OWASPIL-2016-06-14_ProxyBasedAssertion_ErezKalman.pdf|download presentation]])‎  &lt;br /&gt;
&lt;br /&gt;
Secure method of using a single proxy entry point to pass assertion data for user authentication and authorization using the headers to other systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Israel]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=224935</id>
		<title>Category:Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=224935"/>
				<updated>2017-01-12T11:14:00Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: /* Previous OWASP Israel Conferences and Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp_Israel_logo.png|center|500px]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter leader is '''[mailto:avi.douglen@owasp.org Avi Douglen]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board: '''[mailto:avi.douglen@owasp.org Avi Douglen]''', '''Or Katz''', ''' Ofer Maor''', '''Erez Metula''', '''Hemed Gur Ary''', '''[[User:YossiOren|Dr. Yossi Oren]]'''&lt;br /&gt;
* Chapter Founder: '''[mailto:ofer@shezaf.com Ofer Shezaf]'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Avi Douglen, Ofer Maor, Yossi Oren&lt;br /&gt;
* Mailing List Management: Avi Douglen, Ofer Maor, Or Katz   &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Israel&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Activity ==&lt;br /&gt;
&lt;br /&gt;
* An annual conference, usually in September or October. &lt;br /&gt;
* Periodic meetings. If you would like to host a meeting or speak in one contact [mailto:avi.douglen@owasp.org Avi Douglen] or [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew translation]].&lt;br /&gt;
* Security discussion forum in Hebrew - on [https://www.facebook.com/groups/owasp.il/ Facebook]. &lt;br /&gt;
* [https://www.linkedin.com/groups/39702 LinkedIn Group] for networking and announcements. &lt;br /&gt;
* [https://owasp.slack.com/messages/chapter-israel/ Chat room for security in Hebrew].&lt;br /&gt;
* [http://www.meetup.com/OWASP-Israel/ Meetings and socialization on Meetup].&lt;br /&gt;
* [https://twitter.com/OWASP_IL Twitter account]. &lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
* [[OWASP_IL_Sponsorship|Sponsorship opportunities]], including #AppSecIL conference sponsorship. &lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up! Contact [mailto:avi.douglen@owasp.org Avi Douglen] with any ideas you have.&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 in Hebrew ==  &lt;br /&gt;
&lt;br /&gt;
; '''The OWASP Top 10, 2013 version was translated to Hebrew! &amp;lt;br&amp;gt; &lt;br /&gt;
It is now [[OWASP_Top10_Hebrew|available for download]].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous OWASP Israel Conferences and Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_January_2017|OWASP Israel January 2017]] will take place in Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal, on January 18th, 2016. &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2016|AppSec Israel 2016]] Conference was held on Monday, September 19th, at the College of Management, with more than 650 attendees! (Use the [[AppSec_Israel_2016_Presentations|presentations info page]] to download presentations and videos)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2016|OWASP Israel June 2016]] took place in the Amdocs Auditorium in Raanana, on June 14, 2016. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2016|OWASP Israel April 2016]] was held at HP Enterprise in Yehud, on April 12, 2016, with over 150 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_February_2016|OWASP Israel February 2016]] was held at F5 Networks in Tel Aviv, on February 2, 2016. &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2015|AppSec Israel 2015]] Conference was held on October 13th, at the College of Management, with over 550 participants! (Use the [[AppSec_Israel_2015_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2015|OWASP Israel June 2015]] was held at Microsoft in Herzeliya, on June 16, 2015, with around 120 participants.   &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_March_2015|OWASP Israel March 2015]] was held at NCR in Raanana, on March 30, 2015, with over 120 participants.  &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2014|AppSec Israel 2014]] Conference was held on September 2nd, at the IDC, with over 450 participants! (Use the [[AppSec_Israel_2014_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2014|OWASP Israel June 2014]] was held at F5 Networks in Tel Aviv, on June 16, 2014, with over 110 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2014|OWASP Israel April 2014]] was held at Akamai in Herzliya Pituach, on April 23, 2014, with close to 100 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_January_2014|OWASP Israel January 2014]] was held at Amdocs in Ra'anana on January 14th, 2014, with over 120 participants.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2013|OWASP Israel 2013]] Conference held on October 1st with close to 480 participants! (Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2013_05|OWASP Israel May 2013]] was held at RSA on May 28th 2013 with 80 participants.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2013_02|OWASP Israel February 2013]]  meeting was held at E&amp;amp;Y on February 12th 2013 ([[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]).&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2012|OWASP Israel 2012 conference]] Was held at the IDC on Sep 5th 2012.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2011|OWASP Israel 2011 Conference]] Was held in the IDC in Herzliya on Sep 15th 2011, with about 350 attendees. &lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010|OWASP Israel 2010 Conference]] Was held in the IDC in Herzliya on Sep 6th 2010 with about 150 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_06|OWASP Israel Jun-2010]] meeting was held in IBM/Watchfire in Herzliya on Jun 22nd 2010.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_02|OWASP Israel Feb-2010]] meeting was held in Amdocs in Ra'anana on Feb 9th 2010 with over 70 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_01|OWASP Israel Jan-2010]] meeting was held in Breach Security in Herzliya on Jan 12th 2010 with over 60 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2009_12|OWASP Israel Dec-2009]] meeting was held in IBM/Watchfire in Herzliya in Dec 2009.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009|OWASP Israel 2009]] conference was held at the Interdisciplinary Center Herzliya on Sunday, September 6th 2009. &lt;br /&gt;
: You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]].&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]] was held at IBM in Park Azorim in Petach-Tikva on May 7th. The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]] was held at the Tel-Aviv University on March 26th, with approximately 60 attendees. The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, [http://www.2bsecure.co.il 2bsecure] ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, [http://www.breach.com Breach Security] ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, [http://www.xiom.com Xiom] ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]] was held at Checkpoint on January 28th, with over a 100 people attending. The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference at the Interdisciplinary Center Herzliya (IDC)]] was held on September 14th with 250 attendees.&lt;br /&gt;
&lt;br /&gt;
; OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]&lt;br /&gt;
: OWASP sponsored the IDC Security Road Show event in Israel on June 3rd 2008. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]&lt;br /&gt;
: the 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya. The conference really set itself as an event you must come to if you have anything to do with application security. [ [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]] [[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_January_2017&amp;diff=224934</id>
		<title>OWASP Israel January 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_January_2017&amp;diff=224934"/>
				<updated>2017-01-12T11:12:38Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Created page with &amp;quot;The Israeli chapter of OWASP will hold a meeting on Wednesday, January 18th, at 17:00.   The meeting will be held in Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Israeli chapter of OWASP will hold a meeting on Wednesday, January 18th, at 17:00. &lt;br /&gt;
&lt;br /&gt;
The meeting will be held in Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal.  &lt;br /&gt;
&lt;br /&gt;
Attendance is free of course, but you must register if you are planning to attend:   &lt;br /&gt;
https://www.meetup.com/OWASP-Israel/events/236372466/ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda: ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
''' 17:00 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
'''Gathering, food, and drinks (KOSHER)'''  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:30 &amp;lt;br/&amp;gt;   '''&lt;br /&gt;
''' Introductions and Opening Notes '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 17:45 – IP Agnostic Bot Detection ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Michael Groskop, Director of WAF &amp;amp; R&amp;amp;D Security, Radware ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Bot-generated attacks targeting web application infrastructure are increasing in both volume and scope. Bots are becoming more sophisticated, leveraging headless browser technologies and use different evasion techniques such as dynamically changing IP addresses.   &lt;br /&gt;
&lt;br /&gt;
In this presentation we will review the challenges associated with IP agnostic detection of bot generated attacks, the complexity involved in distinguishing the good bots from the bad and the actions application developers can take for better thwarting of such attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 18:30 – R U aBLE? - BLE Comm Hacking ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Tal Melamed, Technical Lead, AppSec Labs ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As IoT devices are increasingly embedded in our every day lives, vulnerabilities have real impact on our digital and physical security.  &lt;br /&gt;
&lt;br /&gt;
Bluetooth Low Energy (BLE), also known as Bluetooth Smart, is part of Bluetooth 4. Today Bluetooth is the most popular protocol used for interfacing IoT and smart devices, wearables and medical equipment. Like most rising technologies, security is often left out.  &lt;br /&gt;
&lt;br /&gt;
In this lecture we will demonstrate how to perform penetration-testing for applications communicating with connected-devices over BLE. What equipment, libraries and projects can be used.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
''' 19:15 – Coffee break  ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 19:30 – Should I Trust My Vendor? ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
''' Yaniv Simsolo, CTO, Palantir Security ''' &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Modern systems and business models mandate different approaches to security. Sometimes, the business objectives of the vendor override the security objectives that we, the security community, think the product should have. When approaching a complex system design, numerous challenges arise when considering the trust we put on vendors’ hands and vendors’ responsibilities. Similar security challenges exist on the other scale: considering the maturity (or lack thereof) of small scale IoT products.  &lt;br /&gt;
&lt;br /&gt;
Does the aim sanctify the means?   &lt;br /&gt;
&lt;br /&gt;
In certain cases, either mal-coding or business practices result in a very poor security of a product or a service. This can get to extreme cases were the vendor outright attacks its own customers. Such was the case for example when I purchased a brand new laptop from a known manufacturer, and was attacked with viruses and malicious business practices software. Indeed, certain vendors are worse than others.   &lt;br /&gt;
&lt;br /&gt;
In the presentation we will explore notable examples of vendors abusing their customers’ trust and review the (few) mitigation alternatives we may incorporate in our products and systems.&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_Presentations&amp;diff=222464</id>
		<title>AppSec Israel 2016 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_Presentations&amp;diff=222464"/>
				<updated>2016-10-18T06:57:35Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: /* The Unwanted Sons - Formalizing and Demonstrating WAF Bypass Methods for the REST of the Top 10 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Full descriptions of all the talks at [[AppSec_Israel_2016|AppSec Israel 2016]] are below, together with each of the speakers' biographies. &lt;br /&gt;
&lt;br /&gt;
The [https://appsecil2016.sched.org/ full schedule can be found and subscribed to here].&lt;br /&gt;
&lt;br /&gt;
Pictures from the event [https://drive.google.com/drive/folders/0B0_K8tApcXxmVzBkcDNFUmt5S0U can be found here].&lt;br /&gt;
&lt;br /&gt;
__TOC__ &lt;br /&gt;
&lt;br /&gt;
The AppSec Israel conference is proudly being sponsored by: &lt;br /&gt;
{{Template:AppSec_Israel_2016_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
== Technical Tracks ==&lt;br /&gt;
&lt;br /&gt;
=== Bot Extension - Abusing Google Chrome Extensions for Bot Attacks ===&lt;br /&gt;
'''תוספי בוט - שימוש בתוספי כרום למטרת התקפות בוטים'''  &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Tomer Cohen, Head of R&amp;amp;D security, Wix.com '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
Chrome extensions have opened a variety of opportunities for users as well as developers, expanding the limits of what we've known as browsing experience. Attacker have also spotted the wide usage of such extensions, and abuse people's trust in Chrome Web Store to distribute malicious extensions. This allows them to run web-based bot attacks straight from victims' browsers, including DDoS campaigns and cross-site requests resulting in impersonation of users in third-party websites.&lt;br /&gt;
&lt;br /&gt;
Furthermore, the detection of such bot attack by a third-party is more complex than in regular distributed attacks, since real humans actually use the Chrome tab abused to attack the victim third-party.&lt;br /&gt;
&lt;br /&gt;
The lecture will include an intro on Chrome Extension architecture followed by techniques to abuse this architecture in order to run bot attacks, as well as distribute a malicious extensions to big crowds of victims.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Worked as a security consultant in several places, one of the founders of Magshimim Cyber Training Program.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Could a few lines of code &amp;lt;F!#ck&amp;gt; it all up?? ===&lt;br /&gt;
''''' Amit Ashbel, Director of Product Marketing &amp;amp; Cyber Security Evangelist, Checkmarx '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Erez Yalon, Application Security Lead, Checkmarx '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_AFewLinesOfCode-JS_AmitAshbel-ErezYalon.pptx|download presentation]])&lt;br /&gt;
&lt;br /&gt;
March 2016. An anonymous open source developer decides to remove his code (left-pad) from a public repository.&lt;br /&gt;
&lt;br /&gt;
Shortly thereafter, several large organizations felt the impact of his actions. Facebook, AirBnB and others experienced errors impacting the functionality of their services. Packages using “left-pad” wouldn’t properly execute.&lt;br /&gt;
&lt;br /&gt;
Today, we embrace both the open source community and the growth of open source projects, modules and packages but... Dependencies and recursive dependencies might become a risk or even a new attack vector which we didn’t foresee. &lt;br /&gt;
&lt;br /&gt;
Could there be other cases of common and popular open source packages depending on open source modules that might not be there tomorrow or, even worse, could they be maliciously modified?&lt;br /&gt;
&lt;br /&gt;
Join us for an insightful session that will reveal our research on this topic where you will learn:&lt;br /&gt;
* Which common open source packages might not be there tomorrow and how this can affect you?&lt;br /&gt;
* How packages you use could be maliciously modified impact on your app Discuss the risks introduced by hybrid application development &lt;br /&gt;
* How intertwined and complex dependencies have become&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Amit has been with the security community for more than a decade where he has taken on multiple tasks and responsibilities, including technical and Senior Product lead positions. Amit adds valuable product knowledge including experience with a wide range of security platforms and familiarity with emerging threats. Amit also speaks at high profile events and conferences such as BlackHat, Defcon, OWASP and others.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Yalon heads the security research group at Checkmarx. With vast defender and attacker experience and as an independent security researcher, he brings invaluable knowledge and skills to the table. Erez is responsible for maintaining Checkmarx’s top notch vulnerability detection technology where his previous development experience with a variety of coding languages comes into play.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Crippling HTTPS with unholy PAC ===&lt;br /&gt;
'''איך להרוס HTTPS עם PAC&amp;quot;ל חבלה''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Amit Klein, VP Security Research, SafeBreach '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_CripplingHTTPSwithUnholyPAC_AmitKlein.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
You're in a potentially malicious network (free WiFi, guest network, or maybe your own corporate LAN). You're a security conscious netizen so you restrict yourself to HTTPS (browsing to HSTS sites and/or using a &amp;quot;Force TLS/SSL&amp;quot; browser extension). All your traffic is protected from the first byte. Or is it?&lt;br /&gt;
&lt;br /&gt;
We will demonstrate that, by forcing your browser/system to use a malicious PAC (Proxy AutoConfiguration) resource, it is possible to leak HTTPS URLs. We will explain how this affects the privacy of the user and how credentials/sessions can be stolen. We will present the concept of &amp;quot;PAC Malware&amp;quot; (a malware which is implemented only as JavaScript logic in a PAC resource) that features: a 2-way communication channel between the PAC malware and an external server, contextual phishing via messages, denial-of-service options, and sensitive data extraction from URI's. We present a comprehensive browser PAC feature matrix and elaborate more about this cross-platform (Linux, Windows, Mac) and cross-browser (IE, Chrome, Safari) threat.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Amit Klein is a world renowned information security expert, with 25 years in information security and over 30 published technical papers on this topic. Amit is VP Security Research at SafeBreach, responsible for researching various infiltration, exfiltration and lateral movement attacks. Before SafeBreach, Amit was CTO for Trusteer (acquired by IBM) for 8.5 years. Prior to Trusteer, Amit was chief scientist for Cyota (acquired by RSA) for 2 years, and prior to that, director of Security and Research for Sanctum (acquired by Watchfire, now part of IBM security division) for 7 years. Amit has a B.Sc. from the Hebrew University (magna cum laude, Talpiot program), recognized by InfoWorld as a CTO of the year 2010, and has presented at HITB, RSA, OWASP, CertConf, BlueHat, CyberTech, APWG and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Don't Feed the Hippos! ===&lt;br /&gt;
''''' Martin Knobloch, Principal Consultant, Nixu '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_DontFeedTheHippos_MartinKnobloch.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
The security community is trying to solve insecurity caused by bugs and flaws in software for many years now, but with what success? &lt;br /&gt;
&lt;br /&gt;
We almost never look in successes and failures experiences in other areas, but we could really learn from. This talk is inspired by Ernesto Sirolli’s TED talk “Want to help someone? Shut up and listen!” about failures in the aid program’s around the world. Listening to Ernesto Sirolli, you cannot miss the similarity with the security community trying to tell developers how to write secure code.  This talk points out common failures of the security community when communicating with developers, trying to solve their problems without understanding what their problems really are. &lt;br /&gt;
&lt;br /&gt;
Using the hippo-analogy for security failures, during the talks those ‘(in-)secure hippos’ are identified, advice on how to avoid them are provided, by anecdotes and best practices from the experience of the past 10 years in the security field as a consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Martin is Principal Consultant at Nixu BeNeLux (https://www.nixu.com/en/nixubenelux). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&lt;br /&gt;
&lt;br /&gt;
With his background in Java Development, he understands the complexity of Enterprise software development, Agile Scrum environments and continuous delivery / deployment. &lt;br /&gt;
