<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bil+Corry</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bil+Corry"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Bil_Corry"/>
		<updated>2026-05-19T16:33:39Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Nashua&amp;diff=256292</id>
		<title>Nashua</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Nashua&amp;diff=256292"/>
				<updated>2019-12-10T18:45:57Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Nashua|extra=The chapter leader is [mailto:bil.corry@owasp.org Bil Corry]&lt;br /&gt;
|meetupurl=https://www.meetup.com/OWASP-Nashua-Chapter/|region=United States}}&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings ==&lt;br /&gt;
&lt;br /&gt;
For meeting details and to RSVP, please visit [https://www.meetup.com/OWASP-Nashua-Chapter/events/264402560/ Meetup].&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:New Hampshire]]&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Nashua&amp;diff=254340</id>
		<title>Nashua</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Nashua&amp;diff=254340"/>
				<updated>2019-08-29T16:18:52Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Added next meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Nashua|extra=The chapter leader is [mailto:bil.corry@owasp.org Bil Corry]&lt;br /&gt;
|meetupurl=https://www.meetup.com/OWASP-Nashua-Chapter/|region=United States}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
'''Next meeting is September 23 at 6pm.'''  For details and to RSVP, please visit [https://www.meetup.com/OWASP-Nashua-Chapter/events/264402560/ Meetup].&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:New Hampshire]]&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bil_Corry_2019_Elect_Me&amp;diff=254245</id>
		<title>Bil Corry 2019 Elect Me</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bil_Corry_2019_Elect_Me&amp;diff=254245"/>
				<updated>2019-08-27T18:42:45Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: /* Interview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Bil Corry=&lt;br /&gt;
&lt;br /&gt;
== 2019 Election for Board of Directors, OWASP ==&lt;br /&gt;
[[File:Bil Corry 1.jpg|alt=Bil Corry speaking at AppSec USA 2017 Leaders Meeting|left|thumb|Bil Corry speaking at AppSec USA 2017 Leaders Meeting]]&lt;br /&gt;
&lt;br /&gt;
=== Bio ===&lt;br /&gt;
&lt;br /&gt;
I am a lifetime member of OWASP and I've been involved with OWASP since 2008. I am currently serving on the OWASP Compliance Committee and am the Chapter Leader of the Nashua Chapter, and have contributed to a variety of projects over the years (anyone remember the OWASP Certification project?). I've volunteered at AppSec USA, rounded up speakers for chapter meetings in Chicago and the Bay Area, hosted a Bay Area chapter meeting, helped WIA become a 2.0 Committee and have been a trainer using the OWASP Secure Coding deck.&lt;br /&gt;
&lt;br /&gt;
I have contributed to the technology that underpins the “World Wide Web”, namely HTTP (RFC 7230) [https://tools.ietf.org/html/rfc7230#section-10], HTTP Cookies (RFC 6265) [https://tools.ietf.org/html/rfc6265#appendix-A], TLS (RFC 6125) [https://tools.ietf.org/html/rfc6125#section-9], and the HTML specification [https://html.spec.whatwg.org/multipage/acknowledgements.html#acknowledgements].  If you have ever used a web browser to visit a website, then you have personally benefited from my efforts.  Additionally, I’ve contributed to securing the web, including my participation in OWASP and WASC [http://projects.webappsec.org/w/page/13246968/Threat%20Classification%20Authors], and contributed to the design of various browser security and privacy controls (Content Security Policy, secure cookies, secure logoff, clickjacking protection, and more) [https://pdfs.semanticscholar.org/71bb/616fd09203eb32a621d95e70e6c2885da1c3.pdf] [https://pomcor.com/whitepapers/file_sharing_security.pdf] [http://websec.github.io/unicode-security-guide/] [https://www.w3.org/2011/track-privacy/papers/Paypal.pdf].&lt;br /&gt;
&lt;br /&gt;
Beyond my contributions to the web, I’ve also served on the W3C Tracking Protection Working Group [https://www.w3.org/2012/dnt-ws/], which produced the specification for the Do Not Track web header, and the European Payments Council’s Payment Security Support Group, a trade group primarily focused on payment security and payment authorization in the European market. &lt;br /&gt;
&lt;br /&gt;
In my professional capacity, I spent over a decade working at a web developer before switching to information security.  As a security professional, I’ve worked for the largest FinTech company in the world, PayPal, in both North America and Europe, and I’ve worked at the largest mobile chip design company in the world, Arm.  At PayPal, I was responsible for application security across all product lines and subsidiaries worldwide, and for a time, I was the Information Technology Officer of the Bank, a statutory position within PayPal’s licensed banking unit based in Luxembourg.  At Arm, I was responsible for the end-to-end security strategy for their connected devices products (aka IoT, internet of things) and reported two levels down from the CEO.  Many people are unfamiliar with the Arm brand, however anyone using a mobile device has used an Arm product as nearly every mobile device on the planet has an Arm processor, including every Apple and Android phone and tablet.&lt;br /&gt;
&lt;br /&gt;
Currently I work at a healthcare startup, Blink Health, in the role of Security Assurance, which includes application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Interview ===&lt;br /&gt;
[https://youtu.be/hk7S1M-RKU4 Bil Corry Video Interview]&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bil_Corry_2019_Elect_Me&amp;diff=254222</id>
		<title>Bil Corry 2019 Elect Me</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bil_Corry_2019_Elect_Me&amp;diff=254222"/>
				<updated>2019-08-26T23:05:52Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Tweaks&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Bil Corry=&lt;br /&gt;
&lt;br /&gt;
== 2019 Election for Board of Directors, OWASP ==&lt;br /&gt;
[[File:Bil Corry 1.jpg|alt=Bil Corry speaking at AppSec USA 2017 Leaders Meeting|left|thumb|Bil Corry speaking at AppSec USA 2017 Leaders Meeting]]&lt;br /&gt;
&lt;br /&gt;
=== Bio ===&lt;br /&gt;
&lt;br /&gt;
I am a lifetime member of OWASP and I've been involved with OWASP since 2008. I am currently serving on the OWASP Compliance Committee and am the Chapter Leader of the Nashua Chapter, and have contributed to a variety of projects over the years (anyone remember the OWASP Certification project?). I've volunteered at AppSec USA, rounded up speakers for chapter meetings in Chicago and the Bay Area, hosted a Bay Area chapter meeting, helped WIA become a 2.0 Committee and have been a trainer using the OWASP Secure Coding deck.&lt;br /&gt;
&lt;br /&gt;
I have contributed to the technology that underpins the “World Wide Web”, namely HTTP (RFC 7230) [https://tools.ietf.org/html/rfc7230#section-10], HTTP Cookies (RFC 6265) [https://tools.ietf.org/html/rfc6265#appendix-A], TLS (RFC 6125) [https://tools.ietf.org/html/rfc6125#section-9], and the HTML specification [https://html.spec.whatwg.org/multipage/acknowledgements.html#acknowledgements].  If you have ever used a web browser to visit a website, then you have personally benefited from my efforts.  Additionally, I’ve contributed to securing the web, including my participation in OWASP and WASC [http://projects.webappsec.org/w/page/13246968/Threat%20Classification%20Authors], and contributed to the design of various browser security and privacy controls (Content Security Policy, secure cookies, secure logoff, clickjacking protection, and more) [https://pdfs.semanticscholar.org/71bb/616fd09203eb32a621d95e70e6c2885da1c3.pdf] [https://pomcor.com/whitepapers/file_sharing_security.pdf] [http://websec.github.io/unicode-security-guide/] [https://www.w3.org/2011/track-privacy/papers/Paypal.pdf].&lt;br /&gt;
&lt;br /&gt;
Beyond my contributions to the web, I’ve also served on the W3C Tracking Protection Working Group [https://www.w3.org/2012/dnt-ws/], which produced the specification for the Do Not Track web header, and the European Payments Council’s Payment Security Support Group, a trade group primarily focused on payment security and payment authorization in the European market. &lt;br /&gt;
&lt;br /&gt;
In my professional capacity, I spent over a decade working at a web developer before switching to information security.  As a security professional, I’ve worked for the largest FinTech company in the world, PayPal, in both North America and Europe, and I’ve worked at the largest mobile chip design company in the world, Arm.  At PayPal, I was responsible for application security across all product lines and subsidiaries worldwide, and for a time, I was the Information Technology Officer of the Bank, a statutory position within PayPal’s licensed banking unit based in Luxembourg.  At Arm, I was responsible for the end-to-end security strategy for their connected devices products (aka IoT, internet of things) and reported two levels down from the CEO.  Many people are unfamiliar with the Arm brand, however anyone using a mobile device has used an Arm product as nearly every mobile device on the planet has an Arm processor, including every Apple and Android phone and tablet.&lt;br /&gt;
&lt;br /&gt;
Currently I work at a healthcare startup, Blink Health, in the role of Security Assurance, which includes application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Interview ===&lt;br /&gt;
(interview will go here)&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Bil_Corry_1.jpg&amp;diff=254221</id>
		<title>File:Bil Corry 1.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Bil_Corry_1.jpg&amp;diff=254221"/>
				<updated>2019-08-26T22:42:46Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Bil Corry speaking at AppSec USA 2017 Leaders Meeting&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bil_Corry_2019_Elect_Me&amp;diff=254220</id>
		<title>Bil Corry 2019 Elect Me</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bil_Corry_2019_Elect_Me&amp;diff=254220"/>
				<updated>2019-08-26T22:41:23Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Bil Corry=&lt;br /&gt;
&lt;br /&gt;
== 2019 Election for Board of Directors, OWASP ==&lt;br /&gt;
&lt;br /&gt;
=== Bio ===&lt;br /&gt;
&lt;br /&gt;