&lt;br /&gt;
Martin got involved in OWASP in 2006. He became a member of the OWASP Netherland Chapter board in 2007. He has contributed to several OWASP projects and is co-organizer of the OWASP BeNeLux-Day conference since 2008. Martin has been chair of the Global Education Committee from 2008 until the ending of the Global Committees. &lt;br /&gt;
&lt;br /&gt;
Futher, Martin is the conference chair of the OWASP AppSec-Eu/Research 2015 conference in Amsterdam, the Netherlands and involved in the AppSec-Eu 2016 among other activities as CfT Co-Chair. &lt;br /&gt;
&lt;br /&gt;
Martin is a frequent speaker at universities, hacker spaces and various conferences. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; English&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hacking HTTP/2 - New attacks on the Internet’s Next Generation Foundation ===&lt;br /&gt;
''''' Nadav Avital, Application Security Research Team Leader, Imperva '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Noam Mazor, Security Research Engineer, Imperva '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
HTTP/2 is the emerging network protocol for the Internet, facilitating leaner and faster web browsing by introducing several new mechanisms which can be seen as a single transition layer for web traffic. The adoption of HTTP/2 is lightning fast, and even though only a year has passed since its publication, HTTP/2 is already supported by all significant players in the field including browsers, web servers and Content Delivery Networks. &lt;br /&gt;
&lt;br /&gt;
In the presentation we will overview the HTTP/2 attack surface - stream multiplexing, flow control, HPACK compression and server push, with a focus on how the way HTTP/2 servers implement these mechanisms can make or break your security posture. We will continue with presenting new classes of vulnerabilities that have been introduced by the mechanisms used with HTTP/2, and explaining how these vulnerabilities can be used for mounting effective attacks against web servers like Apache, IIS, Ngnix, Jetty and nghttp. We will explain in detail several serious zero-day vulnerabilities, such as CVE-2016-1546, CVE-2016-0150 and CVE-2016-1544, and end with discussing several approaches for mitigating attacks of these types. &lt;br /&gt;
&lt;br /&gt;
Those attending this session will understand that:&lt;br /&gt;
* As an emerging technology that introduces novel and flexible mechanisms, HTTP/2 also induces new risks. &lt;br /&gt;
* HTTP/2 implementations are still not “security mature.” Therefore it is almost certain that scrutiny of HTTP/2 implementations will increase in coming years, resulting in the discovery of new vulnerabilities, exploits and security patches.  With HTTP/2 gaining more popularity, this trend will intensify. &lt;br /&gt;
* An effective security strategy for newly adopted technologies must rely on supplemental solutions rather than patching&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nadav Avital is an expert in Web Application Security. He leads an Imperva team who captures and analyzes hacking activities and then create mitigation strategies. These efforts result in research for new technologies and protocols. Nadav has more than 10 years industry experience in coding and creating security tools. He holds B.Sc. in Computer Science.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Noam Mazor worked in Imperva as security research engineer in the Web Application Security team. Noam has experience in analyzing hacking activities, creating mitigation and researching vulnerabilities. He holds BSc in Computer Science and is currently a MSc student in Tel Aviv University.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hacking The IoT (Internet of Things) - PenTesting RF Operated Devices ===&lt;br /&gt;
'''האקינג של מערכות IoT מבוססות RF''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Erez Metula, Application Security Expert, AppSec Labs (Founder) '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_HackingTheIoT-PenTestingRFDevices_ErezMetula.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
We often encounter IoT (Internet of Things) systems during our work as penetration testers and security consultants. We know how to assess the security of the server side API, the associated mobile apps, the web apps and so on - but what about the device itself (the &amp;quot;thing&amp;quot;)? Moreover, what happens if the device is not using traditional HTTP/S request, or does not even &amp;quot;speak&amp;quot; plain old TCP/IP?&lt;br /&gt;
&lt;br /&gt;
During this talk, we'll go over the obstacles we have to face when analyzing unknown, custom RF based communication that drives the target IoT system we're pentesting. We'll talk about and see in action tools that will allow us to capture RF traffic, analyze it, brute force it, replay it, and of course forge it. It's like plain old appsec hacking tricks, but at the RF level. So let's hack some physical things belonging to the real world!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula is the founder and Chairman of AppSec Labs, a leading company in the field of application security.&lt;br /&gt;
&lt;br /&gt;
He is the author of the book &amp;quot;Managed Code Rootkits&amp;quot;, and is a world renowned application security expert.&lt;br /&gt;
&lt;br /&gt;
Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. Erez had helped companies from all sizes, from startups to Fortune 500 organizations. &lt;br /&gt;
&lt;br /&gt;
Erez focuses on advanced application security topics and has performed extensive ground breaking research on mobile application security. &lt;br /&gt;
&lt;br /&gt;
Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Integrating Security in Agile projects   (real case study) ===&lt;br /&gt;
''''' Elena Kravchenko, ADM BU Security Lead, Security &amp;amp; Trust Office, HPE Software '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Efrat Wasserman, ADM Senior Program manager, SRL, HPE Software ''''' &amp;lt;br/&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_IntegratingSecurityInAgile_ElenaKravchenko-EfratWasserman.pptx|download presentation]])&lt;br /&gt;
&lt;br /&gt;
There are many different security development lifecycles (SDLC) frameworks in the modern world. However, a fully implemented SDLC program is often represented as heavy, time-consuming and not suitable to Agile development methodology. We’d like to break the myth and show how a very comprehensive security program, managed by a dedicated security office, can be successfully integrated in agile development project on a real case example.  &lt;br /&gt;
&lt;br /&gt;
We’ll shortly describe the main challenges, and the techniques and procedures helping to overcome the challenges. We’ll present the Security Lifecycle Management (SLM) Framework developed and used in HPE SW in the last three years, and describe how it integrated into development of new SaaS based fully agile developed product, with emphasis on main activities and roles. As a part of the presentation we would like to highlight the importance of the proper program management and role of the PMO and how it became a key success factor in the effective security program implementation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Elena has a MSc in Applied Mathematics from Leningrad State University, and over 25 years of software engineering experience in different roles, including Software Design Engineer, Technical Lead, Customer Oriented Development Engineer, and Software System Architect.&lt;br /&gt;
&lt;br /&gt;
Currently a part of HPE Software ITOM and ADM Security and Trust Office  as the Security Lead for HPE’s Application Delivery Management (ADM) Business Unit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Efrat has earned a BSc in Computer Science and Mathematics, and a MBA in Business Management and Marketing. She has over 17 years in Software Development, and 9 years as a Program manager.  &lt;br /&gt;
&lt;br /&gt;
Currently Senior Program Manager in HPE SW responsible for lifecycle of SaaS product&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Law and the Israeli Cybersecurity Industry ===&lt;br /&gt;
''''' Eli Greenbaum, Partner, Yigal Arnon &amp;amp; Co. '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
From an international perspective, Israel provides a unique laboratory for studying the effect of law and regulation on cybersecurity research and development. This presentation will provide an introduction to specific laws and regulations concerning cybersecurity research and ask whether these laws have in actual practice influenced the growth of the cybersecurity ecosystem in Israel. More specifically, how have industry players, including startups, multinationals and the military, reacted to the unique legal framework that Israel provides for cybersecurity activities?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Eli Greenbaum is partner in the law firm of Yigal Arnon &amp;amp; Co., specializing in technology, intellectual property and cybersecurity. He received his Masters degree in Applied Physics from Columbia University and his law degree from Yale Law School. Eli has published widely in the intersection between technology and the law, including in the Harvard Journal of Law and Technology and the Cardozo Law Review. Eli clerked from Justice Miriam Naor of the Supreme Court of Israel and Judge David Cheshin of the District Court of Jerusalem.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; English&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing ===&lt;br /&gt;
''''' Tal Melamed, Technical Leader, AppSec Labs '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_JavaHurdling_TalMelamed.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Testing Java client applications is not always straightforward as testing web applications. Even under experienced hands, there might be obstacles coming your way; what if you cannot use a proxy? How do you MitM? What if you just can't? How do you modify the app to your benefit?&lt;br /&gt;
&lt;br /&gt;
Fortunately, Java is still Java. This lecture is based on a true story, and will follow an interesting case of pen-testing a known product; what tools and techniques can be used in order to jump over hurdles, all the way to the finish line.&lt;br /&gt;
&lt;br /&gt;
The lecture aims to enrich the pentester's toolbox as well as mind, when facing Java client applications; MitM-ing, run-time manipulations and patching the code are only some of the discussed cases.&lt;br /&gt;
&lt;br /&gt;
In addition, a newly developed proxy for intercepting and tampering with TCP communication over TLS/SSL and bypassing certificate-pinning protections, will be introduced during the lecture.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Tal is an Application Security Expert. As AppSec Labs' Technical Leader, he is leading a variety of security projects for Android, iOS, WP, Web and Client applications.&lt;br /&gt;
&lt;br /&gt;
Prior to working at AppSec Labs, Tal has worked at Amdocs, CheckPoint and RSA, having more than a decade of experience in the Information Security field.&lt;br /&gt;
&lt;br /&gt;
Tal is a lead Trainer, a neat developer, and a security dreamer; breaking, building, defending &amp;amp; training since '99.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== NodeJS Security Done Right​ - The tips and tricks they won’t teach you in school​  ===&lt;br /&gt;
''''' Liran Tal, R&amp;amp;D Team Leader, Hewlett Packard Enterprise '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_NodeJS-Security_LiranTal.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
NodeJS, and JavaScript at large are quickly taking over software whether it is GitHub’s statistics for projects growth, the IoT industry, ChatOps projects written in JavaScript and Enterprises adoption is growing as well.&lt;br /&gt;
&lt;br /&gt;
With this trend, it is imperative to review OWASP security practices and learn how to harden NodeJS Web Applications.​&lt;br /&gt;
​&lt;br /&gt;
We will begin with a quick NodeJS intro and a few fail stories of how things can go wrong. ​&lt;br /&gt;
&lt;br /&gt;
We will quickly dive into hands-on practical implementation of security measures to adopt in your current or future NodeJS project. Next I will show how to leverage widely adopted security tools for integration in the build and CI/CD process to audit and test for security vulnerabilities, as well as leveraging successful enterprise-level open source npm libraries to enhance your web application’s security.​&lt;br /&gt;
​&lt;br /&gt;
In summary: in this session I will demonstrate:​&lt;br /&gt;
* Securing ExpressJS by adopting mature and commonly used npm libraries​&lt;br /&gt;
* Secure code guidelines for JavaScript software developers​&lt;br /&gt;
* Integrating NodeJS security measures as part of your build CI/CD DevOps process​&lt;br /&gt;
​&lt;br /&gt;
To empower others and make a lasting impression for Open Source awareness and Security involvement: In the closing minutes of this presentation I will ask a volunteer from the audience to commit a Pull-Request that enhances security for a NodeJS project on GitHub.​&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Liran is a top contributor to the open source MEAN.io, and core team member of the MEAN.js full stack JavaScript framework. He is also an author of several Node.js npm packages, as well as actively contributing to many open source projects on GitHub. Being an avid supporter and contributor to the open source movement, in 2007 he has redefined network RADIUS management by establishing daloRADIUS, a world-recognized and industry-leading open source project (http://www.daloradius.com).&lt;br /&gt;
 &lt;br /&gt;
Liran is currently leading the R&amp;amp;D Engineering team for Hewlett Packard Enterprise content Marketplace, built on a microservices architecture for a combined technology stack of Java, NodeJS, AngularJS, MongoDB and MySQL. He loves mentoring and empowering team members, drive for better code methodology, and seek out innovative solutions to support business strategies.&lt;br /&gt;
 &lt;br /&gt;
He enjoys spending his time with his beloved wife Tal, and his son Ori. Amongst other things, his hobbies include playing the guitar, hacking all things Linux and continuously experimenting and contributing to open source projects.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Putting the &amp;quot;I&amp;quot; in Code Review - Turning Code Review Interactive ===&lt;br /&gt;
''''' Tamir Shavro, Seeker R&amp;amp;D Manager, Synopsys '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_InteractiveCodeReview_TamirShavro.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Everybody knows that manual code review can be a tedious and lengthy effort, with complexity growing exponentially with the size of the code. However, understanding code flow and focusing on relevant parts can become much easier when employing interactive debugging techniques. This allows combining the best of penetration testing and code review benefits to achieve maximum results in the most efficient manner. In this talk we will explain and demonstrate this eye-opening technique for effectively performing a manual code review on a live system using a debugger and provide a quick starter kit for implementing this technique.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Tamir Shavro has been involved both in complex R&amp;amp;D endeavors and in the security field in the past 18 years. As the Chief Architect &amp;amp; VP RnD of Seeker (acquired by Synopsys in 2015), Tamir has been the driving force behind the development of the Seeker technology. &lt;br /&gt;
&lt;br /&gt;
Prior to Seeker he worked as a Senior Security Consultant in Hacktics, where he was involved in advance application security projects. He was previously a Captain in the IDF Intelligence Corps, involved in various development leadership and architecture roles. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Signoff or Sign-Out ===&lt;br /&gt;
''''' Ofer Maor, Director of Security Strategy, Synopsys '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
Software Signoff is an inevitable step in maturing our software development processes in order to deliver better and safer software. Like with other engineering disciplines before, the growing concerns for safety, security and standards is driving the industry to do better. In this talk we will explain what Software Signoff means and why organizations must adopt it before it is too late.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Ofer Maor is a security expert and entrepreneur with over 20 years of experience in information and application security. Ofer has been involved in application security from its early days, through research, penetration testing, consulting, and product development.  As the founder and CTO of Seeker, Ofer pioneered IAST, the next generation of application security testing technology, currently used by some of the largest organizations in the world to continuously improve their software security. Ofer joined Synopsys when it acquired Seeker in July 2015. Prior to Seeker, Ofer was the Founder and CTO of Hacktics. He led Imperva's Application Defense Center research group and has also served as the Chairman of OWASP Israel and in the OWASP Global Membership Committee.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Dark Side of Search Engine Optimization ===&lt;br /&gt;
'''הצד האפל של קידום אתרים במנועי חיפוש''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai  '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_DarkSideSearchEngineOptimizations_OrKatz.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Search engines optimization (SEO) is a technique being used by web sites owners in order to improve visibility and traffic to their web site. Legitimate SEO activity will use optimization techniques such as: changing structure and textual usage of the web site pages, publication in social media and web forums that will referrer relevant users.&lt;br /&gt;
&lt;br /&gt;
The ultimate goal of SEO campaign is to promote web site ranking in the leading search engines, having the promoted web site returned in the primary result page once searching for relevant terms and keywords. &lt;br /&gt;
&lt;br /&gt;
In the presentation I’m going to present what happens when threat actors get into the world of SEO campaigns abuse SEO optimization techniques and moreover, use all kind of attack techniques such as SQL injection and open redirects in order to manipulate search engines ranking.&lt;br /&gt;
&lt;br /&gt;
I will also evaluate some of the SEO attacks and the manipulating techniques, try to determine who are the victims in this story, check if these attacks achieved their goal and supply more interesting insights on the world of “Blackhat SEO”.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or is an application security veteran, with years of experience at industry leading vendors, currently serves as principal security researcher for Akamai's Cloud Security Intelligence platform. Or is a frequent speaker in conferences such as RSA, AppSec and CSA. Or has published several innovative articles and white papers on web applications threat intelligence and defensive techniques.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Threat of Advanced Cross-Site Search Attacks ===&lt;br /&gt;
'''האיום של התקפות Cross-Site Search מתקדמות''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Dr. Nethanel Gelernter, Cyberpion &amp;amp; The College of Management Academic Studies '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_AdvancedCrossSiteSearch_NethanelGelernter.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Cross-site search (XS-search) is a practical timing side-channel attack that allows the extraction of sensitive information from web-services. The attack exploits inflation techniques to efficiently distinguish between search requests that yield results and requests that do not. This work focuses on the response inflation technique that increases the size of the response; as the difference in the sizes of the responses increases, it becomes easier to distinguish between them. We begin with browser-based XS-search attack and demonstrate its use in extracting users' private data from Gmail and Facebook. The browser-based XS-search attack exploits the differences in the sizes of HTTP responses, and works even when significant inflation of the response is impossible. This part also involves algorithmic improvements compared to previous work. When there is no leakage of information via the timing side channel it is possible to use second-order (SO) XS-search, a novel type of attack that allows the attacker to significantly increase the difference in the sizes of the responses by planting maliciously crafted record into the storage. SO XS-search attacks can be used to extract sensitive information such as email content of Gmail and Yahoo! users, and search history of Bing users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nethanel Gelernter received a PhD in Computer Science from Bar-Ilan University (Israel). His research mainly focuses on web application security, and in particular in exploring new attack vectors and threats in the web. Currently, he is leading the cyber security research and studies in the College of Management Academic Studies in Israel. Beyond the academic world, Nethanel provides consulting services, and he recently founded Cyberpion, a company that investigates unknown attack vectors and develops countermeasures against them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Unwanted Sons - Formalizing and Demonstrating WAF Bypass Methods for the REST of the Top 10 ===&lt;br /&gt;
'''צאצאים לא רצויים - פירמול לטכניקות חדשות למעקף WAF לשאר ההתקפות הנפוצות של OWASP TOP 10''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Shay Chen, CEO, Effective Security '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_TheUnwantedSons-WAFBypassTechniques_ShayChen.pptx|download presentation]])&lt;br /&gt;
&lt;br /&gt;
The once uncommon application-level protection mechanisms are EVERYWHERE these days, and sooner or later, you'll have to face them.&lt;br /&gt;
&lt;br /&gt;
Web Application Firewalls (WAF) and Intrusion Detection Systems (IDS), Filters and RASP Modules, all common and widespread countermeasures you have to face on a regular basis, with the power to turn a typical assessment into a nightmare, and make automated tools practically useless.&lt;br /&gt;
&lt;br /&gt;
While the attack vectors are well covered in CWE, CAPEC, TECAPI RvR, WASC, OWASP Top 10 and Testing Guide, all you have to cover evasion techniques is a couple of cheat sheets focused on a limited set of attacks.&lt;br /&gt;
&lt;br /&gt;
Sure, there are numerous XSS and SQL Injection evasion cheat sheets, but what about Path Traversal, Remote File Inclusion, OS Command Injection? What about Forced Browsing? What about other attacks?&lt;br /&gt;
&lt;br /&gt;
Formalizing evasion techniques and methods for the REST of the common attack vectors makes a LOT of sense, for manual pen-testing and automated tools - and THIS is phase one, aimed to cover the rest of the unattended top 10.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CEO of Effective Security, an information-security boutique company specializing in information security assessments and in automating security processes of vulnerability management and SDLC. &lt;br /&gt;
&lt;br /&gt;
He has over twelve years in information technology and security, a strong background in software development, and a stream of previously published vulnerabilities, attack vectors, benchmarks and hacking methodologies. &lt;br /&gt;
&lt;br /&gt;
Shay is an experienced speaker, and regularly instructs a wide variety of security related courses in Conferences and Enterprises. Before moving into the information security field, he was involved in various software development projects in ERP, mobile &amp;amp; enterprise environments.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Ways Hackers Are Taking To Win The Mobile Malware Battle ===&lt;br /&gt;
''''' Yair Amit, CTO &amp;amp; Co-founder, Skycure '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_WhyHackersAreWinningMobileMalwareBattle-YairAmit.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
In the proverbial game of cat-and-mouse between endpoint security vendors and malware writers, malware attacks have recently grown more sophisticated. More enterprises are losing ground to hackers, who are able to outmaneuver static and runtime solutions by constantly changing their attack strategies. The team that uncovered iOS malicious profiles, WiFiGate, HTTP Request Hijacking, No iOS Zone and Invisible Profiles are taking it upon themselves to coach developers and organizations on how to regain control, and turn the tables on the hackers behind next-generation mobile malware. &lt;br /&gt;
&lt;br /&gt;
In his presentation, Yair will discuss cutting-edge techniques used by malware writers to circumvent mobile security paradigms such as app-sandboxing and containers. Mr. Amit will then break down the current set of techniques (signatures, static analysis &amp;amp; dynamic analysis) used to identify malware on mobile devices, and identify the pros and cons of these approaches. He will also explain why attackers constantly succeed in fooling these technologies, and explore the problem of false positive/false negative tradeoffs in such solutions. &lt;br /&gt;
&lt;br /&gt;
During a live, interactive demo, Yair will create a mobile malware on stage, meant to be undetected by static and runtime analysis technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yair Amit is co-founder and CTO at Skycure, leading the company’s research and vision and overseeing its R&amp;amp;D center. Yair has been active in the security industry for more than a decade with his research regularly covered by media outlets and presented in security conferences around the world. Prior to co-founding Skycure, Yair managed the Application Security and Research Group at IBM, joining through the acquisition of Watchfire. At IBM, Yair led the research and implementation of IBM’s next-generation application security technology. Yair holds a BSc, summa cum laude, from Tel Aviv University in bioinformatics.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecIL2016_TheUnwantedSons-WAFBypassTechniques_ShayChen.pptx&amp;diff=222463</id>
		<title>File:AppSecIL2016 TheUnwantedSons-WAFBypassTechniques ShayChen.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecIL2016_TheUnwantedSons-WAFBypassTechniques_ShayChen.pptx&amp;diff=222463"/>
				<updated>2016-10-18T06:57:17Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_Presentations&amp;diff=222021</id>
		<title>AppSec Israel 2016 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_Presentations&amp;diff=222021"/>
				<updated>2016-10-02T08:17:10Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: /* The Dark Side of Search Engine Optimization */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Full descriptions of all the talks at [[AppSec_Israel_2016|AppSec Israel 2016]] are below, together with each of the speakers' biographies. &lt;br /&gt;
&lt;br /&gt;
The [https://appsecil2016.sched.org/ full schedule can be found and subscribed to here].&lt;br /&gt;
&lt;br /&gt;
Pictures from the event [https://drive.google.com/drive/folders/0B0_K8tApcXxmVzBkcDNFUmt5S0U can be found here].&lt;br /&gt;
&lt;br /&gt;
__TOC__ &lt;br /&gt;
&lt;br /&gt;
The AppSec Israel conference is proudly being sponsored by: &lt;br /&gt;
{{Template:AppSec_Israel_2016_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
== Technical Tracks ==&lt;br /&gt;
&lt;br /&gt;
=== Bot Extension - Abusing Google Chrome Extensions for Bot Attacks ===&lt;br /&gt;
'''תוספי בוט - שימוש בתוספי כרום למטרת התקפות בוטים'''  &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Tomer Cohen, Head of R&amp;amp;D security, Wix.com '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
Chrome extensions have opened a variety of opportunities for users as well as developers, expanding the limits of what we've known as browsing experience. Attacker have also spotted the wide usage of such extensions, and abuse people's trust in Chrome Web Store to distribute malicious extensions. This allows them to run web-based bot attacks straight from victims' browsers, including DDoS campaigns and cross-site requests resulting in impersonation of users in third-party websites.&lt;br /&gt;
&lt;br /&gt;
Furthermore, the detection of such bot attack by a third-party is more complex than in regular distributed attacks, since real humans actually use the Chrome tab abused to attack the victim third-party.&lt;br /&gt;
&lt;br /&gt;
The lecture will include an intro on Chrome Extension architecture followed by techniques to abuse this architecture in order to run bot attacks, as well as distribute a malicious extensions to big crowds of victims.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Worked as a security consultant in several places, one of the founders of Magshimim Cyber Training Program.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Could a few lines of code &amp;lt;F!#ck&amp;gt; it all up?? ===&lt;br /&gt;
''''' Amit Ashbel, Director of Product Marketing &amp;amp; Cyber Security Evangelist, Checkmarx '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Erez Yalon, Application Security Lead, Checkmarx '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_AFewLinesOfCode-JS_AmitAshbel-ErezYalon.pptx|download presentation]])&lt;br /&gt;
&lt;br /&gt;
March 2016. An anonymous open source developer decides to remove his code (left-pad) from a public repository.&lt;br /&gt;
&lt;br /&gt;
Shortly thereafter, several large organizations felt the impact of his actions. Facebook, AirBnB and others experienced errors impacting the functionality of their services. Packages using “left-pad” wouldn’t properly execute.&lt;br /&gt;
&lt;br /&gt;
Today, we embrace both the open source community and the growth of open source projects, modules and packages but... Dependencies and recursive dependencies might become a risk or even a new attack vector which we didn’t foresee. &lt;br /&gt;
&lt;br /&gt;
Could there be other cases of common and popular open source packages depending on open source modules that might not be there tomorrow or, even worse, could they be maliciously modified?&lt;br /&gt;
&lt;br /&gt;
Join us for an insightful session that will reveal our research on this topic where you will learn:&lt;br /&gt;
* Which common open source packages might not be there tomorrow and how this can affect you?&lt;br /&gt;
* How packages you use could be maliciously modified impact on your app Discuss the risks introduced by hybrid application development &lt;br /&gt;
* How intertwined and complex dependencies have become&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Amit has been with the security community for more than a decade where he has taken on multiple tasks and responsibilities, including technical and Senior Product lead positions. Amit adds valuable product knowledge including experience with a wide range of security platforms and familiarity with emerging threats. Amit also speaks at high profile events and conferences such as BlackHat, Defcon, OWASP and others.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Yalon heads the security research group at Checkmarx. With vast defender and attacker experience and as an independent security researcher, he brings invaluable knowledge and skills to the table. Erez is responsible for maintaining Checkmarx’s top notch vulnerability detection technology where his previous development experience with a variety of coding languages comes into play.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Crippling HTTPS with unholy PAC ===&lt;br /&gt;
'''איך להרוס HTTPS עם PAC&amp;quot;ל חבלה''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Amit Klein, VP Security Research, SafeBreach '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_CripplingHTTPSwithUnholyPAC_AmitKlein.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
You're in a potentially malicious network (free WiFi, guest network, or maybe your own corporate LAN). You're a security conscious netizen so you restrict yourself to HTTPS (browsing to HSTS sites and/or using a &amp;quot;Force TLS/SSL&amp;quot; browser extension). All your traffic is protected from the first byte. Or is it?&lt;br /&gt;
&lt;br /&gt;
We will demonstrate that, by forcing your browser/system to use a malicious PAC (Proxy AutoConfiguration) resource, it is possible to leak HTTPS URLs. We will explain how this affects the privacy of the user and how credentials/sessions can be stolen. We will present the concept of &amp;quot;PAC Malware&amp;quot; (a malware which is implemented only as JavaScript logic in a PAC resource) that features: a 2-way communication channel between the PAC malware and an external server, contextual phishing via messages, denial-of-service options, and sensitive data extraction from URI's. We present a comprehensive browser PAC feature matrix and elaborate more about this cross-platform (Linux, Windows, Mac) and cross-browser (IE, Chrome, Safari) threat.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Amit Klein is a world renowned information security expert, with 25 years in information security and over 30 published technical papers on this topic. Amit is VP Security Research at SafeBreach, responsible for researching various infiltration, exfiltration and lateral movement attacks. Before SafeBreach, Amit was CTO for Trusteer (acquired by IBM) for 8.5 years. Prior to Trusteer, Amit was chief scientist for Cyota (acquired by RSA) for 2 years, and prior to that, director of Security and Research for Sanctum (acquired by Watchfire, now part of IBM security division) for 7 years. Amit has a B.Sc. from the Hebrew University (magna cum laude, Talpiot program), recognized by InfoWorld as a CTO of the year 2010, and has presented at HITB, RSA, OWASP, CertConf, BlueHat, CyberTech, APWG and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Don't Feed the Hippos! ===&lt;br /&gt;
''''' Martin Knobloch, Principal Consultant, Nixu '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_DontFeedTheHippos_MartinKnobloch.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
The security community is trying to solve insecurity caused by bugs and flaws in software for many years now, but with what success? &lt;br /&gt;
&lt;br /&gt;
We almost never look in successes and failures experiences in other areas, but we could really learn from. This talk is inspired by Ernesto Sirolli’s TED talk “Want to help someone? Shut up and listen!” about failures in the aid program’s around the world. Listening to Ernesto Sirolli, you cannot miss the similarity with the security community trying to tell developers how to write secure code.  This talk points out common failures of the security community when communicating with developers, trying to solve their problems without understanding what their problems really are. &lt;br /&gt;
&lt;br /&gt;
Using the hippo-analogy for security failures, during the talks those ‘(in-)secure hippos’ are identified, advice on how to avoid them are provided, by anecdotes and best practices from the experience of the past 10 years in the security field as a consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Martin is Principal Consultant at Nixu BeNeLux (https://www.nixu.com/en/nixubenelux). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&lt;br /&gt;
&lt;br /&gt;
With his background in Java Development, he understands the complexity of Enterprise software development, Agile Scrum environments and continuous delivery / deployment. &lt;br /&gt;
&lt;br /&gt;
Martin got involved in OWASP in 2006. He became a member of the OWASP Netherland Chapter board in 2007. He has contributed to several OWASP projects and is co-organizer of the OWASP BeNeLux-Day conference since 2008. Martin has been chair of the Global Education Committee from 2008 until the ending of the Global Committees. &lt;br /&gt;
&lt;br /&gt;
Futher, Martin is the conference chair of the OWASP AppSec-Eu/Research 2015 conference in Amsterdam, the Netherlands and involved in the AppSec-Eu 2016 among other activities as CfT Co-Chair. &lt;br /&gt;
&lt;br /&gt;
Martin is a frequent speaker at universities, hacker spaces and various conferences. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; English&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hacking HTTP/2 - New attacks on the Internet’s Next Generation Foundation ===&lt;br /&gt;
''''' Nadav Avital, Application Security Research Team Leader, Imperva '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Noam Mazor, Security Research Engineer, Imperva '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
HTTP/2 is the emerging network protocol for the Internet, facilitating leaner and faster web browsing by introducing several new mechanisms which can be seen as a single transition layer for web traffic. The adoption of HTTP/2 is lightning fast, and even though only a year has passed since its publication, HTTP/2 is already supported by all significant players in the field including browsers, web servers and Content Delivery Networks. &lt;br /&gt;
&lt;br /&gt;
In the presentation we will overview the HTTP/2 attack surface - stream multiplexing, flow control, HPACK compression and server push, with a focus on how the way HTTP/2 servers implement these mechanisms can make or break your security posture. We will continue with presenting new classes of vulnerabilities that have been introduced by the mechanisms used with HTTP/2, and explaining how these vulnerabilities can be used for mounting effective attacks against web servers like Apache, IIS, Ngnix, Jetty and nghttp. We will explain in detail several serious zero-day vulnerabilities, such as CVE-2016-1546, CVE-2016-0150 and CVE-2016-1544, and end with discussing several approaches for mitigating attacks of these types. &lt;br /&gt;
&lt;br /&gt;
Those attending this session will understand that:&lt;br /&gt;
* As an emerging technology that introduces novel and flexible mechanisms, HTTP/2 also induces new risks. &lt;br /&gt;
* HTTP/2 implementations are still not “security mature.” Therefore it is almost certain that scrutiny of HTTP/2 implementations will increase in coming years, resulting in the discovery of new vulnerabilities, exploits and security patches.  With HTTP/2 gaining more popularity, this trend will intensify. &lt;br /&gt;
* An effective security strategy for newly adopted technologies must rely on supplemental solutions rather than patching&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nadav Avital is an expert in Web Application Security. He leads an Imperva team who captures and analyzes hacking activities and then create mitigation strategies. These efforts result in research for new technologies and protocols. Nadav has more than 10 years industry experience in coding and creating security tools. He holds B.Sc. in Computer Science.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Noam Mazor worked in Imperva as security research engineer in the Web Application Security team. Noam has experience in analyzing hacking activities, creating mitigation and researching vulnerabilities. He holds BSc in Computer Science and is currently a MSc student in Tel Aviv University.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hacking The IoT (Internet of Things) - PenTesting RF Operated Devices ===&lt;br /&gt;
'''האקינג של מערכות IoT מבוססות RF''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Erez Metula, Application Security Expert, AppSec Labs (Founder) '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_HackingTheIoT-PenTestingRFDevices_ErezMetula.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
We often encounter IoT (Internet of Things) systems during our work as penetration testers and security consultants. We know how to assess the security of the server side API, the associated mobile apps, the web apps and so on - but what about the device itself (the &amp;quot;thing&amp;quot;)? Moreover, what happens if the device is not using traditional HTTP/S request, or does not even &amp;quot;speak&amp;quot; plain old TCP/IP?&lt;br /&gt;
&lt;br /&gt;
During this talk, we'll go over the obstacles we have to face when analyzing unknown, custom RF based communication that drives the target IoT system we're pentesting. We'll talk about and see in action tools that will allow us to capture RF traffic, analyze it, brute force it, replay it, and of course forge it. It's like plain old appsec hacking tricks, but at the RF level. So let's hack some physical things belonging to the real world!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula is the founder and Chairman of AppSec Labs, a leading company in the field of application security.&lt;br /&gt;
&lt;br /&gt;
He is the author of the book &amp;quot;Managed Code Rootkits&amp;quot;, and is a world renowned application security expert.&lt;br /&gt;
&lt;br /&gt;
Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. Erez had helped companies from all sizes, from startups to Fortune 500 organizations. &lt;br /&gt;
&lt;br /&gt;
Erez focuses on advanced application security topics and has performed extensive ground breaking research on mobile application security. &lt;br /&gt;
&lt;br /&gt;
Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Integrating Security in Agile projects   (real case study) ===&lt;br /&gt;
''''' Elena Kravchenko, ADM BU Security Lead, Security &amp;amp; Trust Office, HPE Software '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Efrat Wasserman, ADM Senior Program manager, SRL, HPE Software ''''' &amp;lt;br/&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_IntegratingSecurityInAgile_ElenaKravchenko-EfratWasserman.pptx|download presentation]])&lt;br /&gt;
&lt;br /&gt;
There are many different security development lifecycles (SDLC) frameworks in the modern world. However, a fully implemented SDLC program is often represented as heavy, time-consuming and not suitable to Agile development methodology. We’d like to break the myth and show how a very comprehensive security program, managed by a dedicated security office, can be successfully integrated in agile development project on a real case example.  &lt;br /&gt;
&lt;br /&gt;
We’ll shortly describe the main challenges, and the techniques and procedures helping to overcome the challenges. We’ll present the Security Lifecycle Management (SLM) Framework developed and used in HPE SW in the last three years, and describe how it integrated into development of new SaaS based fully agile developed product, with emphasis on main activities and roles. As a part of the presentation we would like to highlight the importance of the proper program management and role of the PMO and how it became a key success factor in the effective security program implementation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Elena has a MSc in Applied Mathematics from Leningrad State University, and over 25 years of software engineering experience in different roles, including Software Design Engineer, Technical Lead, Customer Oriented Development Engineer, and Software System Architect.&lt;br /&gt;