I am a lifetime member of OWASP and I've been involved with OWASP since 2008. I am currently serving on the OWASP Compliance Committee and am the Chapter Leader of the Nashua Chapter, and have contributed to a variety of projects over the years (anyone remember the OWASP Certification project?). I've volunteered at AppSec USA, rounded up speakers for chapter meetings in Chicago and the Bay Area, hosted a Bay Area chapter meeting, helped WIA become a 2.0 Committee and have been a trainer using the OWASP Secure Coding deck.&lt;br /&gt;
&lt;br /&gt;
I have contributed to the technology that underpins the “World Wide Web”, namely HTTP (RFC 7230) [https://tools.ietf.org/html/rfc7230#section-10], HTTP Cookies (RFC 6265) [https://tools.ietf.org/html/rfc6265#appendix-A], TLS (RFC 6125) [https://tools.ietf.org/html/rfc6125#section-9], and the HTML specification [https://html.spec.whatwg.org/multipage/acknowledgements.html#acknowledgements].  If you have ever used a web browser to visit a website, then you have personally benefited from my efforts.  Additionally, I’ve contributed to securing the web, including my participation in OWASP and WASC [http://projects.webappsec.org/w/page/13246968/Threat%20Classification%20Authors], and contributed to the design of various browser security and privacy controls (Content Security Policy, secure cookies, secure logoff, clickjacking protection, and more) [https://pdfs.semanticscholar.org/71bb/616fd09203eb32a621d95e70e6c2885da1c3.pdf] [https://pomcor.com/whitepapers/file_sharing_security.pdf] [http://websec.github.io/unicode-security-guide/] [https://www.w3.org/2011/track-privacy/papers/Paypal.pdf].&lt;br /&gt;
&lt;br /&gt;
Beyond my contributions to the web, I’ve also served on the W3C Tracking Protection Working Group [https://www.w3.org/2012/dnt-ws/], which produced the specification for the Do Not Track web header, and the European Payments Council’s Payment Security Support Group, a trade group primarily focused on payment security and payment authorization in the European market. &lt;br /&gt;
&lt;br /&gt;
In my professional capacity, I spent over a decade working at a web developer before switching to information security.  As a security professional, I’ve worked for the largest FinTech company in the world, PayPal, in both North America and Europe, and I’ve worked at the largest mobile chip design company in the world, Arm.  At PayPal, I was responsible for application security across all product lines and subsidiaries worldwide, and for a time, I was the Information Technology Officer of the Bank, a statutory position within PayPal’s licensed banking unit based in Luxembourg.  At Arm, I was responsible for the end-to-end security strategy for their connected devices products (aka IoT, internet of things) and reported two levels down from the CEO.  Many people are unfamiliar with the Arm brand, however anyone using a mobile device has used an Arm product as nearly every mobile device on the planet has an Arm processor, including every Apple and Android phone and tablet.&lt;br /&gt;
&lt;br /&gt;
Currently I work at a healthcare startup, Blink Health, in the role of Security Assurance, which includes application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Why Me? ===&lt;br /&gt;
I've run for the Board of Directors every year since 2013 - this will be my seventh time running for a seat on the Board and yes, I'm very passionate about OWASP.  I run each year because I've noticed that as OWASP has grown larger, it hasn't been growing more mature, and those growing pains show up in a myriad of ways, including an exodus of staff, unhappy members, and lack of visibility.&lt;br /&gt;
&lt;br /&gt;
If elected, I would work toward helping OWASP grow and mature into a more professional organization.  Please join me in moving OWASP forward by casting your vote for Bil Corry.&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bil_Corry_2019_Elect_Me&amp;diff=254219</id>
		<title>Bil Corry 2019 Elect Me</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bil_Corry_2019_Elect_Me&amp;diff=254219"/>
				<updated>2019-08-26T22:31:54Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Tweaks&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Bio ===&lt;br /&gt;
I am a lifetime member of OWASP and I've been involved with OWASP since 2008. I am currently serving on the OWASP Compliance Committee and am the Chapter Leader of the Nashua Chapter, and have contributed to a variety of projects over the years (anyone remember the OWASP Certification project?). I've volunteered at AppSec USA, rounded up speakers for chapter meetings in Chicago and the Bay Area, hosted a Bay Area chapter meeting, helped WIA become a 2.0 Committee and have been a trainer using the OWASP Secure Coding deck.&lt;br /&gt;
&lt;br /&gt;
I have contributed to the technology that underpins the “World Wide Web”, namely HTTP (RFC 7230) [https://tools.ietf.org/html/rfc7230#section-10], HTTP Cookies (RFC 6265) [https://tools.ietf.org/html/rfc6265#appendix-A], TLS (RFC 6125) [https://tools.ietf.org/html/rfc6125#section-9], and the HTML specification [https://html.spec.whatwg.org/multipage/acknowledgements.html#acknowledgements].  If you have ever used a web browser to visit a website, then you have personally benefited from my efforts.  Additionally, I’ve contributed to securing the web, including my participation in OWASP and WASC [http://projects.webappsec.org/w/page/13246968/Threat%20Classification%20Authors], and contributed to the design of various browser security and privacy controls (Content Security Policy, secure cookies, secure logoff, clickjacking protection, and more) [https://pdfs.semanticscholar.org/71bb/616fd09203eb32a621d95e70e6c2885da1c3.pdf] [https://pomcor.com/whitepapers/file_sharing_security.pdf] [http://websec.github.io/unicode-security-guide/] [https://www.w3.org/2011/track-privacy/papers/Paypal.pdf].&lt;br /&gt;
&lt;br /&gt;
Beyond my contributions to the web, I’ve also served on the W3C Tracking Protection Working Group [https://www.w3.org/2012/dnt-ws/], which produced the specification for the Do Not Track web header, and the European Payments Council’s Payment Security Support Group, a trade group primarily focused on payment security and payment authorization in the European market. &lt;br /&gt;
&lt;br /&gt;
In my professional capacity, I spent over a decade working at a web developer before switching to information security.  As a security professional, I’ve worked for the largest FinTech company in the world, PayPal, in both North America and Europe, and I’ve worked at the largest mobile chip design company in the world, Arm.  At PayPal, I was responsible for application security across all product lines and subsidiaries worldwide, and for a time, I was the Information Technology Officer of the Bank, a statutory position within PayPal’s licensed banking unit based in Luxembourg.  At Arm, I was responsible for the end-to-end security strategy for their connected devices products (aka IoT, internet of things) and reported two levels down from the CEO.  Many people are unfamiliar with the Arm brand, however anyone using a mobile device has used an Arm product as nearly every mobile device on the planet has an Arm processor, including every Apple and Android phone and tablet.&lt;br /&gt;
&lt;br /&gt;
Currently I work at a healthcare startup, Blink Health, in the role of Security Assurance, which includes application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Why Me? ===&lt;br /&gt;
I've run for the Board of Directors every year since 2013 - this will be my seventh time running for a seat on the Board and yes, I'm very passionate about OWASP.  I run each year because I've noticed that as OWASP has grown larger, it hasn't been growing more mature, and those growing pains show up in a myriad of ways, including an exodus of staff, unhappy members, and lack of visibility.&lt;br /&gt;
&lt;br /&gt;
If elected, I would work toward helping OWASP grow and mature into a more professional organization.  Please join me in moving OWASP forward by casting your vote for Bil Corry.&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bil_Corry_2019_Elect_Me&amp;diff=254218</id>
		<title>Bil Corry 2019 Elect Me</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bil_Corry_2019_Elect_Me&amp;diff=254218"/>
				<updated>2019-08-26T22:19:22Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Bio ===&lt;br /&gt;
I am a lifetime member of OWASP and I've been involved with OWASP since 2008. I am currently serving on the OWASP Compliance Committee and am the Chapter Leader of the Nashua Chapter, and have contributed to a variety of projects over the years (anyone remember the OWASP Certification project?). I've volunteered at AppSec USA, rounded up speakers for chapter meetings in Chicago and the Bay Area, hosted a Bay Area chapter meeting, helped WIA become a 2.0 Committee and have been a trainer using the OWASP Secure Coding deck.&lt;br /&gt;
&lt;br /&gt;
I have contributed to the technology that underpins the “World Wide Web”, namely HTTP (RFC 7230)&amp;lt;!-- https://tools.ietf.org/html/rfc7230#section-10 --&amp;gt;, HTTP Cookies (RFC 6265)&amp;lt;!--  https://tools.ietf.org/html/rfc6265#appendix-A --&amp;gt;, TLS (RFC 6125)&amp;lt;!--  https://tools.ietf.org/html/rfc6125#section-9 --&amp;gt;, and the HTML specification&amp;lt;!-- https://html.spec.whatwg.org/multipage/acknowledgements.html#acknowledgements --&amp;gt;.  If you have ever used a web browser to visit a website, then you have personally benefited from my efforts.  Additionally, I’ve contributed to securing the web, including my participation in OWASP and WASC&amp;lt;!-- http://projects.webappsec.org/w/page/13246968/Threat%20Classification%20Authors --&amp;gt;, and contributed to the design of various browser security and privacy controls (Content Security Policy, secure cookies, secure logoff, clickjacking protection, and more)&amp;lt;!-- https://pdfs.semanticscholar.org/71bb/616fd09203eb32a621d95e70e6c2885da1c3.pdf&lt;br /&gt;
https://pomcor.com/whitepapers/file_sharing_security.pdf&lt;br /&gt;
http://websec.github.io/unicode-security-guide/&lt;br /&gt;
https://www.w3.org/2011/track-privacy/papers/Paypal.pdf&lt;br /&gt;
 --&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Beyond my contributions to the web, I’ve also served on the W3C Tracking Protection Working Group, which produced the specification for the Do Not Track web header, and the European Payments Council’s Payment Security Support Group, a trade group primarily focused on payment security and payment authorization in the European market. &lt;br /&gt;