&lt;br /&gt;
Currently a part of HPE Software ITOM and ADM Security and Trust Office  as the Security Lead for HPE’s Application Delivery Management (ADM) Business Unit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Efrat has earned a BSc in Computer Science and Mathematics, and a MBA in Business Management and Marketing. She has over 17 years in Software Development, and 9 years as a Program manager.  &lt;br /&gt;
&lt;br /&gt;
Currently Senior Program Manager in HPE SW responsible for lifecycle of SaaS product&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Law and the Israeli Cybersecurity Industry ===&lt;br /&gt;
''''' Eli Greenbaum, Partner, Yigal Arnon &amp;amp; Co. '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
From an international perspective, Israel provides a unique laboratory for studying the effect of law and regulation on cybersecurity research and development. This presentation will provide an introduction to specific laws and regulations concerning cybersecurity research and ask whether these laws have in actual practice influenced the growth of the cybersecurity ecosystem in Israel. More specifically, how have industry players, including startups, multinationals and the military, reacted to the unique legal framework that Israel provides for cybersecurity activities?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Eli Greenbaum is partner in the law firm of Yigal Arnon &amp;amp; Co., specializing in technology, intellectual property and cybersecurity. He received his Masters degree in Applied Physics from Columbia University and his law degree from Yale Law School. Eli has published widely in the intersection between technology and the law, including in the Harvard Journal of Law and Technology and the Cardozo Law Review. Eli clerked from Justice Miriam Naor of the Supreme Court of Israel and Judge David Cheshin of the District Court of Jerusalem.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; English&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing ===&lt;br /&gt;
''''' Tal Melamed, Technical Leader, AppSec Labs '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_JavaHurdling_TalMelamed.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Testing Java client applications is not always straightforward as testing web applications. Even under experienced hands, there might be obstacles coming your way; what if you cannot use a proxy? How do you MitM? What if you just can't? How do you modify the app to your benefit?&lt;br /&gt;
&lt;br /&gt;
Fortunately, Java is still Java. This lecture is based on a true story, and will follow an interesting case of pen-testing a known product; what tools and techniques can be used in order to jump over hurdles, all the way to the finish line.&lt;br /&gt;
&lt;br /&gt;
The lecture aims to enrich the pentester's toolbox as well as mind, when facing Java client applications; MitM-ing, run-time manipulations and patching the code are only some of the discussed cases.&lt;br /&gt;
&lt;br /&gt;
In addition, a newly developed proxy for intercepting and tampering with TCP communication over TLS/SSL and bypassing certificate-pinning protections, will be introduced during the lecture.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Tal is an Application Security Expert. As AppSec Labs' Technical Leader, he is leading a variety of security projects for Android, iOS, WP, Web and Client applications.&lt;br /&gt;
&lt;br /&gt;
Prior to working at AppSec Labs, Tal has worked at Amdocs, CheckPoint and RSA, having more than a decade of experience in the Information Security field.&lt;br /&gt;
&lt;br /&gt;
Tal is a lead Trainer, a neat developer, and a security dreamer; breaking, building, defending &amp;amp; training since '99.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== NodeJS Security Done Right​ - The tips and tricks they won’t teach you in school​  ===&lt;br /&gt;
''''' Liran Tal, R&amp;amp;D Team Leader, Hewlett Packard Enterprise '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_NodeJS-Security_LiranTal.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
NodeJS, and JavaScript at large are quickly taking over software whether it is GitHub’s statistics for projects growth, the IoT industry, ChatOps projects written in JavaScript and Enterprises adoption is growing as well.&lt;br /&gt;
&lt;br /&gt;
With this trend, it is imperative to review OWASP security practices and learn how to harden NodeJS Web Applications.​&lt;br /&gt;
​&lt;br /&gt;
We will begin with a quick NodeJS intro and a few fail stories of how things can go wrong. ​&lt;br /&gt;
&lt;br /&gt;
We will quickly dive into hands-on practical implementation of security measures to adopt in your current or future NodeJS project. Next I will show how to leverage widely adopted security tools for integration in the build and CI/CD process to audit and test for security vulnerabilities, as well as leveraging successful enterprise-level open source npm libraries to enhance your web application’s security.​&lt;br /&gt;
​&lt;br /&gt;
In summary: in this session I will demonstrate:​&lt;br /&gt;
* Securing ExpressJS by adopting mature and commonly used npm libraries​&lt;br /&gt;
* Secure code guidelines for JavaScript software developers​&lt;br /&gt;
* Integrating NodeJS security measures as part of your build CI/CD DevOps process​&lt;br /&gt;
​&lt;br /&gt;
To empower others and make a lasting impression for Open Source awareness and Security involvement: In the closing minutes of this presentation I will ask a volunteer from the audience to commit a Pull-Request that enhances security for a NodeJS project on GitHub.​&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Liran is a top contributor to the open source MEAN.io, and core team member of the MEAN.js full stack JavaScript framework. He is also an author of several Node.js npm packages, as well as actively contributing to many open source projects on GitHub. Being an avid supporter and contributor to the open source movement, in 2007 he has redefined network RADIUS management by establishing daloRADIUS, a world-recognized and industry-leading open source project (http://www.daloradius.com).&lt;br /&gt;
 &lt;br /&gt;
Liran is currently leading the R&amp;amp;D Engineering team for Hewlett Packard Enterprise content Marketplace, built on a microservices architecture for a combined technology stack of Java, NodeJS, AngularJS, MongoDB and MySQL. He loves mentoring and empowering team members, drive for better code methodology, and seek out innovative solutions to support business strategies.&lt;br /&gt;
 &lt;br /&gt;
He enjoys spending his time with his beloved wife Tal, and his son Ori. Amongst other things, his hobbies include playing the guitar, hacking all things Linux and continuously experimenting and contributing to open source projects.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Putting the &amp;quot;I&amp;quot; in Code Review - Turning Code Review Interactive ===&lt;br /&gt;
''''' Tamir Shavro, Seeker R&amp;amp;D Manager, Synopsys '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_InteractiveCodeReview_TamirShavro.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Everybody knows that manual code review can be a tedious and lengthy effort, with complexity growing exponentially with the size of the code. However, understanding code flow and focusing on relevant parts can become much easier when employing interactive debugging techniques. This allows combining the best of penetration testing and code review benefits to achieve maximum results in the most efficient manner. In this talk we will explain and demonstrate this eye-opening technique for effectively performing a manual code review on a live system using a debugger and provide a quick starter kit for implementing this technique.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Tamir Shavro has been involved both in complex R&amp;amp;D endeavors and in the security field in the past 18 years. As the Chief Architect &amp;amp; VP RnD of Seeker (acquired by Synopsys in 2015), Tamir has been the driving force behind the development of the Seeker technology. &lt;br /&gt;
&lt;br /&gt;
Prior to Seeker he worked as a Senior Security Consultant in Hacktics, where he was involved in advance application security projects. He was previously a Captain in the IDF Intelligence Corps, involved in various development leadership and architecture roles. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Signoff or Sign-Out ===&lt;br /&gt;
''''' Ofer Maor, Director of Security Strategy, Synopsys '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
Software Signoff is an inevitable step in maturing our software development processes in order to deliver better and safer software. Like with other engineering disciplines before, the growing concerns for safety, security and standards is driving the industry to do better. In this talk we will explain what Software Signoff means and why organizations must adopt it before it is too late.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Ofer Maor is a security expert and entrepreneur with over 20 years of experience in information and application security. Ofer has been involved in application security from its early days, through research, penetration testing, consulting, and product development.  As the founder and CTO of Seeker, Ofer pioneered IAST, the next generation of application security testing technology, currently used by some of the largest organizations in the world to continuously improve their software security. Ofer joined Synopsys when it acquired Seeker in July 2015. Prior to Seeker, Ofer was the Founder and CTO of Hacktics. He led Imperva's Application Defense Center research group and has also served as the Chairman of OWASP Israel and in the OWASP Global Membership Committee.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Dark Side of Search Engine Optimization ===&lt;br /&gt;
'''הצד האפל של קידום אתרים במנועי חיפוש''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai  '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_DarkSideSearchEngineOptimizations_OrKatz.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Search engines optimization (SEO) is a technique being used by web sites owners in order to improve visibility and traffic to their web site. Legitimate SEO activity will use optimization techniques such as: changing structure and textual usage of the web site pages, publication in social media and web forums that will referrer relevant users.&lt;br /&gt;
&lt;br /&gt;
The ultimate goal of SEO campaign is to promote web site ranking in the leading search engines, having the promoted web site returned in the primary result page once searching for relevant terms and keywords. &lt;br /&gt;
&lt;br /&gt;
In the presentation I’m going to present what happens when threat actors get into the world of SEO campaigns abuse SEO optimization techniques and moreover, use all kind of attack techniques such as SQL injection and open redirects in order to manipulate search engines ranking.&lt;br /&gt;
&lt;br /&gt;
I will also evaluate some of the SEO attacks and the manipulating techniques, try to determine who are the victims in this story, check if these attacks achieved their goal and supply more interesting insights on the world of “Blackhat SEO”.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or is an application security veteran, with years of experience at industry leading vendors, currently serves as principal security researcher for Akamai's Cloud Security Intelligence platform. Or is a frequent speaker in conferences such as RSA, AppSec and CSA. Or has published several innovative articles and white papers on web applications threat intelligence and defensive techniques.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Threat of Advanced Cross-Site Search Attacks ===&lt;br /&gt;
'''האיום של התקפות Cross-Site Search מתקדמות''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Dr. Nethanel Gelernter, Cyberpion &amp;amp; The College of Management Academic Studies '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_AdvancedCrossSiteSearch_NethanelGelernter.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Cross-site search (XS-search) is a practical timing side-channel attack that allows the extraction of sensitive information from web-services. The attack exploits inflation techniques to efficiently distinguish between search requests that yield results and requests that do not. This work focuses on the response inflation technique that increases the size of the response; as the difference in the sizes of the responses increases, it becomes easier to distinguish between them. We begin with browser-based XS-search attack and demonstrate its use in extracting users' private data from Gmail and Facebook. The browser-based XS-search attack exploits the differences in the sizes of HTTP responses, and works even when significant inflation of the response is impossible. This part also involves algorithmic improvements compared to previous work. When there is no leakage of information via the timing side channel it is possible to use second-order (SO) XS-search, a novel type of attack that allows the attacker to significantly increase the difference in the sizes of the responses by planting maliciously crafted record into the storage. SO XS-search attacks can be used to extract sensitive information such as email content of Gmail and Yahoo! users, and search history of Bing users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nethanel Gelernter received a PhD in Computer Science from Bar-Ilan University (Israel). His research mainly focuses on web application security, and in particular in exploring new attack vectors and threats in the web. Currently, he is leading the cyber security research and studies in the College of Management Academic Studies in Israel. Beyond the academic world, Nethanel provides consulting services, and he recently founded Cyberpion, a company that investigates unknown attack vectors and develops countermeasures against them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Unwanted Sons - Formalizing and Demonstrating WAF Bypass Methods for the REST of the Top 10 ===&lt;br /&gt;
'''צאצאים לא רצויים - פירמול לטכניקות חדשות למעקף WAF לשאר ההתקפות הנפוצות של OWASP TOP 10''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Shay Chen, CEO, Effective Security '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
The once uncommon application-level protection mechanisms are EVERYWHERE these days, and sooner or later, you'll have to face them.&lt;br /&gt;
&lt;br /&gt;
Web Application Firewalls (WAF) and Intrusion Detection Systems (IDS), Filters and RASP Modules, all common and widespread countermeasures you have to face on a regular basis, with the power to turn a typical assessment into a nightmare, and make automated tools practically useless.&lt;br /&gt;
&lt;br /&gt;
While the attack vectors are well covered in CWE, CAPEC, TECAPI RvR, WASC, OWASP Top 10 and Testing Guide, all you have to cover evasion techniques is a couple of cheat sheets focused on a limited set of attacks.&lt;br /&gt;
&lt;br /&gt;
Sure, there are numerous XSS and SQL Injection evasion cheat sheets, but what about Path Traversal, Remote File Inclusion, OS Command Injection? What about Forced Browsing? What about other attacks?&lt;br /&gt;
&lt;br /&gt;
Formalizing evasion techniques and methods for the REST of the common attack vectors makes a LOT of sense, for manual pen-testing and automated tools - and THIS is phase one, aimed to cover the rest of the unattended top 10.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CEO of Effective Security, an information-security boutique company specializing in information security assessments and in automating security processes of vulnerability management and SDLC. &lt;br /&gt;
&lt;br /&gt;
He has over twelve years in information technology and security, a strong background in software development, and a stream of previously published vulnerabilities, attack vectors, benchmarks and hacking methodologies. &lt;br /&gt;
&lt;br /&gt;
Shay is an experienced speaker, and regularly instructs a wide variety of security related courses in Conferences and Enterprises. Before moving into the information security field, he was involved in various software development projects in ERP, mobile &amp;amp; enterprise environments.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Ways Hackers Are Taking To Win The Mobile Malware Battle ===&lt;br /&gt;
''''' Yair Amit, CTO &amp;amp; Co-founder, Skycure '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_WhyHackersAreWinningMobileMalwareBattle-YairAmit.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
In the proverbial game of cat-and-mouse between endpoint security vendors and malware writers, malware attacks have recently grown more sophisticated. More enterprises are losing ground to hackers, who are able to outmaneuver static and runtime solutions by constantly changing their attack strategies. The team that uncovered iOS malicious profiles, WiFiGate, HTTP Request Hijacking, No iOS Zone and Invisible Profiles are taking it upon themselves to coach developers and organizations on how to regain control, and turn the tables on the hackers behind next-generation mobile malware. &lt;br /&gt;
&lt;br /&gt;
In his presentation, Yair will discuss cutting-edge techniques used by malware writers to circumvent mobile security paradigms such as app-sandboxing and containers. Mr. Amit will then break down the current set of techniques (signatures, static analysis &amp;amp; dynamic analysis) used to identify malware on mobile devices, and identify the pros and cons of these approaches. He will also explain why attackers constantly succeed in fooling these technologies, and explore the problem of false positive/false negative tradeoffs in such solutions. &lt;br /&gt;
&lt;br /&gt;
During a live, interactive demo, Yair will create a mobile malware on stage, meant to be undetected by static and runtime analysis technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yair Amit is co-founder and CTO at Skycure, leading the company’s research and vision and overseeing its R&amp;amp;D center. Yair has been active in the security industry for more than a decade with his research regularly covered by media outlets and presented in security conferences around the world. Prior to co-founding Skycure, Yair managed the Application Security and Research Group at IBM, joining through the acquisition of Watchfire. At IBM, Yair led the research and implementation of IBM’s next-generation application security technology. Yair holds a BSc, summa cum laude, from Tel Aviv University in bioinformatics.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecIL2016_DarkSideSearchEngineOptimizations_OrKatz.pdf&amp;diff=222020</id>
		<title>File:AppSecIL2016 DarkSideSearchEngineOptimizations OrKatz.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecIL2016_DarkSideSearchEngineOptimizations_OrKatz.pdf&amp;diff=222020"/>
				<updated>2016-10-02T08:15:21Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_Presentations&amp;diff=221896</id>
		<title>AppSec Israel 2016 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_Presentations&amp;diff=221896"/>
				<updated>2016-09-29T08:29:20Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: added more slidedecks&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Full descriptions of all the talks at [[AppSec_Israel_2016|AppSec Israel 2016]] are below, together with each of the speakers' biographies. &lt;br /&gt;
&lt;br /&gt;
The [https://appsecil2016.sched.org/ full schedule can be found and subscribed to here].&lt;br /&gt;
&lt;br /&gt;
Pictures from the event [https://drive.google.com/drive/folders/0B0_K8tApcXxmVzBkcDNFUmt5S0U can be found here].&lt;br /&gt;
&lt;br /&gt;
__TOC__ &lt;br /&gt;
&lt;br /&gt;
The AppSec Israel conference is proudly being sponsored by: &lt;br /&gt;
{{Template:AppSec_Israel_2016_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
== Technical Tracks ==&lt;br /&gt;
&lt;br /&gt;
=== Bot Extension - Abusing Google Chrome Extensions for Bot Attacks ===&lt;br /&gt;
'''תוספי בוט - שימוש בתוספי כרום למטרת התקפות בוטים'''  &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Tomer Cohen, Head of R&amp;amp;D security, Wix.com '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
Chrome extensions have opened a variety of opportunities for users as well as developers, expanding the limits of what we've known as browsing experience. Attacker have also spotted the wide usage of such extensions, and abuse people's trust in Chrome Web Store to distribute malicious extensions. This allows them to run web-based bot attacks straight from victims' browsers, including DDoS campaigns and cross-site requests resulting in impersonation of users in third-party websites.&lt;br /&gt;
&lt;br /&gt;
Furthermore, the detection of such bot attack by a third-party is more complex than in regular distributed attacks, since real humans actually use the Chrome tab abused to attack the victim third-party.&lt;br /&gt;