&lt;br /&gt;
In my professional capacity, I spent over a decade working at a web developer before switching to information security.  As a security professional, I’ve worked for the largest FinTech company in the world, PayPal, in both North America and Europe, and I’ve worked at the largest mobile chip design company in the world, Arm.  At PayPal, I was responsible for application security across all product lines and subsidiaries worldwide, and for a time, I was the Information Technology Officer of the Bank, a statutory position within PayPal’s licensed banking unit based in Luxembourg.  At Arm, I was responsible for the end-to-end security strategy for their connected devices products (aka IoT, internet of things) and reported two levels down from the CEO.  Many people are unfamiliar with the Arm brand, however anyone using a mobile device has used an Arm product as nearly every mobile device on the planet has an Arm processor, including every Apple and Android phone and tablet.&lt;br /&gt;
&lt;br /&gt;
Currently I work at a healthcare startup, Blink Health, in the role of Security Assurance, which includes application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Why Me? ===&lt;br /&gt;
I've run for the Board of Directors every year since 2013 - this will be my seventh time running for a seat on the Board and yes, I'm very passionate about OWASP.  I run each year because I've noticed that as OWASP has grown larger, it hasn't been growing more mature, and those growing pains show up in a myriad of ways, including an exodus of staff, unhappy members, and lack of visibility.&lt;br /&gt;
&lt;br /&gt;
If elected, I would work toward helping OWASP grow and mature into a more professional organization.  Please join me in moving OWASP forward by casting your vote for Bil Corry.&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bil_Corry_2019_Elect_Me&amp;diff=254217</id>
		<title>Bil Corry 2019 Elect Me</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bil_Corry_2019_Elect_Me&amp;diff=254217"/>
				<updated>2019-08-26T22:12:51Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Creating page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Bio ===&lt;br /&gt;
I am a lifetime member of OWASP and I've been involved with OWASP since 2008. I am currently serving on the OWASP Compliance Committee and am the Chapter Leader of the Nashua Chapter, and have contributed to a variety of projects over the years (anyone remember the OWASP Certification project?). I've volunteered at AppSec USA, rounded up speakers for chapter meetings in Chicago and the Bay Area, hosted a Bay Area chapter meeting, helped WIA become a 2.0 Committee and have been a trainer using the OWASP Secure Coding deck.&lt;br /&gt;
&lt;br /&gt;
I have contributed to the technology that underpins the “World Wide Web”, namely HTTP (RFC 7230), HTTP Cookies (RFC 6265), TLS (RFC 6125), and the HTML specification.  If you have ever used a web browser to visit a website, then you have personally benefited from my efforts.  Additionally, I’ve contributed to securing the web, including my participation in OWASP and WASC, and contributed to the design of various browser security and privacy controls (Content Security Policy, secure cookies, secure logoff, clickjacking protection, and more).&lt;br /&gt;
&lt;br /&gt;
Beyond my contributions to the web, I’ve also served on the W3C Tracking Protection Working Group, which produced the specification for the Do Not Track web header, and the European Payments Council’s Payment Security Support Group, a trade group primarily focused on payment security and payment authorization in the European market. &lt;br /&gt;
&lt;br /&gt;
In my professional capacity, I spent over a decade working at a web developer before switching to information security.  As a security professional, I’ve worked for the largest FinTech company in the world, PayPal, in both North America and Europe, and I’ve worked at the largest mobile chip design company in the world, Arm.  At PayPal, I was responsible for application security across all product lines and subsidiaries worldwide, and for a time, I was the Information Technology Officer of the Bank, a statutory position within PayPal’s licensed banking unit based in Luxembourg.  At Arm, I was responsible for the end-to-end security strategy for their connected devices products (aka IoT, internet of things) and reported two levels down from the CEO.  Many people are unfamiliar with the Arm brand, however anyone using a mobile device has used an Arm product as nearly every mobile device on the planet has an Arm processor, including every Apple and Android phone and tablet.&lt;br /&gt;
&lt;br /&gt;
Currently I work at a healthcare startup, Blink Health, in the role of Security Assurance, which includes application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Why Me? ===&lt;br /&gt;
I've run for the Board of Directors every year since 2013 - this will be my seventh time running for a seat on the Board and yes, I'm very passionate about OWASP.  I run each year because I've noticed that as OWASP has grown larger, it hasn't been growing more mature, and those growing pains show up in a myriad of ways, including an exodus of staff, unhappy members, and lack of visibility.&lt;br /&gt;
&lt;br /&gt;
If elected, I would work toward helping OWASP grow and mature into a more professional organization.  Please join me in moving OWASP forward by casting your vote for Bil Corry.&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Nashua&amp;diff=253726</id>
		<title>Nashua</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Nashua&amp;diff=253726"/>
				<updated>2019-08-14T15:05:57Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Added New Hampshire category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Nashua|extra=The chapter leader is [mailto:bil.corry@owasp.org Bil Corry]&lt;br /&gt;
|meetupurl=https://www.meetup.com/OWASP-Nashua-Chapter/|region=United States}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:New Hampshire]]&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=253708</id>
		<title>OWASP Board History</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=253708"/>
				<updated>2019-08-14T03:51:26Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Added 2019 Board&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The data here was compiled from the OWASP Foundation Tax Returns and official election results.  Asterisked years were taken from other sources and may be incomplete.&lt;br /&gt;
&lt;br /&gt;
== 2014 to Current ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2014 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2015 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2016 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2017 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2018 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2019 BoD&lt;br /&gt;
|- style=&amp;quot;background: #FE9A2E; color: black&amp;quot;&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #8181F7; color: black&amp;quot;&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #F7FE2E; color: black&amp;quot;&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #0066FF; color: black&amp;quot;&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico/Jonathan Carter&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FFCC00; color: black&amp;quot;&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #339933; color: black&amp;quot;&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #CC6600; color: black&amp;quot;&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FFC744; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Johanna Curiel (resigned)/Martin Knobloch&lt;br /&gt;
| Martin Knobloch&lt;br /&gt;
| Martin Knobloch&lt;br /&gt;
|- style=&amp;quot;background: #FA5858; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Owen Pendlebury&lt;br /&gt;
| Owen Pendlebury&lt;br /&gt;
|- style=&amp;quot;background: #F7FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Chenxi Wang&lt;br /&gt;
| Chenxi Wang&lt;br /&gt;
|- style=&amp;quot;background: #33F6FF; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Greg Anderson (resigned)&lt;br /&gt;
| Ofer Maor&lt;br /&gt;
|- style=&amp;quot;background: #00AAAA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Sherif Mansour&lt;br /&gt;
| Sherif Mansour&lt;br /&gt;
|- style=&amp;quot;background: #33FF58; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Richard Greenberg&lt;br /&gt;
|- style=&amp;quot;background: #F796C5; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Gary Robinson&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2004 to 2013 ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2004 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2005 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2006 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2007 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2008 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2009 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2010 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2011 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2012 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2013 BoD&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| Jeff Williams &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
|- style=&amp;quot;background: #CC2EFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| David Anderson&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #00FF80; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FA5858; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
|- style=&amp;quot;background: #FE9A2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|- style=&amp;quot;background: #01DF01; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #8181F7; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
|- style=&amp;quot;background: #F7FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
|- style=&amp;quot;background: #0066FF; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Jim Manico&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Board&amp;diff=253530</id>
		<title>Board</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Board&amp;diff=253530"/>
				<updated>2019-08-05T11:54:12Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Changed August meeting date to August 19 (used to be August 20)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