&lt;br /&gt;
The lecture will include an intro on Chrome Extension architecture followed by techniques to abuse this architecture in order to run bot attacks, as well as distribute a malicious extensions to big crowds of victims.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Worked as a security consultant in several places, one of the founders of Magshimim Cyber Training Program.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Could a few lines of code &amp;lt;F!#ck&amp;gt; it all up?? ===&lt;br /&gt;
''''' Amit Ashbel, Director of Product Marketing &amp;amp; Cyber Security Evangelist, Checkmarx '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Erez Yalon, Application Security Lead, Checkmarx '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_AFewLinesOfCode-JS_AmitAshbel-ErezYalon.pptx|download presentation]])&lt;br /&gt;
&lt;br /&gt;
March 2016. An anonymous open source developer decides to remove his code (left-pad) from a public repository.&lt;br /&gt;
&lt;br /&gt;
Shortly thereafter, several large organizations felt the impact of his actions. Facebook, AirBnB and others experienced errors impacting the functionality of their services. Packages using “left-pad” wouldn’t properly execute.&lt;br /&gt;
&lt;br /&gt;
Today, we embrace both the open source community and the growth of open source projects, modules and packages but... Dependencies and recursive dependencies might become a risk or even a new attack vector which we didn’t foresee. &lt;br /&gt;
&lt;br /&gt;
Could there be other cases of common and popular open source packages depending on open source modules that might not be there tomorrow or, even worse, could they be maliciously modified?&lt;br /&gt;
&lt;br /&gt;
Join us for an insightful session that will reveal our research on this topic where you will learn:&lt;br /&gt;
* Which common open source packages might not be there tomorrow and how this can affect you?&lt;br /&gt;
* How packages you use could be maliciously modified impact on your app Discuss the risks introduced by hybrid application development &lt;br /&gt;
* How intertwined and complex dependencies have become&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Amit has been with the security community for more than a decade where he has taken on multiple tasks and responsibilities, including technical and Senior Product lead positions. Amit adds valuable product knowledge including experience with a wide range of security platforms and familiarity with emerging threats. Amit also speaks at high profile events and conferences such as BlackHat, Defcon, OWASP and others.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Yalon heads the security research group at Checkmarx. With vast defender and attacker experience and as an independent security researcher, he brings invaluable knowledge and skills to the table. Erez is responsible for maintaining Checkmarx’s top notch vulnerability detection technology where his previous development experience with a variety of coding languages comes into play.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Crippling HTTPS with unholy PAC ===&lt;br /&gt;
'''איך להרוס HTTPS עם PAC&amp;quot;ל חבלה''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Amit Klein, VP Security Research, SafeBreach '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_CripplingHTTPSwithUnholyPAC_AmitKlein.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
You're in a potentially malicious network (free WiFi, guest network, or maybe your own corporate LAN). You're a security conscious netizen so you restrict yourself to HTTPS (browsing to HSTS sites and/or using a &amp;quot;Force TLS/SSL&amp;quot; browser extension). All your traffic is protected from the first byte. Or is it?&lt;br /&gt;
&lt;br /&gt;
We will demonstrate that, by forcing your browser/system to use a malicious PAC (Proxy AutoConfiguration) resource, it is possible to leak HTTPS URLs. We will explain how this affects the privacy of the user and how credentials/sessions can be stolen. We will present the concept of &amp;quot;PAC Malware&amp;quot; (a malware which is implemented only as JavaScript logic in a PAC resource) that features: a 2-way communication channel between the PAC malware and an external server, contextual phishing via messages, denial-of-service options, and sensitive data extraction from URI's. We present a comprehensive browser PAC feature matrix and elaborate more about this cross-platform (Linux, Windows, Mac) and cross-browser (IE, Chrome, Safari) threat.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Amit Klein is a world renowned information security expert, with 25 years in information security and over 30 published technical papers on this topic. Amit is VP Security Research at SafeBreach, responsible for researching various infiltration, exfiltration and lateral movement attacks. Before SafeBreach, Amit was CTO for Trusteer (acquired by IBM) for 8.5 years. Prior to Trusteer, Amit was chief scientist for Cyota (acquired by RSA) for 2 years, and prior to that, director of Security and Research for Sanctum (acquired by Watchfire, now part of IBM security division) for 7 years. Amit has a B.Sc. from the Hebrew University (magna cum laude, Talpiot program), recognized by InfoWorld as a CTO of the year 2010, and has presented at HITB, RSA, OWASP, CertConf, BlueHat, CyberTech, APWG and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Don't Feed the Hippos! ===&lt;br /&gt;
''''' Martin Knobloch, Principal Consultant, Nixu '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_DontFeedTheHippos_MartinKnobloch.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
The security community is trying to solve insecurity caused by bugs and flaws in software for many years now, but with what success? &lt;br /&gt;
&lt;br /&gt;
We almost never look in successes and failures experiences in other areas, but we could really learn from. This talk is inspired by Ernesto Sirolli’s TED talk “Want to help someone? Shut up and listen!” about failures in the aid program’s around the world. Listening to Ernesto Sirolli, you cannot miss the similarity with the security community trying to tell developers how to write secure code.  This talk points out common failures of the security community when communicating with developers, trying to solve their problems without understanding what their problems really are. &lt;br /&gt;
&lt;br /&gt;
Using the hippo-analogy for security failures, during the talks those ‘(in-)secure hippos’ are identified, advice on how to avoid them are provided, by anecdotes and best practices from the experience of the past 10 years in the security field as a consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Martin is Principal Consultant at Nixu BeNeLux (https://www.nixu.com/en/nixubenelux). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&lt;br /&gt;
&lt;br /&gt;
With his background in Java Development, he understands the complexity of Enterprise software development, Agile Scrum environments and continuous delivery / deployment. &lt;br /&gt;
&lt;br /&gt;
Martin got involved in OWASP in 2006. He became a member of the OWASP Netherland Chapter board in 2007. He has contributed to several OWASP projects and is co-organizer of the OWASP BeNeLux-Day conference since 2008. Martin has been chair of the Global Education Committee from 2008 until the ending of the Global Committees. &lt;br /&gt;
&lt;br /&gt;
Futher, Martin is the conference chair of the OWASP AppSec-Eu/Research 2015 conference in Amsterdam, the Netherlands and involved in the AppSec-Eu 2016 among other activities as CfT Co-Chair. &lt;br /&gt;
&lt;br /&gt;
Martin is a frequent speaker at universities, hacker spaces and various conferences. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; English&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hacking HTTP/2 - New attacks on the Internet’s Next Generation Foundation ===&lt;br /&gt;
''''' Nadav Avital, Application Security Research Team Leader, Imperva '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Noam Mazor, Security Research Engineer, Imperva '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
HTTP/2 is the emerging network protocol for the Internet, facilitating leaner and faster web browsing by introducing several new mechanisms which can be seen as a single transition layer for web traffic. The adoption of HTTP/2 is lightning fast, and even though only a year has passed since its publication, HTTP/2 is already supported by all significant players in the field including browsers, web servers and Content Delivery Networks. &lt;br /&gt;
&lt;br /&gt;
In the presentation we will overview the HTTP/2 attack surface - stream multiplexing, flow control, HPACK compression and server push, with a focus on how the way HTTP/2 servers implement these mechanisms can make or break your security posture. We will continue with presenting new classes of vulnerabilities that have been introduced by the mechanisms used with HTTP/2, and explaining how these vulnerabilities can be used for mounting effective attacks against web servers like Apache, IIS, Ngnix, Jetty and nghttp. We will explain in detail several serious zero-day vulnerabilities, such as CVE-2016-1546, CVE-2016-0150 and CVE-2016-1544, and end with discussing several approaches for mitigating attacks of these types. &lt;br /&gt;
&lt;br /&gt;
Those attending this session will understand that:&lt;br /&gt;
* As an emerging technology that introduces novel and flexible mechanisms, HTTP/2 also induces new risks. &lt;br /&gt;
* HTTP/2 implementations are still not “security mature.” Therefore it is almost certain that scrutiny of HTTP/2 implementations will increase in coming years, resulting in the discovery of new vulnerabilities, exploits and security patches.  With HTTP/2 gaining more popularity, this trend will intensify. &lt;br /&gt;
* An effective security strategy for newly adopted technologies must rely on supplemental solutions rather than patching&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nadav Avital is an expert in Web Application Security. He leads an Imperva team who captures and analyzes hacking activities and then create mitigation strategies. These efforts result in research for new technologies and protocols. Nadav has more than 10 years industry experience in coding and creating security tools. He holds B.Sc. in Computer Science.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Noam Mazor worked in Imperva as security research engineer in the Web Application Security team. Noam has experience in analyzing hacking activities, creating mitigation and researching vulnerabilities. He holds BSc in Computer Science and is currently a MSc student in Tel Aviv University.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hacking The IoT (Internet of Things) - PenTesting RF Operated Devices ===&lt;br /&gt;
'''האקינג של מערכות IoT מבוססות RF''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Erez Metula, Application Security Expert, AppSec Labs (Founder) '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_HackingTheIoT-PenTestingRFDevices_ErezMetula.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
We often encounter IoT (Internet of Things) systems during our work as penetration testers and security consultants. We know how to assess the security of the server side API, the associated mobile apps, the web apps and so on - but what about the device itself (the &amp;quot;thing&amp;quot;)? Moreover, what happens if the device is not using traditional HTTP/S request, or does not even &amp;quot;speak&amp;quot; plain old TCP/IP?&lt;br /&gt;
&lt;br /&gt;
During this talk, we'll go over the obstacles we have to face when analyzing unknown, custom RF based communication that drives the target IoT system we're pentesting. We'll talk about and see in action tools that will allow us to capture RF traffic, analyze it, brute force it, replay it, and of course forge it. It's like plain old appsec hacking tricks, but at the RF level. So let's hack some physical things belonging to the real world!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula is the founder and Chairman of AppSec Labs, a leading company in the field of application security.&lt;br /&gt;
&lt;br /&gt;
He is the author of the book &amp;quot;Managed Code Rootkits&amp;quot;, and is a world renowned application security expert.&lt;br /&gt;
&lt;br /&gt;
Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. Erez had helped companies from all sizes, from startups to Fortune 500 organizations. &lt;br /&gt;
&lt;br /&gt;
Erez focuses on advanced application security topics and has performed extensive ground breaking research on mobile application security. &lt;br /&gt;
&lt;br /&gt;
Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Integrating Security in Agile projects   (real case study) ===&lt;br /&gt;
''''' Elena Kravchenko, ADM BU Security Lead, Security &amp;amp; Trust Office, HPE Software '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Efrat Wasserman, ADM Senior Program manager, SRL, HPE Software ''''' &amp;lt;br/&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_IntegratingSecurityInAgile_ElenaKravchenko-EfratWasserman.pptx|download presentation]])&lt;br /&gt;
&lt;br /&gt;
There are many different security development lifecycles (SDLC) frameworks in the modern world. However, a fully implemented SDLC program is often represented as heavy, time-consuming and not suitable to Agile development methodology. We’d like to break the myth and show how a very comprehensive security program, managed by a dedicated security office, can be successfully integrated in agile development project on a real case example.  &lt;br /&gt;
&lt;br /&gt;
We’ll shortly describe the main challenges, and the techniques and procedures helping to overcome the challenges. We’ll present the Security Lifecycle Management (SLM) Framework developed and used in HPE SW in the last three years, and describe how it integrated into development of new SaaS based fully agile developed product, with emphasis on main activities and roles. As a part of the presentation we would like to highlight the importance of the proper program management and role of the PMO and how it became a key success factor in the effective security program implementation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Elena has a MSc in Applied Mathematics from Leningrad State University, and over 25 years of software engineering experience in different roles, including Software Design Engineer, Technical Lead, Customer Oriented Development Engineer, and Software System Architect.&lt;br /&gt;
&lt;br /&gt;
Currently a part of HPE Software ITOM and ADM Security and Trust Office  as the Security Lead for HPE’s Application Delivery Management (ADM) Business Unit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Efrat has earned a BSc in Computer Science and Mathematics, and a MBA in Business Management and Marketing. She has over 17 years in Software Development, and 9 years as a Program manager.  &lt;br /&gt;
&lt;br /&gt;
Currently Senior Program Manager in HPE SW responsible for lifecycle of SaaS product&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Law and the Israeli Cybersecurity Industry ===&lt;br /&gt;
''''' Eli Greenbaum, Partner, Yigal Arnon &amp;amp; Co. '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
From an international perspective, Israel provides a unique laboratory for studying the effect of law and regulation on cybersecurity research and development. This presentation will provide an introduction to specific laws and regulations concerning cybersecurity research and ask whether these laws have in actual practice influenced the growth of the cybersecurity ecosystem in Israel. More specifically, how have industry players, including startups, multinationals and the military, reacted to the unique legal framework that Israel provides for cybersecurity activities?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Eli Greenbaum is partner in the law firm of Yigal Arnon &amp;amp; Co., specializing in technology, intellectual property and cybersecurity. He received his Masters degree in Applied Physics from Columbia University and his law degree from Yale Law School. Eli has published widely in the intersection between technology and the law, including in the Harvard Journal of Law and Technology and the Cardozo Law Review. Eli clerked from Justice Miriam Naor of the Supreme Court of Israel and Judge David Cheshin of the District Court of Jerusalem.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; English&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing ===&lt;br /&gt;
''''' Tal Melamed, Technical Leader, AppSec Labs '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_JavaHurdling_TalMelamed.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Testing Java client applications is not always straightforward as testing web applications. Even under experienced hands, there might be obstacles coming your way; what if you cannot use a proxy? How do you MitM? What if you just can't? How do you modify the app to your benefit?&lt;br /&gt;
&lt;br /&gt;
Fortunately, Java is still Java. This lecture is based on a true story, and will follow an interesting case of pen-testing a known product; what tools and techniques can be used in order to jump over hurdles, all the way to the finish line.&lt;br /&gt;
&lt;br /&gt;
The lecture aims to enrich the pentester's toolbox as well as mind, when facing Java client applications; MitM-ing, run-time manipulations and patching the code are only some of the discussed cases.&lt;br /&gt;
&lt;br /&gt;
In addition, a newly developed proxy for intercepting and tampering with TCP communication over TLS/SSL and bypassing certificate-pinning protections, will be introduced during the lecture.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Tal is an Application Security Expert. As AppSec Labs' Technical Leader, he is leading a variety of security projects for Android, iOS, WP, Web and Client applications.&lt;br /&gt;
&lt;br /&gt;
Prior to working at AppSec Labs, Tal has worked at Amdocs, CheckPoint and RSA, having more than a decade of experience in the Information Security field.&lt;br /&gt;
&lt;br /&gt;
Tal is a lead Trainer, a neat developer, and a security dreamer; breaking, building, defending &amp;amp; training since '99.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== NodeJS Security Done Right​ - The tips and tricks they won’t teach you in school​  ===&lt;br /&gt;
''''' Liran Tal, R&amp;amp;D Team Leader, Hewlett Packard Enterprise '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_NodeJS-Security_LiranTal.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
NodeJS, and JavaScript at large are quickly taking over software whether it is GitHub’s statistics for projects growth, the IoT industry, ChatOps projects written in JavaScript and Enterprises adoption is growing as well.&lt;br /&gt;
&lt;br /&gt;
With this trend, it is imperative to review OWASP security practices and learn how to harden NodeJS Web Applications.​&lt;br /&gt;
​&lt;br /&gt;
We will begin with a quick NodeJS intro and a few fail stories of how things can go wrong. ​&lt;br /&gt;
&lt;br /&gt;
We will quickly dive into hands-on practical implementation of security measures to adopt in your current or future NodeJS project. Next I will show how to leverage widely adopted security tools for integration in the build and CI/CD process to audit and test for security vulnerabilities, as well as leveraging successful enterprise-level open source npm libraries to enhance your web application’s security.​&lt;br /&gt;
​&lt;br /&gt;
In summary: in this session I will demonstrate:​&lt;br /&gt;
* Securing ExpressJS by adopting mature and commonly used npm libraries​&lt;br /&gt;
* Secure code guidelines for JavaScript software developers​&lt;br /&gt;
* Integrating NodeJS security measures as part of your build CI/CD DevOps process​&lt;br /&gt;
​&lt;br /&gt;
To empower others and make a lasting impression for Open Source awareness and Security involvement: In the closing minutes of this presentation I will ask a volunteer from the audience to commit a Pull-Request that enhances security for a NodeJS project on GitHub.​&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Liran is a top contributor to the open source MEAN.io, and core team member of the MEAN.js full stack JavaScript framework. He is also an author of several Node.js npm packages, as well as actively contributing to many open source projects on GitHub. Being an avid supporter and contributor to the open source movement, in 2007 he has redefined network RADIUS management by establishing daloRADIUS, a world-recognized and industry-leading open source project (http://www.daloradius.com).&lt;br /&gt;
 &lt;br /&gt;
Liran is currently leading the R&amp;amp;D Engineering team for Hewlett Packard Enterprise content Marketplace, built on a microservices architecture for a combined technology stack of Java, NodeJS, AngularJS, MongoDB and MySQL. He loves mentoring and empowering team members, drive for better code methodology, and seek out innovative solutions to support business strategies.&lt;br /&gt;
 &lt;br /&gt;
He enjoys spending his time with his beloved wife Tal, and his son Ori. Amongst other things, his hobbies include playing the guitar, hacking all things Linux and continuously experimenting and contributing to open source projects.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Putting the &amp;quot;I&amp;quot; in Code Review - Turning Code Review Interactive ===&lt;br /&gt;
''''' Tamir Shavro, Seeker R&amp;amp;D Manager, Synopsys '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_InteractiveCodeReview_TamirShavro.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Everybody knows that manual code review can be a tedious and lengthy effort, with complexity growing exponentially with the size of the code. However, understanding code flow and focusing on relevant parts can become much easier when employing interactive debugging techniques. This allows combining the best of penetration testing and code review benefits to achieve maximum results in the most efficient manner. In this talk we will explain and demonstrate this eye-opening technique for effectively performing a manual code review on a live system using a debugger and provide a quick starter kit for implementing this technique.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Tamir Shavro has been involved both in complex R&amp;amp;D endeavors and in the security field in the past 18 years. As the Chief Architect &amp;amp; VP RnD of Seeker (acquired by Synopsys in 2015), Tamir has been the driving force behind the development of the Seeker technology. &lt;br /&gt;
&lt;br /&gt;
Prior to Seeker he worked as a Senior Security Consultant in Hacktics, where he was involved in advance application security projects. He was previously a Captain in the IDF Intelligence Corps, involved in various development leadership and architecture roles. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Signoff or Sign-Out ===&lt;br /&gt;
''''' Ofer Maor, Director of Security Strategy, Synopsys '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
Software Signoff is an inevitable step in maturing our software development processes in order to deliver better and safer software. Like with other engineering disciplines before, the growing concerns for safety, security and standards is driving the industry to do better. In this talk we will explain what Software Signoff means and why organizations must adopt it before it is too late.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Ofer Maor is a security expert and entrepreneur with over 20 years of experience in information and application security. Ofer has been involved in application security from its early days, through research, penetration testing, consulting, and product development.  As the founder and CTO of Seeker, Ofer pioneered IAST, the next generation of application security testing technology, currently used by some of the largest organizations in the world to continuously improve their software security. Ofer joined Synopsys when it acquired Seeker in July 2015. Prior to Seeker, Ofer was the Founder and CTO of Hacktics. He led Imperva's Application Defense Center research group and has also served as the Chairman of OWASP Israel and in the OWASP Global Membership Committee.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Dark Side of Search Engine Optimization ===&lt;br /&gt;
'''הצד האפל של קידום אתרים במנועי חיפוש''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai  '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
Search engines optimization (SEO) is a technique being used by web sites owners in order to improve visibility and traffic to their web site. Legitimate SEO activity will use optimization techniques such as: changing structure and textual usage of the web site pages, publication in social media and web forums that will referrer relevant users.&lt;br /&gt;
&lt;br /&gt;
The ultimate goal of SEO campaign is to promote web site ranking in the leading search engines, having the promoted web site returned in the primary result page once searching for relevant terms and keywords. &lt;br /&gt;
&lt;br /&gt;
In the presentation I’m going to present what happens when threat actors get into the world of SEO campaigns abuse SEO optimization techniques and moreover, use all kind of attack techniques such as SQL injection and open redirects in order to manipulate search engines ranking.&lt;br /&gt;
&lt;br /&gt;
I will also evaluate some of the SEO attacks and the manipulating techniques, try to determine who are the victims in this story, check if these attacks achieved their goal and supply more interesting insights on the world of “Blackhat SEO”.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or is an application security veteran, with years of experience at industry leading vendors, currently serves as principal security researcher for Akamai's Cloud Security Intelligence platform. Or is a frequent speaker in conferences such as RSA, AppSec and CSA. Or has published several innovative articles and white papers on web applications threat intelligence and defensive techniques.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Threat of Advanced Cross-Site Search Attacks ===&lt;br /&gt;
'''האיום של התקפות Cross-Site Search מתקדמות''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Dr. Nethanel Gelernter, Cyberpion &amp;amp; The College of Management Academic Studies '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_AdvancedCrossSiteSearch_NethanelGelernter.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Cross-site search (XS-search) is a practical timing side-channel attack that allows the extraction of sensitive information from web-services. The attack exploits inflation techniques to efficiently distinguish between search requests that yield results and requests that do not. This work focuses on the response inflation technique that increases the size of the response; as the difference in the sizes of the responses increases, it becomes easier to distinguish between them. We begin with browser-based XS-search attack and demonstrate its use in extracting users' private data from Gmail and Facebook. The browser-based XS-search attack exploits the differences in the sizes of HTTP responses, and works even when significant inflation of the response is impossible. This part also involves algorithmic improvements compared to previous work. When there is no leakage of information via the timing side channel it is possible to use second-order (SO) XS-search, a novel type of attack that allows the attacker to significantly increase the difference in the sizes of the responses by planting maliciously crafted record into the storage. SO XS-search attacks can be used to extract sensitive information such as email content of Gmail and Yahoo! users, and search history of Bing users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nethanel Gelernter received a PhD in Computer Science from Bar-Ilan University (Israel). His research mainly focuses on web application security, and in particular in exploring new attack vectors and threats in the web. Currently, he is leading the cyber security research and studies in the College of Management Academic Studies in Israel. Beyond the academic world, Nethanel provides consulting services, and he recently founded Cyberpion, a company that investigates unknown attack vectors and develops countermeasures against them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Unwanted Sons - Formalizing and Demonstrating WAF Bypass Methods for the REST of the Top 10 ===&lt;br /&gt;
'''צאצאים לא רצויים - פירמול לטכניקות חדשות למעקף WAF לשאר ההתקפות הנפוצות של OWASP TOP 10''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Shay Chen, CEO, Effective Security '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
The once uncommon application-level protection mechanisms are EVERYWHERE these days, and sooner or later, you'll have to face them.&lt;br /&gt;
&lt;br /&gt;
Web Application Firewalls (WAF) and Intrusion Detection Systems (IDS), Filters and RASP Modules, all common and widespread countermeasures you have to face on a regular basis, with the power to turn a typical assessment into a nightmare, and make automated tools practically useless.&lt;br /&gt;
&lt;br /&gt;
While the attack vectors are well covered in CWE, CAPEC, TECAPI RvR, WASC, OWASP Top 10 and Testing Guide, all you have to cover evasion techniques is a couple of cheat sheets focused on a limited set of attacks.&lt;br /&gt;
&lt;br /&gt;
Sure, there are numerous XSS and SQL Injection evasion cheat sheets, but what about Path Traversal, Remote File Inclusion, OS Command Injection? What about Forced Browsing? What about other attacks?&lt;br /&gt;
&lt;br /&gt;
Formalizing evasion techniques and methods for the REST of the common attack vectors makes a LOT of sense, for manual pen-testing and automated tools - and THIS is phase one, aimed to cover the rest of the unattended top 10.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CEO of Effective Security, an information-security boutique company specializing in information security assessments and in automating security processes of vulnerability management and SDLC. &lt;br /&gt;
&lt;br /&gt;
He has over twelve years in information technology and security, a strong background in software development, and a stream of previously published vulnerabilities, attack vectors, benchmarks and hacking methodologies. &lt;br /&gt;
&lt;br /&gt;
Shay is an experienced speaker, and regularly instructs a wide variety of security related courses in Conferences and Enterprises. Before moving into the information security field, he was involved in various software development projects in ERP, mobile &amp;amp; enterprise environments.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Ways Hackers Are Taking To Win The Mobile Malware Battle ===&lt;br /&gt;
''''' Yair Amit, CTO &amp;amp; Co-founder, Skycure '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_WhyHackersAreWinningMobileMalwareBattle-YairAmit.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
In the proverbial game of cat-and-mouse between endpoint security vendors and malware writers, malware attacks have recently grown more sophisticated. More enterprises are losing ground to hackers, who are able to outmaneuver static and runtime solutions by constantly changing their attack strategies. The team that uncovered iOS malicious profiles, WiFiGate, HTTP Request Hijacking, No iOS Zone and Invisible Profiles are taking it upon themselves to coach developers and organizations on how to regain control, and turn the tables on the hackers behind next-generation mobile malware. &lt;br /&gt;
&lt;br /&gt;
In his presentation, Yair will discuss cutting-edge techniques used by malware writers to circumvent mobile security paradigms such as app-sandboxing and containers. Mr. Amit will then break down the current set of techniques (signatures, static analysis &amp;amp; dynamic analysis) used to identify malware on mobile devices, and identify the pros and cons of these approaches. He will also explain why attackers constantly succeed in fooling these technologies, and explore the problem of false positive/false negative tradeoffs in such solutions. &lt;br /&gt;
&lt;br /&gt;
During a live, interactive demo, Yair will create a mobile malware on stage, meant to be undetected by static and runtime analysis technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yair Amit is co-founder and CTO at Skycure, leading the company’s research and vision and overseeing its R&amp;amp;D center. Yair has been active in the security industry for more than a decade with his research regularly covered by media outlets and presented in security conferences around the world. Prior to co-founding Skycure, Yair managed the Application Security and Research Group at IBM, joining through the acquisition of Watchfire. At IBM, Yair led the research and implementation of IBM’s next-generation application security technology. Yair holds a BSc, summa cum laude, from Tel Aviv University in bioinformatics.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecIL2016_NodeJS-Security_LiranTal.pdf&amp;diff=221895</id>
		<title>File:AppSecIL2016 NodeJS-Security LiranTal.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecIL2016_NodeJS-Security_LiranTal.pdf&amp;diff=221895"/>
				<updated>2016-09-29T08:28:52Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecIL2016_CripplingHTTPSwithUnholyPAC_AmitKlein.pdf&amp;diff=221894</id>
		<title>File:AppSecIL2016 CripplingHTTPSwithUnholyPAC AmitKlein.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecIL2016_CripplingHTTPSwithUnholyPAC_AmitKlein.pdf&amp;diff=221894"/>
				<updated>2016-09-29T08:27:24Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecIL2016_AdvancedCrossSiteSearch_NethanelGelernter.pdf&amp;diff=221893</id>
		<title>File:AppSecIL2016 AdvancedCrossSiteSearch NethanelGelernter.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecIL2016_AdvancedCrossSiteSearch_NethanelGelernter.pdf&amp;diff=221893"/>
				<updated>2016-09-29T08:25:31Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=221838</id>
		<title>Category:Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=221838"/>
				<updated>2016-09-27T08:39:20Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: after AppSecIL 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp_Israel_logo.png|center|500px]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter leader is '''[mailto:avi.douglen@owasp.org Avi Douglen]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board: '''[mailto:avi.douglen@owasp.org Avi Douglen]''', '''Or Katz''', ''' Ofer Maor''', '''Erez Metula''', '''Hemed Gur Ary''', '''[[User:YossiOren|Dr. Yossi Oren]]'''&lt;br /&gt;
* Chapter Founder: '''[mailto:ofer@shezaf.com Ofer Shezaf]'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Avi Douglen, Ofer Maor, Yossi Oren&lt;br /&gt;
* Mailing List Management: Avi Douglen, Ofer Maor, Or Katz   &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Israel&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Activity ==&lt;br /&gt;
&lt;br /&gt;
* An annual conference, usually in September or October. &lt;br /&gt;
* Periodic meetings. If you would like to host a meeting or speak in one contact [mailto:avi.douglen@owasp.org Avi Douglen] or [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew translation]].&lt;br /&gt;
* Security discussion forum in Hebrew - on [https://www.facebook.com/groups/owasp.il/ Facebook]. &lt;br /&gt;
* [https://www.linkedin.com/groups/39702 LinkedIn Group] for networking and announcements. &lt;br /&gt;
* [https://owasp.slack.com/messages/chapter-israel/ Chat room for security in Hebrew].&lt;br /&gt;
* [http://www.meetup.com/OWASP-Israel/ Meetings and socialization on Meetup].&lt;br /&gt;
* [https://twitter.com/OWASP_IL Twitter account]. &lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
* [[OWASP_IL_Sponsorship|Sponsorship opportunities]], including #AppSecIL conference sponsorship. &lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up! Contact [mailto:avi.douglen@owasp.org Avi Douglen] with any ideas you have.&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 in Hebrew ==  &lt;br /&gt;
&lt;br /&gt;
; '''The OWASP Top 10, 2013 version was translated to Hebrew! &amp;lt;br&amp;gt; &lt;br /&gt;
It is now [[OWASP_Top10_Hebrew|available for download]].'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous OWASP Israel Conferences and Meetings ==&lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2016|AppSec Israel 2016]] Conference was held on Monday, September 19th, at the College of Management, with more than 650 attendees! (Use the [[AppSec_Israel_2016_Presentations|presentations info page]] to download presentations and videos)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2016|OWASP Israel June 2016]] took place in the Amdocs Auditorium in Raanana, on June 14, 2016. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2016|OWASP Israel April 2016]] was held at HP Enterprise in Yehud, on April 12, 2016, with over 150 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_February_2016|OWASP Israel February 2016]] was held at F5 Networks in Tel Aviv, on February 2, 2016. &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2015|AppSec Israel 2015]] Conference was held on October 13th, at the College of Management, with over 550 participants! (Use the [[AppSec_Israel_2015_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2015|OWASP Israel June 2015]] was held at Microsoft in Herzeliya, on June 16, 2015, with around 120 participants.   &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_March_2015|OWASP Israel March 2015]] was held at NCR in Raanana, on March 30, 2015, with over 120 participants.  &lt;br /&gt;
&lt;br /&gt;
; [[AppSec_Israel_2014|AppSec Israel 2014]] Conference was held on September 2nd, at the IDC, with over 450 participants! (Use the [[AppSec_Israel_2014_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_June_2014|OWASP Israel June 2014]] was held at F5 Networks in Tel Aviv, on June 16, 2014, with over 110 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_April_2014|OWASP Israel April 2014]] was held at Akamai in Herzliya Pituach, on April 23, 2014, with close to 100 participants. &lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_January_2014|OWASP Israel January 2014]] was held at Amdocs in Ra'anana on January 14th, 2014, with over 120 participants.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2013|OWASP Israel 2013]] Conference held on October 1st with close to 480 participants! (Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2013_05|OWASP Israel May 2013]] was held at RSA on May 28th 2013 with 80 participants.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2013_02|OWASP Israel February 2013]]  meeting was held at E&amp;amp;Y on February 12th 2013 ([[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]).&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2012|OWASP Israel 2012 conference]] Was held at the IDC on Sep 5th 2012.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2011|OWASP Israel 2011 Conference]] Was held in the IDC in Herzliya on Sep 15th 2011, with about 350 attendees. &lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010|OWASP Israel 2010 Conference]] Was held in the IDC in Herzliya on Sep 6th 2010 with about 150 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_06|OWASP Israel Jun-2010]] meeting was held in IBM/Watchfire in Herzliya on Jun 22nd 2010.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_02|OWASP Israel Feb-2010]] meeting was held in Amdocs in Ra'anana on Feb 9th 2010 with over 70 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2010_01|OWASP Israel Jan-2010]] meeting was held in Breach Security in Herzliya on Jan 12th 2010 with over 60 attendees.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Israel_2009_12|OWASP Israel Dec-2009]] meeting was held in IBM/Watchfire in Herzliya in Dec 2009.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009|OWASP Israel 2009]] conference was held at the Interdisciplinary Center Herzliya on Sunday, September 6th 2009. &lt;br /&gt;
: You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]].&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]] was held at IBM in Park Azorim in Petach-Tikva on May 7th. The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]] was held at the Tel-Aviv University on March 26th, with approximately 60 attendees. The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, [http://www.2bsecure.co.il 2bsecure] ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, [http://www.breach.com Breach Security] ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, [http://www.xiom.com Xiom] ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]] was held at Checkpoint on January 28th, with over a 100 people attending. The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference at the Interdisciplinary Center Herzliya (IDC)]] was held on September 14th with 250 attendees.&lt;br /&gt;
&lt;br /&gt;
; OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]&lt;br /&gt;
: OWASP sponsored the IDC Security Road Show event in Israel on June 3rd 2008. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]&lt;br /&gt;
: the 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya. The conference really set itself as an event you must come to if you have anything to do with application security. [ [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]] [[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Israel_2016&amp;diff=221837</id>
		<title>AppSec Israel 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Israel_2016&amp;diff=221837"/>
				<updated>2016-09-27T08:14:13Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: PostConf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:AppSecIL_Logo_2016.png|center]] &lt;br /&gt;
&lt;br /&gt;
The annual OWASP AppSec Israel Conference is the largest conference in Israel for application security, and regularly draws hundreds of participants. Over 650 people attended this year!  &lt;br /&gt;
&lt;br /&gt;
But AppSecIL is not just for security experts!   &lt;br /&gt;
&lt;br /&gt;
Aimed at developers, testers, architects, product designers, and managers - anyone involved with the software lifecycle is welcome, regardless of type of software, website, mobile app, or any other type of application. &lt;br /&gt;
&lt;br /&gt;
If you are responsible for, or involved with:&lt;br /&gt;
* web security&lt;br /&gt;
* devops security&lt;br /&gt;
* cloud security&lt;br /&gt;
* mobile security&lt;br /&gt;
* application security&lt;br /&gt;
* software development&lt;br /&gt;
* quality assurance&lt;br /&gt;
* software maintenance or operations&lt;br /&gt;