= Board Meetings =&lt;br /&gt;
[https://www.owasp.org/index.php/About_OWASP#OWASP_Foundation_Bylaws Bylaws] are the most important legal document of any organization. Bylaws outline in writing the day-to-day rules for your organization and provide comprehensive guidelines to keep things running smoothly. If you want to understand the business of OWASP Foundation the best way to do that would be to examine the bylaws the the [https://www.owasp.org/index.php/About_OWASP#Form_990_Documents 990 forms filed with the United States Government as a non-profit annually.]&lt;br /&gt;
&lt;br /&gt;
 [https://www.owasp.org/index.php/About_OWASP#OWASP_Foundation_Bylaws Global Bylaws]&lt;br /&gt;
&lt;br /&gt;
== Upcoming 2019 Meetings ==   &lt;br /&gt;
* [[August 2019 |August 19, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=8&amp;amp;day=19&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[September 2019 |September 17, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=9&amp;amp;day=16&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[October 2019 |October 22, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=10&amp;amp;day=21&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[November 2019 |November 29, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=11&amp;amp;day=18&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[December 2019 |December 24, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=12&amp;amp;day=23&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
&lt;br /&gt;
All board meeting notes that include actions as a result will be tracked in a single document for all meetings [https://docs.google.com/a/owasp.org/document/d/1aPmftVZH3-G96J6-wrpynwwZhBHtREe5a7g8owVYUag/edit?usp=sharing click here]&lt;br /&gt;
&lt;br /&gt;
== 2018 Elected by Membership, Global Board Members == &lt;br /&gt;
[https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Member, Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_History Historical Board Members by Year]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[User:Knoblochmartin | Martin Knobloch]]:  Chair  ====&lt;br /&gt;
&lt;br /&gt;
The Chairman of the Board shall serve as the principal executive officer of the Foundation.&lt;br /&gt;
&lt;br /&gt;
Fiduciary responsibilities: He/She shall, in general, supervise and control all of the business and affairs of the Foundation. He/She will monitor financial planning and financial reports He/She or he may sign, with the Secretary or any other proper officer of the Foundation thereunto authorized by the Board of Directors, any deeds, mortgages, bonds, contracts, or other instruments which the Board of Directors has authorized to be executed, except in cases where the signing and execution thereof shall be expressly delegated by the Board of Directors or by these Bylaws to some other officer or agent of the Foundation, or shall be required by law to be otherwise signed or executed;&lt;br /&gt;
&lt;br /&gt;
Leadership and Direction: provides leadership to the Board of Directors with regards to policy setting and strategic planning. He/She helps guide and mediate board actions with respect to organizational priorities and governance concerns, and in general shall perform all duties incident to the office of Chairman of the Board subject to the control of the Board of Directors.&lt;br /&gt;
&lt;br /&gt;
Organizational Responsibilities: He/She plays a leading role in fundraising activities, formally evaluate the performance of the Foundation Director and informally evaluate the effectiveness of the board members. An annual, overall evaluation of the performance of the organization in achieving its mission will be accomplished. He or she shall, when present, preside at all meetings of the Board of Directors, unless otherwise delegated, and such other duties as may be prescribed by the Board of Directors from time to time. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====  [[Owen_Pendlebury_2017_Bio_%26_Why_Me%3F | Owen Pendlebury]]:  Vice Chair ====&lt;br /&gt;
&lt;br /&gt;
Performs Chair responsibilities when the Chair cannot be available, works closely with Chair and other Board Members, participates closely with Chair to develop and implement officer transition plans, performs other responsibilities as assigned by the Board.&lt;br /&gt;
­&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[Sherif_Mansour_2017_Bio_%26_Why_Me%3F | Sherif Mansour]]: Treasurer==== &lt;br /&gt;
&lt;br /&gt;
Treasurer ­manages finances of the organization, administers fiscal matters of the organization, provides annual budget to the board for member’s approval, ensures development and board review of financial policies and procedures. [[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[User:Ofer_Maor | Ofer Maor]]: Secretary ====&lt;br /&gt;
&lt;br /&gt;
Maintains records of the board and ensures effective management of organization’s records, manages minutes of board meetings, ensures minutes are distributed shortly after each meeting, is sufficiently familiar with legal documents (articles, by­laws, IRS letters, etc.) to note applicability during meetings; is the custodian of the corporate records and of the seal of the Foundation and see that the seal of the Foundation is affixed to all documents, the execution of which on behalf of the Foundation under its seal is duly authorized; keeps a register of the post office address of each Director which shall be furnished to the Secretary by such Director; and, in general perform all duties incident to the office of the Secretary and such other duties as from time to time may be assigned to him by the Chairman of the Board or by the Board. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== [[Chenxi_Wang,_Ph.D._(Forrester_Research) | Chenxi Wang, Ph.D.]]:  Member at Large====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Regularly attends board meetings and important related meetings, volunteers for and willingly accepts assignments and completes them thoroughly and on time, stays informed about committee matters, prepares themselves well for meetings, and reviews and comments on minutes and reports, gets to know other committee members and builds a collegial working relationship that contributes to consensus, is an active participant in the committee’s annual evaluating and planning efforts, participates in fundraising for the organization.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&lt;br /&gt;
==== [[User:Richard_greenberg | Richard Greenberg]]:  Member at Large ====&lt;br /&gt;
&amp;lt;br&amp;gt;Regularly attends board meetings and important related meetings, volunteers for and willingly accepts assignments and completes them thoroughly and on time, stays informed about committee matters, prepares themselves well for meetings, and reviews and comments on minutes and reports, gets to know other committee members and builds a collegial working relationship that contributes to consensus, is an active participant in the committee’s annual evaluating and planning efforts, participates in fundraising for the organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Owasp_logo_icon.jpg|120 px|left]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====[[Gary_Robinson_2018_Bio_and_Why_me | Gary Robinson]]:  Member at Large ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Regularly attends board meetings and important related meetings, volunteers for and willingly accepts assignments and completes them thoroughly and on time, stays informed about committee matters, prepares themselves well for meetings, and reviews and comments on minutes and reports, gets to know other committee members and builds a collegial working relationship that contributes to consensus, is an active participant in the committee’s annual evaluating and planning efforts, participates in fundraising for the organization.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Meetings Operate =&lt;br /&gt;
'''CALL TO ORDER'''&lt;br /&gt;
&lt;br /&gt;
The first order of business is for the chair to announce the call to order, along with the time. The secretary enters the time of the call to order in the minutes. After the meeting is called to order, the board chair may make welcoming remarks, ask for introductions, or read the organization’s mission and vision statements.&lt;br /&gt;
&lt;br /&gt;
'''CHANGES TO THE AGENDA'''&lt;br /&gt;
&lt;br /&gt;
The second order of business is for the chair to ask for changes to the agenda. Additions and deletions to the agenda will be made at this time. Having no changes, the agenda moves to approving the prior meeting’s minutes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''APPROVAL OF MINUTES'''&lt;br /&gt;
&lt;br /&gt;
The third item on the agenda should list “Approval of Minutes” along with the date of the most recent meeting. In most cases, board members should have received a copy of the minutes prior to the meeting. If they have not contacted the secretary prior to the meeting with corrections or changes to the minutes, they have to opportunity to make them during this item on the agenda.&lt;br /&gt;
&lt;br /&gt;
Board members have an ethical and legal responsibility to make sure that the recording of the minutes accurately reflect the board’s business.&lt;br /&gt;
&lt;br /&gt;
'''REPORTS'''&lt;br /&gt;
&lt;br /&gt;
The fourth item on the agenda is the reports. This first report should be a report from the Executive Director. This report should include a review of operations and projects. The Executive Director should give board members on overview of the business outlook including positive and negative trends, major initiatives, business updates, and other aspects of the business.&lt;br /&gt;
&lt;br /&gt;
Following the Executive Director report, the Finance Director gives a report. Board members should make an effort to understand the financial reports so that they can identify potential financial threats. Understanding financial reports may also generate discussion about potential opportunities.&lt;br /&gt;
&lt;br /&gt;
Subsequent reports may be given by committee chairs.&lt;br /&gt;
&lt;br /&gt;
'''OLD BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
Items should include past business items that are unresolved, need further discussion, or require a board vote. Items may be tabled or referred to committee for further exploration.&lt;br /&gt;
&lt;br /&gt;
'''NEW BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
Board members should have a discussion about new business items and identify a plan to take action. This may include tabling them, delaying action to a future date, or referring them to a committee.&lt;br /&gt;
&lt;br /&gt;
'''COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS'''&lt;br /&gt;
&lt;br /&gt;
At this point in the agenda, members may make announcements, such as offering congratulations or condolences, or make other special announcements. Any other business may be brought up at this time, for example, items that may need to be added to the next meeting’s agenda.&lt;br /&gt;
&lt;br /&gt;
'''ADJOURNMENT'''&lt;br /&gt;
&lt;br /&gt;
This is a formal closing of the meeting by the board chair. He should state the time that the meeting closed, so that the secretary may including it in the board minutes. The date of the next meeting should follow the adjournment item, so that board members will be reminded to put it on their calendars.&lt;br /&gt;
&lt;br /&gt;
For more information about the Roberts Rules of Order see this [http://www.umecra.com/BylawsAndRules/Roberts%20Rules%20Handout.pdf CHEAT SHEET]&lt;br /&gt;
&lt;br /&gt;
= Voting History =&lt;br /&gt;
&lt;br /&gt;
=== Historical Votes on Motions ===&lt;br /&gt;
The purpose of this is to track the position on each motion as presented and how the elected official voted on the motion. This is useful for the membership to review how elected officials voted on items that effect the organization and its [https://www.owasp.org/index.php/OWASP_Foundation_ByLaws bylaws]. A motion is a request for action (budget requests, policy changes, new partnerships etc.) they can be presented by ANYONE to the board such as a member of the public, a member of the OWASP Foundation but does require a sponsor on the Board.  That sponsor will present the motion to the board at least (10) working days in advance so it can be read in advance of the meeting.  If appropriate a motion can be presented based to take action on the motion as written. For a vote to be called and action to be taken a second board member is required to carry the business to vote. On completion of the discussion the chairman will call for a vote to the motion YES, NO, ABSTAIN. For more details on this process try this [http://www.umecra.com/BylawsAndRules/Roberts%20Rules%20Handout.pdf CHEAT SHEET]&lt;br /&gt;
&lt;br /&gt;
 [https://www.owasp.org/index.php/OWASP_Board_Votes Historical Board Votes]&lt;br /&gt;
&lt;br /&gt;
Note that if a motion is presented and is voted on and it is approved action will be taken to implement the motion.  If the motion fails it can be resubmitted and the process starts again as if it is a new motion.&lt;br /&gt;
&lt;br /&gt;
=== Attendance Tracker===&lt;br /&gt;
This is used to keep track that Board Members meet 75% attendance requirements as noted in section 3.03 of the organization bylaws. A meeting is logged as attended if the board member attends the entire meeting as scheduled from the call to order until it is adjourned, this includes executive session if applicable that is closed to the membership and general public for reasons related to human resources and legal issues that require it by law or for the good of the OWASP Foundation Inc. - &lt;br /&gt;
 [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracker]&lt;br /&gt;
&lt;br /&gt;
= Historical Meeting Archive =&lt;br /&gt;
== Archive 2019 ==&lt;br /&gt;
* [[July 2019 |July 16, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=7&amp;amp;day=15&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[June 2019 |June 18,  2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=6&amp;amp;day=17&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[May 2019 |May 21, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=5&amp;amp;day=20&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[April 2019 |April 29, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=4&amp;amp;day=15&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[March 2019 |March 18,  2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=3&amp;amp;day=18&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
* [[February 2019 |February 18, 2019]] 11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=2&amp;amp;day=18&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp; other time zones]&lt;br /&gt;
* [[January 2019 |January 23rd, 2019]] - 3:00 PM to 4:00 PM PST([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=1&amp;amp;day=23&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
&lt;br /&gt;
== Archive 2018 ==&lt;br /&gt;
* [[December 2018 |December 19th, 2018]] - 1:00 PM to 2:30 PM EST ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=12&amp;amp;day=19&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
* [[November 2018 |November 21, 2018]] - 12:00 PM to 1:30 PM EST ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=11&amp;amp;day=21&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones])&lt;br /&gt;
* [[October 2018 |October 10, 2018]] - 3:00 to 4:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=10&amp;amp;day=10&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones]) at AppSec USA 2018 Conference&lt;br /&gt;
* [[September 2018 |September 27, 2018]] - 2:00 PM to 3:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=9&amp;amp;day=19&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones]) &lt;br /&gt;
* [[August 2018 |August 15, 2018]] - 1:00 PM to 2:30 PM EDT ([https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=8&amp;amp;day=15&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=179&amp;amp;p2=24&amp;amp;p3=16&amp;amp;p4=136&amp;amp;p5=224 time zones]) &lt;br /&gt;
* [[July 4th, 2018|July 4th, 2018]] - during AppSec EU 2018&lt;br /&gt;
* [[June_19,_2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=6&amp;amp;day=19&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=78&amp;amp;p3=136&amp;amp;p4=179&amp;amp;p5=224&amp;amp;p6=102&amp;amp;p7=236&amp;amp;p8=152 Click Here for Meeting Time in Your Timezone]&lt;br /&gt;
* [[May 15, 2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=5&amp;amp;day=15&amp;amp;hour=19&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=78&amp;amp;p3=136&amp;amp;p4=179&amp;amp;p5=224&amp;amp;p6=102&amp;amp;p7=236&amp;amp;p8=152 Click Here for Meeting Time in Your Timezone]&lt;br /&gt;
* [[April 4, 2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=4&amp;amp;day=4&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=78&amp;amp;p3=136&amp;amp;p4=179&amp;amp;p5=224&amp;amp;p6=102&amp;amp;p7=236&amp;amp;p8=152 TimeZone Converter]&lt;br /&gt;
* [[March 7, 2018]] - 3:00pm - 4:00pm EST - [https://www.timeanddate.com/worldclock/converted.html?iso=20180307T21&amp;amp;p1=16&amp;amp;p2=16&amp;amp;p3=676&amp;amp;p4=136&amp;amp;p5=78&amp;amp;p6=179&amp;amp;p7=224&amp;amp;p8=240&amp;amp;p9=102 Time Converter]&lt;br /&gt;
* [[February 7, 2018]] - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2018&amp;amp;month=2&amp;amp;day=7&amp;amp;hour=20&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=179&amp;amp;p3=78&amp;amp;p4=102&amp;amp;p5=224&amp;amp;p6=136&amp;amp;p7=152&amp;amp;p8=676 TimeZone Converter]&lt;br /&gt;
* [[January 24, 2018]], [https://www.timeanddate.com/worldclock/fixedtime.html?msg=OWASP+Board+Meeting%2C+January+24+2018&amp;amp;iso=20180124T19&amp;amp;p1=16&amp;amp;ah=1&amp;amp;am=30 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive 2017 ==&lt;br /&gt;
* [[December 6, 2017]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=12&amp;amp;day=06&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[November 8, 2017]], 07:00-08:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=11&amp;amp;day=8&amp;amp;hour=15&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[October 11, 2017]],  15:00 - 17:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=10&amp;amp;day=11&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[September 19, 2017]] 15:00-17:30 PDT, in Orlando at AppSecUSA - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=9&amp;amp;day=19&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[September 6, 2017]] 07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=09&amp;amp;day=06&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter] (Cancelled for interviews)&lt;br /&gt;
*[[August 9, 2017]], 16:00-17:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=08&amp;amp;day=09&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[July 5, 2017]], 07:00-08:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=07&amp;amp;day=05&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[June 7, 2017]], 18:00-21:00 CEST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=06&amp;amp;day=07&amp;amp;hour=16&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[May 9, 2017]],  18:00-19:30 IST, in Belfast at AppSecEU - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=5&amp;amp;day=9&amp;amp;hour=17&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
*[[April 12, 2017]], 16:00-17:00 PDT - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=04&amp;amp;day=12&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]  ('''Cancelled''' [http://lists.owasp.org/pipermail/owasp-board/2017-April/017969.html Notice by Matt Konda])&lt;br /&gt;
*[[March 22, 2017]] 06:00-07:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=3&amp;amp;day=22&amp;amp;hour=13&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter] - *Special Meeting to approve the 2017 Budget*&lt;br /&gt;
* [[March 8, 2017]], 06:00-07:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=03&amp;amp;day=08&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[February 8, 2017]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=02&amp;amp;day=08&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[January 11, 2017]], 14:00-15:30 PST - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2017&amp;amp;month=1&amp;amp;day=10&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2016 Meetings ==&lt;br /&gt;