... you should join us at AppSecIL! &lt;br /&gt;
&lt;br /&gt;
AppSec Israel 2016 has two lecture tracks from an amazing group of speakers. We also hosted a sponsors pavilion for products and services relevant to application security and developers.&lt;br /&gt;
&lt;br /&gt;
All the talks at the Conference were recorded, and will be made available soon.&lt;br /&gt;
&lt;br /&gt;
A [https://drive.google.com/drive/folders/0B0_K8tApcXxmVzBkcDNFUmt5S0U collection of pictures from the event].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
= Location and Time  =&lt;br /&gt;
&lt;br /&gt;
The annual OWASP AppSec Israel 2016 conference was held this year in The College of Management (Michlala l’Minhal), in Rishon LeZion (about 20 minutes south of Tel Aviv), on Monday, September 19th, 2016, from 9AM to 6PM. &lt;br /&gt;
&lt;br /&gt;
The address is Eli Weisel 2, Rishon LeZiyon. There is plenty of parking available, entrance is via gate 4.&lt;br /&gt;
&lt;br /&gt;
For directions and public transportation options, please see the information at this link: http://www.colman.ac.il/about/roads/Pages/default.aspx&lt;br /&gt;
&lt;br /&gt;
Please use the [https://twitter.com/hashtag/AppSecIL #AppSecIL] hashtag on Twitter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Sponsors = &lt;br /&gt;
&lt;br /&gt;
The AppSec Israel conference is proudly being sponsored by: &lt;br /&gt;
&lt;br /&gt;
{{Template:AppSec_Israel_2016_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Thanks to our generous sponsors, attending the conference was free of charge. However, advance registration is required. &lt;br /&gt;
&lt;br /&gt;
Please register here: https://appsecil2016.eventbrite.com/ .&lt;br /&gt;
&lt;br /&gt;
From there you will also be able to sign up at Sched.org, to view the conference schedule interactively, add sessions to your personal calendar, and other features. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Agenda = &lt;br /&gt;
&lt;br /&gt;
See [[AppSec_Israel_2016_Presentations|detailed list of talks here]], and slidedecks are also available there.   &lt;br /&gt;
Please note that while most of the talks are in English, some will be given in Hebrew. Please check the details of each session to know in which language it will be.  &lt;br /&gt;
&lt;br /&gt;
New this year is a [[AppSec_Israel_2016_CTF|Capture the Flag session]], organized and sponsored by Komodo Consulting: [[AppSec_Israel_2016_CTF|click here for details]].&lt;br /&gt;
&lt;br /&gt;
The [https://appsecil2016.sched.org/ full schedule can be seen and subscribed to here]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Tomer Cohen''', Head of R&amp;amp;D security, Wix.com&lt;br /&gt;
''Bot Extension - Abusing Google Chrome Extensions for Bot Attacks'' &lt;br /&gt;
* '''Amit Ashbel''', Director of Product Marketing &amp;amp; Cyber Security Evangelist, Checkmarx&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; '''Erez Yalon''', Application Security Lead, Checkmarx&lt;br /&gt;
&lt;br /&gt;
''Could a few lines of code &amp;lt;F!#ck&amp;gt; it all up??'' &lt;br /&gt;
* '''Amit Klein''', VP Security Research, SafeBreach&lt;br /&gt;
''Crippling HTTPS with unholy PAC'' &lt;br /&gt;
* '''Martin Knobloch''', Principal Consultant, Nixu&lt;br /&gt;
''Don't Feed the Hippos!'' &lt;br /&gt;
* '''Nadav Avital''', Application Security Research Team Leader, Imperva, and &lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; '''Noam Mazor''', Security Research Engineer, Imperva  &lt;br /&gt;
&lt;br /&gt;
''Hacking HTTP/2 - New attacks on the Internet’s Next Generation Foundation'' &lt;br /&gt;
* '''Erez Metula''', Application Security Expert, AppSec Labs (Founder)&lt;br /&gt;
''Hacking The IoT (Internet of Things) - PenTesting RF Operated Devices'' &lt;br /&gt;
* '''Elena Kravchenko''', ADM BU Security Lead Security &amp;amp; Trust Office, HPE Software, and &lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; '''Efrat Wasserman''', ADM Senior Program manager SRL, HPE Software&lt;br /&gt;
&lt;br /&gt;
''Integrating Security in Agile projects   (real case study)'' &lt;br /&gt;
* '''Tal Melamed''', Technical Leader, AppSec Labs&lt;br /&gt;
''Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing'' &lt;br /&gt;
* '''Eli Greenbaum''', Partner, Yigal Arnon &amp;amp; Co.&lt;br /&gt;
''Law and the Israeli Cybersecurity Industry''&lt;br /&gt;
* '''Liran Tal''', R&amp;amp;D Team Leader, Hewlett Packard Enterprise&lt;br /&gt;
''NodeJS Security Done Right​ - The tips and tricks they won’t teach you in school​ '' &lt;br /&gt;
* '''Tamir Shavro''', Seeker R&amp;amp;D Manager, Synopsys&lt;br /&gt;
''Putting the &amp;quot;I&amp;quot; in Code Review - Turning Code Review Interactive'' &lt;br /&gt;
* '''Ofer Maor''', Director of Security Strategy, Synopsys&lt;br /&gt;
''Signoff or Sign-Out'' &lt;br /&gt;
* '''Or Katz''', Principal Security Researcher, Akamai &lt;br /&gt;
''The Dark Side of Search Engine Optimization'' &lt;br /&gt;
* Dr. '''Nethanel Gelernter''', Cyberpion &amp;amp; The College of Management Academic Studies&lt;br /&gt;
''The Threat of Advanced Cross-Site Search Attacks'' &lt;br /&gt;
* '''Shay Chen''', CEO, Effective Security&lt;br /&gt;
''The Unwanted Sons - Formalizing and Demonstrating WAF Bypass Methods for the REST of the Top 10'' &lt;br /&gt;
* '''Yair Amit''', CTO &amp;amp; Co-founder, Skycure&lt;br /&gt;
''The Ways Hackers Are Taking To Win The Mobile Malware Battle''&lt;br /&gt;
&lt;br /&gt;
= Sponsorships = &lt;br /&gt;
&lt;br /&gt;
Whether you have a product to showcase, offering a service, or you are recruiting, sponsoring the OWASP AppSec Israel event gets you the right exposure. This year we are expecting well over 600 attendees, including security professionals, developers, managers, and more. &lt;br /&gt;
&lt;br /&gt;
Sponsorship also helps support the OWASP community, and ensures that we can keep on making our conferences better and better. Sponsorship fees are intended to cover the costs of the conference. Since the conference is open to all and free of charge to attend, we need your support to enable us to put on a great conference.&lt;br /&gt;
&lt;br /&gt;
We are now offering Silver, Gold and Platinum sponsorship levels. There is also a cost-effective “Community Supporter” option for non-profits, government offices, small startups, and such.   &lt;br /&gt;
For more details on the available sponsorship options please see the [[AppSec_Israel_2016_Sponsorships|Conference Sponsorship page]]. &lt;br /&gt;
&lt;br /&gt;
For more details and to confirm your sponsorship, please contact [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= The people behind the conference  =&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Israel is made by the people who contribute their time and brains to its success. The following people are working to ensure that OWASP AppSec Israel is a success. If you feel that you also can contribute or have interesting ideas regarding the conference, please don't hesitate to contact [mailto:Avi.Douglen@owasp.org AviD] directly. &lt;br /&gt;
&lt;br /&gt;
=== Contributors  ===&lt;br /&gt;
&lt;br /&gt;
* Avi Douglen (Independent)&lt;br /&gt;
* Or Katz (Akamai)&lt;br /&gt;
* Ofer Maor (Synopsys) &lt;br /&gt;
* Erez Metula (AppSec Labs)&lt;br /&gt;
* Hemed Gur Ary (Amdocs)&lt;br /&gt;
* Dr. Yossi Oren (Ben Gurion University)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Israel]] [[Category:AppSec_Israel_2016]] [[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_Presentations&amp;diff=221836</id>
		<title>AppSec Israel 2016 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_Presentations&amp;diff=221836"/>
				<updated>2016-09-27T08:07:48Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: Added presentations&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Full descriptions of all the talks at [[AppSec_Israel_2016|AppSec Israel 2016]] are below, together with each of the speakers' biographies. &lt;br /&gt;
&lt;br /&gt;
The [https://appsecil2016.sched.org/ full schedule can be found and subscribed to here].&lt;br /&gt;
&lt;br /&gt;
Pictures from the event [https://drive.google.com/drive/folders/0B0_K8tApcXxmVzBkcDNFUmt5S0U can be found here].&lt;br /&gt;
&lt;br /&gt;
__TOC__ &lt;br /&gt;
&lt;br /&gt;
The AppSec Israel conference is proudly being sponsored by: &lt;br /&gt;
{{Template:AppSec_Israel_2016_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
== Technical Tracks ==&lt;br /&gt;
&lt;br /&gt;
=== Bot Extension - Abusing Google Chrome Extensions for Bot Attacks ===&lt;br /&gt;
'''תוספי בוט - שימוש בתוספי כרום למטרת התקפות בוטים'''  &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Tomer Cohen, Head of R&amp;amp;D security, Wix.com '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
Chrome extensions have opened a variety of opportunities for users as well as developers, expanding the limits of what we've known as browsing experience. Attacker have also spotted the wide usage of such extensions, and abuse people's trust in Chrome Web Store to distribute malicious extensions. This allows them to run web-based bot attacks straight from victims' browsers, including DDoS campaigns and cross-site requests resulting in impersonation of users in third-party websites.&lt;br /&gt;
&lt;br /&gt;
Furthermore, the detection of such bot attack by a third-party is more complex than in regular distributed attacks, since real humans actually use the Chrome tab abused to attack the victim third-party.&lt;br /&gt;
&lt;br /&gt;
The lecture will include an intro on Chrome Extension architecture followed by techniques to abuse this architecture in order to run bot attacks, as well as distribute a malicious extensions to big crowds of victims.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Worked as a security consultant in several places, one of the founders of Magshimim Cyber Training Program.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Could a few lines of code &amp;lt;F!#ck&amp;gt; it all up?? ===&lt;br /&gt;
''''' Amit Ashbel, Director of Product Marketing &amp;amp; Cyber Security Evangelist, Checkmarx '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Erez Yalon, Application Security Lead, Checkmarx '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_AFewLinesOfCode-JS_AmitAshbel-ErezYalon.pptx|download presentation]])&lt;br /&gt;
&lt;br /&gt;
March 2016. An anonymous open source developer decides to remove his code (left-pad) from a public repository.&lt;br /&gt;
&lt;br /&gt;
Shortly thereafter, several large organizations felt the impact of his actions. Facebook, AirBnB and others experienced errors impacting the functionality of their services. Packages using “left-pad” wouldn’t properly execute.&lt;br /&gt;
&lt;br /&gt;
Today, we embrace both the open source community and the growth of open source projects, modules and packages but... Dependencies and recursive dependencies might become a risk or even a new attack vector which we didn’t foresee. &lt;br /&gt;
&lt;br /&gt;
Could there be other cases of common and popular open source packages depending on open source modules that might not be there tomorrow or, even worse, could they be maliciously modified?&lt;br /&gt;
&lt;br /&gt;
Join us for an insightful session that will reveal our research on this topic where you will learn:&lt;br /&gt;
* Which common open source packages might not be there tomorrow and how this can affect you?&lt;br /&gt;
* How packages you use could be maliciously modified impact on your app Discuss the risks introduced by hybrid application development &lt;br /&gt;
* How intertwined and complex dependencies have become&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Amit has been with the security community for more than a decade where he has taken on multiple tasks and responsibilities, including technical and Senior Product lead positions. Amit adds valuable product knowledge including experience with a wide range of security platforms and familiarity with emerging threats. Amit also speaks at high profile events and conferences such as BlackHat, Defcon, OWASP and others.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Yalon heads the security research group at Checkmarx. With vast defender and attacker experience and as an independent security researcher, he brings invaluable knowledge and skills to the table. Erez is responsible for maintaining Checkmarx’s top notch vulnerability detection technology where his previous development experience with a variety of coding languages comes into play.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Crippling HTTPS with unholy PAC ===&lt;br /&gt;
'''איך להרוס HTTPS עם PAC&amp;quot;ל חבלה''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Amit Klein, VP Security Research, SafeBreach '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
You're in a potentially malicious network (free WiFi, guest network, or maybe your own corporate LAN). You're a security conscious netizen so you restrict yourself to HTTPS (browsing to HSTS sites and/or using a &amp;quot;Force TLS/SSL&amp;quot; browser extension). All your traffic is protected from the first byte. Or is it?&lt;br /&gt;
&lt;br /&gt;
We will demonstrate that, by forcing your browser/system to use a malicious PAC (Proxy AutoConfiguration) resource, it is possible to leak HTTPS URLs. We will explain how this affects the privacy of the user and how credentials/sessions can be stolen. We will present the concept of &amp;quot;PAC Malware&amp;quot; (a malware which is implemented only as JavaScript logic in a PAC resource) that features: a 2-way communication channel between the PAC malware and an external server, contextual phishing via messages, denial-of-service options, and sensitive data extraction from URI's. We present a comprehensive browser PAC feature matrix and elaborate more about this cross-platform (Linux, Windows, Mac) and cross-browser (IE, Chrome, Safari) threat.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Amit Klein is a world renowned information security expert, with 25 years in information security and over 30 published technical papers on this topic. Amit is VP Security Research at SafeBreach, responsible for researching various infiltration, exfiltration and lateral movement attacks. Before SafeBreach, Amit was CTO for Trusteer (acquired by IBM) for 8.5 years. Prior to Trusteer, Amit was chief scientist for Cyota (acquired by RSA) for 2 years, and prior to that, director of Security and Research for Sanctum (acquired by Watchfire, now part of IBM security division) for 7 years. Amit has a B.Sc. from the Hebrew University (magna cum laude, Talpiot program), recognized by InfoWorld as a CTO of the year 2010, and has presented at HITB, RSA, OWASP, CertConf, BlueHat, CyberTech, APWG and AusCERT.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Don't Feed the Hippos! ===&lt;br /&gt;
''''' Martin Knobloch, Principal Consultant, Nixu '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_DontFeedTheHippos_MartinKnobloch.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
The security community is trying to solve insecurity caused by bugs and flaws in software for many years now, but with what success? &lt;br /&gt;
&lt;br /&gt;
We almost never look in successes and failures experiences in other areas, but we could really learn from. This talk is inspired by Ernesto Sirolli’s TED talk “Want to help someone? Shut up and listen!” about failures in the aid program’s around the world. Listening to Ernesto Sirolli, you cannot miss the similarity with the security community trying to tell developers how to write secure code.  This talk points out common failures of the security community when communicating with developers, trying to solve their problems without understanding what their problems really are. &lt;br /&gt;
&lt;br /&gt;
Using the hippo-analogy for security failures, during the talks those ‘(in-)secure hippos’ are identified, advice on how to avoid them are provided, by anecdotes and best practices from the experience of the past 10 years in the security field as a consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Martin is Principal Consultant at Nixu BeNeLux (https://www.nixu.com/en/nixubenelux). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&lt;br /&gt;
&lt;br /&gt;
With his background in Java Development, he understands the complexity of Enterprise software development, Agile Scrum environments and continuous delivery / deployment. &lt;br /&gt;
&lt;br /&gt;
Martin got involved in OWASP in 2006. He became a member of the OWASP Netherland Chapter board in 2007. He has contributed to several OWASP projects and is co-organizer of the OWASP BeNeLux-Day conference since 2008. Martin has been chair of the Global Education Committee from 2008 until the ending of the Global Committees. &lt;br /&gt;
&lt;br /&gt;
Futher, Martin is the conference chair of the OWASP AppSec-Eu/Research 2015 conference in Amsterdam, the Netherlands and involved in the AppSec-Eu 2016 among other activities as CfT Co-Chair. &lt;br /&gt;
&lt;br /&gt;
Martin is a frequent speaker at universities, hacker spaces and various conferences. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; English&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hacking HTTP/2 - New attacks on the Internet’s Next Generation Foundation ===&lt;br /&gt;
''''' Nadav Avital, Application Security Research Team Leader, Imperva '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Noam Mazor, Security Research Engineer, Imperva '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
HTTP/2 is the emerging network protocol for the Internet, facilitating leaner and faster web browsing by introducing several new mechanisms which can be seen as a single transition layer for web traffic. The adoption of HTTP/2 is lightning fast, and even though only a year has passed since its publication, HTTP/2 is already supported by all significant players in the field including browsers, web servers and Content Delivery Networks. &lt;br /&gt;
&lt;br /&gt;
In the presentation we will overview the HTTP/2 attack surface - stream multiplexing, flow control, HPACK compression and server push, with a focus on how the way HTTP/2 servers implement these mechanisms can make or break your security posture. We will continue with presenting new classes of vulnerabilities that have been introduced by the mechanisms used with HTTP/2, and explaining how these vulnerabilities can be used for mounting effective attacks against web servers like Apache, IIS, Ngnix, Jetty and nghttp. We will explain in detail several serious zero-day vulnerabilities, such as CVE-2016-1546, CVE-2016-0150 and CVE-2016-1544, and end with discussing several approaches for mitigating attacks of these types. &lt;br /&gt;
&lt;br /&gt;
Those attending this session will understand that:&lt;br /&gt;
* As an emerging technology that introduces novel and flexible mechanisms, HTTP/2 also induces new risks. &lt;br /&gt;
* HTTP/2 implementations are still not “security mature.” Therefore it is almost certain that scrutiny of HTTP/2 implementations will increase in coming years, resulting in the discovery of new vulnerabilities, exploits and security patches.  With HTTP/2 gaining more popularity, this trend will intensify. &lt;br /&gt;
* An effective security strategy for newly adopted technologies must rely on supplemental solutions rather than patching&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nadav Avital is an expert in Web Application Security. He leads an Imperva team who captures and analyzes hacking activities and then create mitigation strategies. These efforts result in research for new technologies and protocols. Nadav has more than 10 years industry experience in coding and creating security tools. He holds B.Sc. in Computer Science.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Noam Mazor worked in Imperva as security research engineer in the Web Application Security team. Noam has experience in analyzing hacking activities, creating mitigation and researching vulnerabilities. He holds BSc in Computer Science and is currently a MSc student in Tel Aviv University.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hacking The IoT (Internet of Things) - PenTesting RF Operated Devices ===&lt;br /&gt;
'''האקינג של מערכות IoT מבוססות RF''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Erez Metula, Application Security Expert, AppSec Labs (Founder) '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_HackingTheIoT-PenTestingRFDevices_ErezMetula.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
We often encounter IoT (Internet of Things) systems during our work as penetration testers and security consultants. We know how to assess the security of the server side API, the associated mobile apps, the web apps and so on - but what about the device itself (the &amp;quot;thing&amp;quot;)? Moreover, what happens if the device is not using traditional HTTP/S request, or does not even &amp;quot;speak&amp;quot; plain old TCP/IP?&lt;br /&gt;
&lt;br /&gt;
During this talk, we'll go over the obstacles we have to face when analyzing unknown, custom RF based communication that drives the target IoT system we're pentesting. We'll talk about and see in action tools that will allow us to capture RF traffic, analyze it, brute force it, replay it, and of course forge it. It's like plain old appsec hacking tricks, but at the RF level. So let's hack some physical things belonging to the real world!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula is the founder and Chairman of AppSec Labs, a leading company in the field of application security.&lt;br /&gt;
&lt;br /&gt;
He is the author of the book &amp;quot;Managed Code Rootkits&amp;quot;, and is a world renowned application security expert.&lt;br /&gt;
&lt;br /&gt;
Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. Erez had helped companies from all sizes, from startups to Fortune 500 organizations. &lt;br /&gt;
&lt;br /&gt;
Erez focuses on advanced application security topics and has performed extensive ground breaking research on mobile application security. &lt;br /&gt;
&lt;br /&gt;
Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Integrating Security in Agile projects   (real case study) ===&lt;br /&gt;
''''' Elena Kravchenko, ADM BU Security Lead, Security &amp;amp; Trust Office, HPE Software '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Efrat Wasserman, ADM Senior Program manager, SRL, HPE Software ''''' &amp;lt;br/&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_IntegratingSecurityInAgile_ElenaKravchenko-EfratWasserman.pptx|download presentation]])&lt;br /&gt;
&lt;br /&gt;
There are many different security development lifecycles (SDLC) frameworks in the modern world. However, a fully implemented SDLC program is often represented as heavy, time-consuming and not suitable to Agile development methodology. We’d like to break the myth and show how a very comprehensive security program, managed by a dedicated security office, can be successfully integrated in agile development project on a real case example.  &lt;br /&gt;
&lt;br /&gt;
We’ll shortly describe the main challenges, and the techniques and procedures helping to overcome the challenges. We’ll present the Security Lifecycle Management (SLM) Framework developed and used in HPE SW in the last three years, and describe how it integrated into development of new SaaS based fully agile developed product, with emphasis on main activities and roles. As a part of the presentation we would like to highlight the importance of the proper program management and role of the PMO and how it became a key success factor in the effective security program implementation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Elena has a MSc in Applied Mathematics from Leningrad State University, and over 25 years of software engineering experience in different roles, including Software Design Engineer, Technical Lead, Customer Oriented Development Engineer, and Software System Architect.&lt;br /&gt;
&lt;br /&gt;
Currently a part of HPE Software ITOM and ADM Security and Trust Office  as the Security Lead for HPE’s Application Delivery Management (ADM) Business Unit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Efrat has earned a BSc in Computer Science and Mathematics, and a MBA in Business Management and Marketing. She has over 17 years in Software Development, and 9 years as a Program manager.  &lt;br /&gt;
&lt;br /&gt;
Currently Senior Program Manager in HPE SW responsible for lifecycle of SaaS product&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Law and the Israeli Cybersecurity Industry ===&lt;br /&gt;
''''' Eli Greenbaum, Partner, Yigal Arnon &amp;amp; Co. '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
From an international perspective, Israel provides a unique laboratory for studying the effect of law and regulation on cybersecurity research and development. This presentation will provide an introduction to specific laws and regulations concerning cybersecurity research and ask whether these laws have in actual practice influenced the growth of the cybersecurity ecosystem in Israel. More specifically, how have industry players, including startups, multinationals and the military, reacted to the unique legal framework that Israel provides for cybersecurity activities?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Eli Greenbaum is partner in the law firm of Yigal Arnon &amp;amp; Co., specializing in technology, intellectual property and cybersecurity. He received his Masters degree in Applied Physics from Columbia University and his law degree from Yale Law School. Eli has published widely in the intersection between technology and the law, including in the Harvard Journal of Law and Technology and the Cardozo Law Review. Eli clerked from Justice Miriam Naor of the Supreme Court of Israel and Judge David Cheshin of the District Court of Jerusalem.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; English&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing ===&lt;br /&gt;
''''' Tal Melamed, Technical Leader, AppSec Labs '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_JavaHurdling_TalMelamed.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Testing Java client applications is not always straightforward as testing web applications. Even under experienced hands, there might be obstacles coming your way; what if you cannot use a proxy? How do you MitM? What if you just can't? How do you modify the app to your benefit?&lt;br /&gt;
&lt;br /&gt;
Fortunately, Java is still Java. This lecture is based on a true story, and will follow an interesting case of pen-testing a known product; what tools and techniques can be used in order to jump over hurdles, all the way to the finish line.&lt;br /&gt;
&lt;br /&gt;
The lecture aims to enrich the pentester's toolbox as well as mind, when facing Java client applications; MitM-ing, run-time manipulations and patching the code are only some of the discussed cases.&lt;br /&gt;
&lt;br /&gt;
In addition, a newly developed proxy for intercepting and tampering with TCP communication over TLS/SSL and bypassing certificate-pinning protections, will be introduced during the lecture.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Tal is an Application Security Expert. As AppSec Labs' Technical Leader, he is leading a variety of security projects for Android, iOS, WP, Web and Client applications.&lt;br /&gt;
&lt;br /&gt;
Prior to working at AppSec Labs, Tal has worked at Amdocs, CheckPoint and RSA, having more than a decade of experience in the Information Security field.&lt;br /&gt;
&lt;br /&gt;
Tal is a lead Trainer, a neat developer, and a security dreamer; breaking, building, defending &amp;amp; training since '99.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== NodeJS Security Done Right​ - The tips and tricks they won’t teach you in school​  ===&lt;br /&gt;
''''' Liran Tal, R&amp;amp;D Team Leader, Hewlett Packard Enterprise '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
NodeJS, and JavaScript at large are quickly taking over software whether it is GitHub’s statistics for projects growth, the IoT industry, ChatOps projects written in JavaScript and Enterprises adoption is growing as well.&lt;br /&gt;
&lt;br /&gt;
With this trend, it is imperative to review OWASP security practices and learn how to harden NodeJS Web Applications.​&lt;br /&gt;
​&lt;br /&gt;
We will begin with a quick NodeJS intro and a few fail stories of how things can go wrong. ​&lt;br /&gt;
&lt;br /&gt;
We will quickly dive into hands-on practical implementation of security measures to adopt in your current or future NodeJS project. Next I will show how to leverage widely adopted security tools for integration in the build and CI/CD process to audit and test for security vulnerabilities, as well as leveraging successful enterprise-level open source npm libraries to enhance your web application’s security.​&lt;br /&gt;
​&lt;br /&gt;
In summary: in this session I will demonstrate:​&lt;br /&gt;
* Securing ExpressJS by adopting mature and commonly used npm libraries​&lt;br /&gt;
* Secure code guidelines for JavaScript software developers​&lt;br /&gt;
* Integrating NodeJS security measures as part of your build CI/CD DevOps process​&lt;br /&gt;
​&lt;br /&gt;
To empower others and make a lasting impression for Open Source awareness and Security involvement: In the closing minutes of this presentation I will ask a volunteer from the audience to commit a Pull-Request that enhances security for a NodeJS project on GitHub.​&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Liran is a top contributor to the open source MEAN.io, and core team member of the MEAN.js full stack JavaScript framework. He is also an author of several Node.js npm packages, as well as actively contributing to many open source projects on GitHub. Being an avid supporter and contributor to the open source movement, in 2007 he has redefined network RADIUS management by establishing daloRADIUS, a world-recognized and industry-leading open source project (http://www.daloradius.com).&lt;br /&gt;
 &lt;br /&gt;
Liran is currently leading the R&amp;amp;D Engineering team for Hewlett Packard Enterprise content Marketplace, built on a microservices architecture for a combined technology stack of Java, NodeJS, AngularJS, MongoDB and MySQL. He loves mentoring and empowering team members, drive for better code methodology, and seek out innovative solutions to support business strategies.&lt;br /&gt;
 &lt;br /&gt;
He enjoys spending his time with his beloved wife Tal, and his son Ori. Amongst other things, his hobbies include playing the guitar, hacking all things Linux and continuously experimenting and contributing to open source projects.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Putting the &amp;quot;I&amp;quot; in Code Review - Turning Code Review Interactive ===&lt;br /&gt;
''''' Tamir Shavro, Seeker R&amp;amp;D Manager, Synopsys '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_InteractiveCodeReview_TamirShavro.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Everybody knows that manual code review can be a tedious and lengthy effort, with complexity growing exponentially with the size of the code. However, understanding code flow and focusing on relevant parts can become much easier when employing interactive debugging techniques. This allows combining the best of penetration testing and code review benefits to achieve maximum results in the most efficient manner. In this talk we will explain and demonstrate this eye-opening technique for effectively performing a manual code review on a live system using a debugger and provide a quick starter kit for implementing this technique.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Tamir Shavro has been involved both in complex R&amp;amp;D endeavors and in the security field in the past 18 years. As the Chief Architect &amp;amp; VP RnD of Seeker (acquired by Synopsys in 2015), Tamir has been the driving force behind the development of the Seeker technology. &lt;br /&gt;
&lt;br /&gt;
Prior to Seeker he worked as a Senior Security Consultant in Hacktics, where he was involved in advance application security projects. He was previously a Captain in the IDF Intelligence Corps, involved in various development leadership and architecture roles. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Signoff or Sign-Out ===&lt;br /&gt;
''''' Ofer Maor, Director of Security Strategy, Synopsys '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
Software Signoff is an inevitable step in maturing our software development processes in order to deliver better and safer software. Like with other engineering disciplines before, the growing concerns for safety, security and standards is driving the industry to do better. In this talk we will explain what Software Signoff means and why organizations must adopt it before it is too late.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Ofer Maor is a security expert and entrepreneur with over 20 years of experience in information and application security. Ofer has been involved in application security from its early days, through research, penetration testing, consulting, and product development.  As the founder and CTO of Seeker, Ofer pioneered IAST, the next generation of application security testing technology, currently used by some of the largest organizations in the world to continuously improve their software security. Ofer joined Synopsys when it acquired Seeker in July 2015. Prior to Seeker, Ofer was the Founder and CTO of Hacktics. He led Imperva's Application Defense Center research group and has also served as the Chairman of OWASP Israel and in the OWASP Global Membership Committee.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Dark Side of Search Engine Optimization ===&lt;br /&gt;
'''הצד האפל של קידום אתרים במנועי חיפוש''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai  '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
Search engines optimization (SEO) is a technique being used by web sites owners in order to improve visibility and traffic to their web site. Legitimate SEO activity will use optimization techniques such as: changing structure and textual usage of the web site pages, publication in social media and web forums that will referrer relevant users.&lt;br /&gt;
&lt;br /&gt;
The ultimate goal of SEO campaign is to promote web site ranking in the leading search engines, having the promoted web site returned in the primary result page once searching for relevant terms and keywords. &lt;br /&gt;
&lt;br /&gt;
In the presentation I’m going to present what happens when threat actors get into the world of SEO campaigns abuse SEO optimization techniques and moreover, use all kind of attack techniques such as SQL injection and open redirects in order to manipulate search engines ranking.&lt;br /&gt;
&lt;br /&gt;
I will also evaluate some of the SEO attacks and the manipulating techniques, try to determine who are the victims in this story, check if these attacks achieved their goal and supply more interesting insights on the world of “Blackhat SEO”.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or is an application security veteran, with years of experience at industry leading vendors, currently serves as principal security researcher for Akamai's Cloud Security Intelligence platform. Or is a frequent speaker in conferences such as RSA, AppSec and CSA. Or has published several innovative articles and white papers on web applications threat intelligence and defensive techniques.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Threat of Advanced Cross-Site Search Attacks ===&lt;br /&gt;
'''האיום של התקפות Cross-Site Search מתקדמות''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Dr. Nethanel Gelernter, Cyberpion &amp;amp; The College of Management Academic Studies '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
Cross-site search (XS-search) is a practical timing side-channel attack that allows the extraction of sensitive information from web-services. The attack exploits inflation techniques to efficiently distinguish between search requests that yield results and requests that do not. This work focuses on the response inflation technique that increases the size of the response; as the difference in the sizes of the responses increases, it becomes easier to distinguish between them. We begin with browser-based XS-search attack and demonstrate its use in extracting users' private data from Gmail and Facebook. The browser-based XS-search attack exploits the differences in the sizes of HTTP responses, and works even when significant inflation of the response is impossible. This part also involves algorithmic improvements compared to previous work. When there is no leakage of information via the timing side channel it is possible to use second-order (SO) XS-search, a novel type of attack that allows the attacker to significantly increase the difference in the sizes of the responses by planting maliciously crafted record into the storage. SO XS-search attacks can be used to extract sensitive information such as email content of Gmail and Yahoo! users, and search history of Bing users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nethanel Gelernter received a PhD in Computer Science from Bar-Ilan University (Israel). His research mainly focuses on web application security, and in particular in exploring new attack vectors and threats in the web. Currently, he is leading the cyber security research and studies in the College of Management Academic Studies in Israel. Beyond the academic world, Nethanel provides consulting services, and he recently founded Cyberpion, a company that investigates unknown attack vectors and develops countermeasures against them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Unwanted Sons - Formalizing and Demonstrating WAF Bypass Methods for the REST of the Top 10 ===&lt;br /&gt;
'''צאצאים לא רצויים - פירמול לטכניקות חדשות למעקף WAF לשאר ההתקפות הנפוצות של OWASP TOP 10''' &amp;lt;br /&amp;gt;&lt;br /&gt;
''''' Shay Chen, CEO, Effective Security '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
The once uncommon application-level protection mechanisms are EVERYWHERE these days, and sooner or later, you'll have to face them.&lt;br /&gt;
&lt;br /&gt;
Web Application Firewalls (WAF) and Intrusion Detection Systems (IDS), Filters and RASP Modules, all common and widespread countermeasures you have to face on a regular basis, with the power to turn a typical assessment into a nightmare, and make automated tools practically useless.&lt;br /&gt;
&lt;br /&gt;
While the attack vectors are well covered in CWE, CAPEC, TECAPI RvR, WASC, OWASP Top 10 and Testing Guide, all you have to cover evasion techniques is a couple of cheat sheets focused on a limited set of attacks.&lt;br /&gt;
&lt;br /&gt;
Sure, there are numerous XSS and SQL Injection evasion cheat sheets, but what about Path Traversal, Remote File Inclusion, OS Command Injection? What about Forced Browsing? What about other attacks?&lt;br /&gt;
&lt;br /&gt;
Formalizing evasion techniques and methods for the REST of the common attack vectors makes a LOT of sense, for manual pen-testing and automated tools - and THIS is phase one, aimed to cover the rest of the unattended top 10.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CEO of Effective Security, an information-security boutique company specializing in information security assessments and in automating security processes of vulnerability management and SDLC. &lt;br /&gt;
&lt;br /&gt;
He has over twelve years in information technology and security, a strong background in software development, and a stream of previously published vulnerabilities, attack vectors, benchmarks and hacking methodologies. &lt;br /&gt;
&lt;br /&gt;
Shay is an experienced speaker, and regularly instructs a wide variety of security related courses in Conferences and Enterprises. Before moving into the information security field, he was involved in various software development projects in ERP, mobile &amp;amp; enterprise environments.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The Ways Hackers Are Taking To Win The Mobile Malware Battle ===&lt;br /&gt;
''''' Yair Amit, CTO &amp;amp; Co-founder, Skycure '''''    &amp;lt;br /&amp;gt;&lt;br /&gt;
([[Media:AppSecIL2016_WhyHackersAreWinningMobileMalwareBattle-YairAmit.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
In the proverbial game of cat-and-mouse between endpoint security vendors and malware writers, malware attacks have recently grown more sophisticated. More enterprises are losing ground to hackers, who are able to outmaneuver static and runtime solutions by constantly changing their attack strategies. The team that uncovered iOS malicious profiles, WiFiGate, HTTP Request Hijacking, No iOS Zone and Invisible Profiles are taking it upon themselves to coach developers and organizations on how to regain control, and turn the tables on the hackers behind next-generation mobile malware. &lt;br /&gt;
&lt;br /&gt;
In his presentation, Yair will discuss cutting-edge techniques used by malware writers to circumvent mobile security paradigms such as app-sandboxing and containers. Mr. Amit will then break down the current set of techniques (signatures, static analysis &amp;amp; dynamic analysis) used to identify malware on mobile devices, and identify the pros and cons of these approaches. He will also explain why attackers constantly succeed in fooling these technologies, and explore the problem of false positive/false negative tradeoffs in such solutions. &lt;br /&gt;
&lt;br /&gt;
During a live, interactive demo, Yair will create a mobile malware on stage, meant to be undetected by static and runtime analysis technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yair Amit is co-founder and CTO at Skycure, leading the company’s research and vision and overseeing its R&amp;amp;D center. Yair has been active in the security industry for more than a decade with his research regularly covered by media outlets and presented in security conferences around the world. Prior to co-founding Skycure, Yair managed the Application Security and Research Group at IBM, joining through the acquisition of Watchfire. At IBM, Yair led the research and implementation of IBM’s next-generation application security technology. Yair holds a BSc, summa cum laude, from Tel Aviv University in bioinformatics.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;u&amp;gt;Language:&amp;lt;/u&amp;gt; Hebrew&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecIL2016_DontFeedTheHippos_MartinKnobloch.pdf&amp;diff=221835</id>
		<title>File:AppSecIL2016 DontFeedTheHippos MartinKnobloch.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecIL2016_DontFeedTheHippos_MartinKnobloch.pdf&amp;diff=221835"/>
				<updated>2016-09-27T08:07:11Z</updated>
		
		<summary type="html">&lt;p&gt;Avi Douglen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Avi Douglen</name></author>	</entry>

	</feed>