* [[December 14, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=12&amp;amp;day=14&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[November 8, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=09&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* CANCELLED - [[November 30, 2016]], 15:00-16:30 PST - placeholder only optional if needed - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=30&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[October 11, 2016]], at AppSecUSA 18:00 - 21:00 EDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=10&amp;amp;day=11&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[September 21, 2016]] 07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=09&amp;amp;day=21&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[August 23, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=08&amp;amp;day=23&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[July 1, 2016]], 18:00-21:00 CEST, in Rome at AppSecEU - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=01&amp;amp;hour=16&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[July 27, 2016]], 07:00-08:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=27&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[May 18, 2016]],  07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=05&amp;amp;day=18&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[April 20, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=04&amp;amp;day=20&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[March 16, 2016]], 16:00-17:00 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=03&amp;amp;day=16&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[February 17, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=02&amp;amp;day=17&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
* [[January 13, 2016]], 16:00-17:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=01&amp;amp;day=14&amp;amp;hour=00&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2015 Meetings ==&lt;br /&gt;
* [[December 9, 2015]], 15:00-17:00 PST &lt;br /&gt;
* [[November 18, 2015]], 14:00-15:30 PST&lt;br /&gt;
* [[November 4, 2015]], 12:00-13:30 PST&lt;br /&gt;
* [[October 14, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[September 25, 2015]] at AppSecUSA 18:00 - 20:00 PST&lt;br /&gt;
* [[August 12, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[July 22, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[June 24, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[May 22, 2015]],  18:00-20:00 CEST in Amsterdam @ AppSec-EU , 9:00am-11:00am PST;&lt;br /&gt;
* [[April 29, 2015]], 12:00-13:00 PST&lt;br /&gt;
* [[March 25, 2015]], 12:00-13:00 PST &lt;br /&gt;
* [[February 11, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[January 14, 2015]], 9am-10am PST&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive for 2014 Meetings ==&lt;br /&gt;
* [[December 10, 2014]], 9am-10am PST&lt;br /&gt;
* [[November 12, 2014]], 9am - 10am PST&lt;br /&gt;
* [[October 8, 2014]], 9am-10am PST&lt;br /&gt;
* [[September 16, 2014]], 6pm - 9pm MST, In person at Appsec USA &lt;br /&gt;
* [[August 13, 2014]], 9am-10am PST&lt;br /&gt;
* [[July 9, 2014]], 9am-10am PST&lt;br /&gt;
* [[June 27, 2014]], 8am - 4 pm BST, In person at AppSec Europe&lt;br /&gt;
* [[April 30, 2014]],9am - 12pm PST&lt;br /&gt;
* [[March 3, 2014]], 7am - 10am PST&lt;br /&gt;
* [[February 24, 2014]], 8am - 10am PST&lt;br /&gt;
&lt;br /&gt;
== Archive for 2013 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[December 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
* December 2, 2013 - Special Board Meeting - [https://docs.google.com/spreadsheet/ccc?key=0ApZ9zE0hx0LNdGdJZ1BIaEZkc2V1QV81NmJ4dnI0R1E&amp;amp;usp=sharing 2014 Budget] walk through, Q &amp;amp; A (no meeting notes)&lt;br /&gt;
&lt;br /&gt;
*[[November 22, 2013]] - In person meeting at AppSec USA - New York, NY&lt;br /&gt;
&lt;br /&gt;
* November 11, 2013 - cancelled due to in person meeting on Nov. 22&lt;br /&gt;
&lt;br /&gt;
*[[October 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[September 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[In person meeting at AppSec EU - Hamburg, Germany; August 19-24]]&lt;br /&gt;
&lt;br /&gt;
* August 12, 2013 - canceled due to in person meeting on Aug 19&lt;br /&gt;
&lt;br /&gt;
*[[July 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[June 10, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 31, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 13, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[April 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[March 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[February 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[January 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2012 Meetings ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation [https://www.owasp.org/images/a/ae/2012ByLawsFINAL.pdf ByLaws]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Global_Committee_Pages Global Committees] &lt;br /&gt;
&lt;br /&gt;
*[[January 9, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 6, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 15, 2012]] &lt;br /&gt;
&lt;br /&gt;
*[[March 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[April 5, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[May 14,2012]]&lt;br /&gt;
&lt;br /&gt;
*[[June 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Aug 13, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Sept 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 8, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 24, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 26, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
*[[Dec 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Dec 27, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
== Archive for 2011 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[March 7, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[April_4_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[May_2_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[June 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[August 8, 2011]] &lt;br /&gt;
&lt;br /&gt;
*[[September 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 20, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 22, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[October 10, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[November 14, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[December 5, 2011]]&lt;br /&gt;
&lt;br /&gt;
== Minutes for 2011 Meetings ==  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Board_Votes Board Votes Historical]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[[Minutes January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes March 8, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 4, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 2, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VD9ZHEwht9tmM8FKEQ6DBrtmL_gTAhSSnQhiFXYkJ7I/edit?hl=en_US&amp;amp;authkey=CIavkP4B June 6 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VMwYrP6owtZ-SchBxUcWTIF-ITvzUX8PjUkLPwr2ipg/edit?hl=en_US&amp;amp;authkey=CIGTx5sD July 11 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1CLu9aQpS7LdeX87rJ5N9cuJ-RGGVzDWf34l6gdMml7M/edit?hl=en_US&amp;amp;authkey=CI-U5qEP August 8, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1HM32VcvWb0hizD5_mhWMULLaouzuRgA3ZYjODRZwyAs/edit?hl=en_US September 6, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1Y-8tZisUZM5ZKP8AxJqvkiNtFanVFM0m--bMG2PZ3ww/edit October 10, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/13-aHX2pSUXjCP8ivsbls6u1VX1BVSYewyMUH8LI7zpQ/edit November 14, 2011]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2010 Meetings ==&lt;br /&gt;
*[[January 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[February 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]] &amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;Postponed until March 9, 2010&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[[April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[May 4, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[August 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[September 8, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[December_6_2010]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2010 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[Jan 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Feb 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes_December_6,_2010]]&lt;br /&gt;
&lt;br /&gt;
*[[OWASP Board Meetings January Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings February Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June 09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting July 7, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting August 4, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting September 1, 2009 Agenda]] &lt;br /&gt;
*[[OWASP Board Meeting October 6, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting November 10, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting December 1, 2009 Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2009 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 01-06-09]]&lt;br /&gt;
* [[OWASP Board Meetings 02-03-09]]&lt;br /&gt;
* [[OWASP Board Meetings 03-10-09]]&lt;br /&gt;
* [[OWASP Board Meetings April 09]]&lt;br /&gt;
* [[OWASP Board Meetings May 09]]&lt;br /&gt;
* [[OWASP Board Meetings June 09]]&lt;br /&gt;
* [[OWASP Board Meeting July 09]]&lt;br /&gt;
* [[OWASP Board Meeting August 09]]&lt;br /&gt;
* [[OWASP Board Meeting September 09]]&lt;br /&gt;
* [[OWASP Board Meeting October 09]]&lt;br /&gt;
* [[OWASP Board Meeting December 09]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2008 Meetings ==&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings July Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings August Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings September Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings October Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings December Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2008 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 2-7-08]]&lt;br /&gt;
* [[OWASP Board Meetings 3-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 5-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 6-3-08]]&lt;br /&gt;
* [[OWASP Board Meetings 8-14-08]]&lt;br /&gt;
* [[OWASP Board Meetings 9-2-08]] &lt;br /&gt;
* [[Owasp Board Meetings 10-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 11-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 12-02-08]]&lt;br /&gt;
&lt;br /&gt;
= Board Election Archive =&lt;br /&gt;
&lt;br /&gt;
All elected officers are required to [https://docs.google.com/document/d/10zBT6oY2Q3B6kr6r7DGl3Cc0f5rGmQ0Slc6RYvbxmus/edit review sign and return] the following document before starting their term in office to the then current board Secretary &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_History OWASP Board History]&lt;br /&gt;
&lt;br /&gt;
===2017 Election===&lt;br /&gt;
[https://www.owasp.org/index.php/2017_Global_Board_of_Directors_Election 2017 Board Election]&lt;br /&gt;
=== 2016 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2016_Global_Board_of_Directors_Election 2016 Board Election]&lt;br /&gt;
=== 2015 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2015_Global_Board_of_Directors_Election 2015 Board Election]&lt;br /&gt;
=== 2014 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2014_Board_Elections 2014 Board Election]&lt;br /&gt;
=== 2013 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2013_Board_Elections 2013 Board Election]&lt;br /&gt;
=== 2012 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2012_Election 2012 Board Election]&lt;br /&gt;
=== 2011 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2011Election 2011 Board Election]&lt;br /&gt;
=== 2009 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Board_Election_2009 2009 Board Election]&lt;br /&gt;
&lt;br /&gt;
=== Past OWASP Boards ===&lt;br /&gt;
&lt;br /&gt;
[[Board-2018]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2017]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2016]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2015]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2014]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2013]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2012]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2011]]&lt;br /&gt;
&lt;br /&gt;
= Misc. =&lt;br /&gt;
&lt;br /&gt;
* Teleconference Information: **CHECK MEETING INFORMATION**&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/International_Toll_Free_Calling_Information International Toll Free Calling Info]&lt;br /&gt;
&lt;br /&gt;
* Meeting Template found [https://www.owasp.org/index.php/Board-Meeting-template here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt; &amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=September_2019&amp;diff=253219</id>
		<title>September 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=September_2019&amp;diff=253219"/>
				<updated>2019-07-22T22:02:21Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Changed meeting from 9/16 to 9/17 as per Richard Greenberg. https://groups.google.com/a/owasp.org/d/msg/global-board/HzArZtET2a8/hSQYBaUvDgAJ&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Meeting Date:&lt;br /&gt;
Sept 17&lt;br /&gt;
&lt;br /&gt;
Meeting Time:&lt;br /&gt;
11 AM US Pacific - [https://www.timeanddate.com/worldclock/meetingdetails.html?year=2019&amp;amp;month=9&amp;amp;day=16&amp;amp;hour=18&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=16&amp;amp;p2=919&amp;amp;p3=78&amp;amp;p4=136&amp;amp;p5=137&amp;amp;p6=676 other time zones]&lt;br /&gt;
&lt;br /&gt;
Meeting Location:&lt;br /&gt;
Remote&lt;br /&gt;
&lt;br /&gt;
Virtual: &lt;br /&gt;
[https://zoom.us/j/282821949 Zoom Meeting Link]  Meeting ID: 282 821 949 - [https://zoom.us/u/kvUg3969 local dial in numbers]&lt;br /&gt;
&lt;br /&gt;
 AGENDA&lt;br /&gt;
&lt;br /&gt;
 CALL TO ORDER&lt;br /&gt;
&lt;br /&gt;
 CHANGES TO THE AGENDA&lt;br /&gt;
&lt;br /&gt;
 APPROVAL OF MINUTES&lt;br /&gt;
&lt;br /&gt;
 REPORTS&lt;br /&gt;
&lt;br /&gt;
 OLD BUSINESS&lt;br /&gt;
&lt;br /&gt;
 NEW BUSINESS&lt;br /&gt;
&lt;br /&gt;
 COMMENTS, ANNOUNCEMENTS, AND OTHER BUSINESS&lt;br /&gt;
&lt;br /&gt;
 ADJOURNMENT&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&lt;br /&gt;
&lt;br /&gt;
==Old Business==&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;br /&gt;
&lt;br /&gt;
==New Business==&lt;br /&gt;
All active board proposals are listed [https://drive.google.com/folderview?id=0BxSfMVkfLvslVXdvUFV3NkxucWc&amp;amp;usp=sharing here]&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/Whistleblower_Policy&amp;diff=243810</id>
		<title>Governance/Whistleblower Policy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/Whistleblower_Policy&amp;diff=243810"/>
				<updated>2018-09-28T06:33:47Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Richard resigned from the Compliance Committee, so it's just Fiona and Bil.  Wiki updated to reflect that.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Whistleblower &amp;amp; Anti-Retaliation Policy=&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/11vq24AtvKIxUORyNw3EvFSUwQW9oFAD2cr1Ek_oybK0/edit?usp=sharing Google Doc for Printing]&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation requires board members, employees, and volunteers to observe high standards of business and personal ethics in the conduct of their duties and responsibilities. As employees and representatives of the OWASP Foundation, we must practice honesty and integrity in fulfilling our responsibilities and comply with all applicable laws and regulations. The purpose of this policy is to encourage any concerned parties to come forward with credible information on illegal practices or violations of adopted policies of the organization. The policy specifies that the organization will protect the individual from retaliation and identifies the appropriate procedure(s) for reporting these issues.&lt;br /&gt;
 &lt;br /&gt;
==I. Reporting Responsibility==&lt;br /&gt;
&lt;br /&gt;
This Whistleblower Policy is intended to encourage and enable employees and others to raise serious concerns internally so that the OWASP Foundation can address and correct inappropriate conduct and actions. It is the responsibility of all board members, employees and volunteers to report concerns about violations of the OWASP Foundation’s code of ethics or suspected violations of law or regulations that govern the OWASP Foundation’s operations. &lt;br /&gt;
 &lt;br /&gt;
==II. No Retaliation== &lt;br /&gt;
&lt;br /&gt;
It is contrary to the values of the OWASP Foundation for anyone to retaliate against any board member, employee, or volunteer who in good faith reports an ethics violation, or a suspected violation of law, such as a complaint of discrimination, or suspected fraud, or suspected violation of any regulation governing the operations of the OWASP Foundation. Anyone who retaliates against someone who has reported a violation in good faith is subject to discipline up to and including termination of employment, removal from office, and revocation of membership. &lt;br /&gt;
 &lt;br /&gt;
==III. Initiating an Informal Complaint== &lt;br /&gt;
&lt;br /&gt;
A. Employees&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation has an open door policy and suggests that employees share their questions, concerns, suggestions or complaints with their supervisor.  If they are not comfortable speaking with their supervisor or are not satisfied with their supervisor’s response, they are encouraged to speak with OWASP’s Executive Director, a member of the OWASP Board of Directors, or the appointed Compliance Officer.  This person will then serve as their point-of-contact during the Whistleblower process, as well as the person responsible for capturing and archiving all related evidence, unless a conflict of interest is identified.  If a conflict of interest is identified, the point-of-contact will defer responsibility to either the Chairman of the Board or the Compliance Officer.&lt;br /&gt;
&lt;br /&gt;
B. Non-Employees&lt;br /&gt;
&lt;br /&gt;
The same open door policy that applies to OWASP Foundation employees also applies to board members and volunteers.  All individuals are encouraged to share questions, concerns, suggestions, or complaints with OWASP’s Executive Director, a member of the OWASP Board of Directors, or the appointed Compliance Officer.  This person will then serve as their point-of-contact during the Whistleblower process, as well as the person responsible for capturing and archiving all related evidence, unless a conflict of interest is identified.  If a conflict of interest is identified, the point-of-contact will defer responsibility to either the Chairman of the Board or the Compliance Officer.&lt;br /&gt;
&lt;br /&gt;
==IV. Commitment to Peaceful Conflict Resolution==&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation recognizes that conflict between contributors participating in such a diverse community will happen from time to time.  Our commitment is to attempt to prevent or resolve conflict before it escalates to the point of a formal complaint.  Thus, if both parties agree, we will appoint either a neutral internal mediator (approved by both parties) or a neutral third-party mediator to help the parties reach a peaceful resolution.  We strongly encourage all board members, employees, and volunteers to attempt mediation as a means for conflict resolution prior to submitting a formal complaint as outlined below.&lt;br /&gt;
&lt;br /&gt;
==V. Initiating a Formal Complaint==&lt;br /&gt;
&lt;br /&gt;
At any point in time, an OWASP Foundation board member, employee, or volunteer may choose to file a formal complaint regarding the ethical or legal violations of another member of our community.  This complaint must be submitted in writing (non-verbal) to the OWASP Foundation Compliance Committee [[Governance/Whistleblower_Policy#XI._Contact| email]].  A valid complaint must include all background information necessary to evaluate the request, a list of each ethical or legal violation, as well as all evidence to support the claims.  Upon submission, the Compliance Committee will evaluate that the complaint is valid and will respond back that either the complaint has been accepted, or it is lacking information necessary to properly evaluate (specifying what it is lacking).&lt;br /&gt;
&lt;br /&gt;
Once a complaint has been determined as valid, the complainant is asked to cease direct contact with the individual whom they are making the complaint against.  Attempts to facilitate direct contact, especially regarding the complaint in question, may result in the complaint being dismissed by the Compliance Officer.  At this time, we also ask that the complainant refrain from speaking on the matter with anyone other than the Compliance Officer, in order to ensure the utmost amount of confidentiality and integrity on the matter.  Disregarding this request may also result in the complaint being dismissed by the Compliance Officer.  The Compliance Officer will notify the OWASP Foundation Board of Directors that a formal complaint has been filed, the date it was filed, the complainant’s name, and the party or parties named in the complaint.&lt;br /&gt;
&lt;br /&gt;
==VI. Investigating a Formal Complaint==&lt;br /&gt;
&lt;br /&gt;
After the Compliance Officer has determined that a complaint is valid, and has notified the OWASP Foundation Board of Directors as outlined above, they will initiate an investigation into the complaint.  At this stage, the Compliance Officer, or their designee, will perform an interview of the complainant and any witnesses to the events alleged in the complaint.  Additionally, the Compliance Officer will provide the subject of the complaint with a summary of the complaint against them (not an actual copy of the complaint) and allow them sufficient time to prepare for an interview with the Compliance Officer, or their designee.  All interviews will be conducted either in a written question and answer format or recorded in an audio format in order to preserve evidence and ensure the objectivity and integrity of the investigation.  All individuals involved in the investigation are expected to maintain confidentiality to the extent possible consistent with the need to conduct an adequate investigation, and will refrain from speaking or posting publicly about the complaint or the investigation.&lt;br /&gt;
&lt;br /&gt;
==VII. Concluding an Investigation==&lt;br /&gt;
&lt;br /&gt;
Once the Compliance Officer is satisfied that they have spoken to all concerned parties, and feels that they have enough information necessary to make a recommendation, they will begin to create a final report noting the allegations, the actors involved, their determination as to the veracity of the allegations, any remedial actions recommended, and any rationale for their determinations.  Once complete, the final report will be provided to the complainant, the subject of the complaint, and any actors, individually, involved in order to allow them the opportunity to comment on the final report, which will not affect the final determination.  They will be given 72 hours to respond, at which point, all responses will be aggregated alongside the final report, and any evidence collected during the investigation, and provided to the Executive Director and the OWASP Foundation Board of Directors by the Compliance Officer.  At this point, the investigation can be considered closed.&lt;br /&gt;
&lt;br /&gt;
==VIII. Determination by the Board==&lt;br /&gt;
&lt;br /&gt;
Once the OWASP Foundation Board of Directors receives the final report, actor comments, and supporting evidence, they will require sufficient time to review and discuss all aspects of the situation and investigation.  They should strongly consider the recommendations of the Compliance Officer, but are by no means required to follow them.  From here, the standard OWASP Foundation process for Board of Director proposals and voting will apply except that any Director named in the complaint will not be allowed to vote.  Once an outcome has been agreed to, a formal decision will be written up and made public, via a post on the OWASP Blog and the OWASP Leaders List, within two weeks of the vote, along with the report provided by the Compliance Officer.  Appropriate corrective action will be taken if warranted by the investigation.&lt;br /&gt;
&lt;br /&gt;
==IX. Compliance Officer== &lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation’s Compliance Officer is responsible for ensuring that all complaints about unethical or illegal conduct are investigated and resolved. The Compliance Officer will advise the Board of Directors on all complaints and their resolution and will report at least annually on any compliance activity relating to accounting or alleged financial improprieties. The Compliance Officer is empowered to conduct their investigations in isolation of the Board in order to maintain independence, but are free to involve members of the Board as necessary.  It is solely the Compliance Officer’s charge to determine whether or not a complaint can be considered valid for investigation though any individual may submit a complaint as noted above.&lt;br /&gt;
&lt;br /&gt;
The Compliance Officer shall immediately notify the Board of Directors and Executive Director of any concerns or complaint regarding corporate accounting practices, internal controls or auditing and work with the committee until the matter is resolved. &lt;br /&gt;
&lt;br /&gt;
A Compliance Officer shall be identified by the Board of Directors and approved by a unanimous vote by January 1 of each year.  A member of the OWASP Board of Directors may not also serve as the Compliance Officer during their tenure on the Board.  If the Board of Directors is not able to unanimously agree on the Compliance Officer, a neutral, third-party executive ombuds services will be contracted to serve in this role.&lt;br /&gt;
&lt;br /&gt;
'''The current Compliance Officers are:''' '''Fiona Collins and Bil Corry'''&lt;br /&gt;
 &lt;br /&gt;
==X. Confidentiality== &lt;br /&gt;
&lt;br /&gt;
Violations or suspected violations may be submitted on a confidential basis by the complainant.  Reports of violations or suspected violations will be kept confidential to the extent possible, consistent with the need to conduct an adequate investigation.&lt;br /&gt;
&lt;br /&gt;
==XI. Contact ==&lt;br /&gt;
The Complaint / Whistleblower committee's email address is: compliance '@' owasp.org&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bil_Corry_2018_Bio_and_Why_me&amp;diff=243536</id>
		<title>Bil Corry 2018 Bio and Why me</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bil_Corry_2018_Bio_and_Why_me&amp;diff=243536"/>
				<updated>2018-09-19T15:25:21Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Bio ===&lt;br /&gt;
I am a lifetime member of OWASP and I've been involved with OWASP since 2008. I'm currently serving on the OWASP Compliance Committee, and have contributed to a variety of projects over the years (anyone remember the OWASP Certification project?). I've volunteered at AppSec USA, rounded up speakers for chapter meetings in Chicago and the Bay Area, hosted a Bay Area chapter meeting, helped WIA become a 2.0 Committee and have been a trainer using the OWASP Secure Coding deck. You might have also seen me at W3C, IETF, and WASC (cookie specification, content security policy, WASC Threat Classification, etc). Professionally, I worked as a web application developer for more than a decade before moving into security full time.&lt;br /&gt;
&lt;br /&gt;
=== Why Me? ===&lt;br /&gt;
I've run for the Board of Directors every year since 2013 - this will be my sixth time running for a seat on the Board.  I run each year because I've noticed that as OWASP has grown larger, it hasn't been growing more mature, and those growing pains show up in a myriad of ways, including an exodus of staff, unhappy members, and lack of visibility.&lt;br /&gt;
&lt;br /&gt;
I believe OWASP is at a crossroads - it can either retain it's semi-informal structure, with a small dedicated staff, and keep doing business as usual, or it can plan for a more professional organization with a larger dedicated staff and more formal rules and processes.&lt;br /&gt;
&lt;br /&gt;
If elected, I would work toward the latter, helping OWASP grow and mature into a more professional organization.  Please join me in moving OWASP forward by casting your vote for Bil Corry.&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_Global_Board_of_Directors_Election&amp;diff=243300</id>
		<title>2018 Global Board of Directors Election</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_Global_Board_of_Directors_Election&amp;diff=243300"/>
				<updated>2018-09-10T21:46:19Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Added candidates as per https://twitter.com/owasp/status/1039250386203365376 with candidates sorted in alpha order by last name.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP Foundation was established in 2001 as an open community and software security resource. Since then, OWASP has grown to be globally recognized as a credible source for application security standards (see industry citations). Individuals typically find OWASP when searching the internet for information about software security - and they are happy to find a reliable source of knowledge built by an extremely open and passionate community. OWASP is open to anyone. Anyone can attend OWASP's vendor agnostic local chapter meetings, participate in regional and global conferences, and contribute to the many OWASP projects. And anyone can start a new project, form a new chapter, or lend their expertise to help an OWASP Global Committee.&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation Board of Directors currently consists of seven elected volunteers. These unpaid volunteers dedicate themselves to the organizational mission and playing a pivotal role in the software security community. OWASP conducts democratic elections of its Board Members to enable bottom-up advancement of its mission.&lt;br /&gt;
&lt;br /&gt;
=== About the OWASP Foundation  ===&lt;br /&gt;
* [[About OWASP]]&lt;br /&gt;
* Read the [[OWASP Foundation ByLaws]] &lt;br /&gt;
* Review the [[OWASP Board Meetings]] Monthly Board meetings, voting history and topics &lt;br /&gt;
&lt;br /&gt;
=== '''Election Timeline'''===&lt;br /&gt;
&lt;br /&gt;
# Notify the 3 current board member(s) whose term is up - July 17, 2018 &lt;br /&gt;
# Call for Candidates Opens - July 19, 2018  [https://owasp.submittable.com/submit/120825/call-for-candidates-owasp-global-board-of-directors-election-2018 '''SUBMIT HERE'''] &lt;br /&gt;
# Honorary Membership Self Nomination - Open year round  [https://www.owasp.org/index.php/2017_Honorary_Membership '''SUBMIT HERE'''] &lt;br /&gt;
# Submission for Questions From the Community for the Candidate Interviews - Opens July 19, 2018  [https://github.com/OWASP-Foundation/Board-Election-Call-for-Questions/issues/1 '''SUBMIT HERE'''] &lt;br /&gt;
# Email Reminder Call For Candidates - July 30, 2018&lt;br /&gt;
# Email Reminder Honorary Membership - July 30, 2018&lt;br /&gt;
# Email Reminder Call For Candidates - August 8, 2018&lt;br /&gt;
# Email Reminder Honorary Membership - August 8, 2018&lt;br /&gt;
# Email Reminder Call for Questions from the Community  - August 8, 2018&lt;br /&gt;
# Email Reminder Call For Candidates  - August 20, 2018&lt;br /&gt;
# Email Reminder Honorary Membership -  August 20, 2018&lt;br /&gt;
# Email Reminder Call for Questions from the Community - August 20, 2018&lt;br /&gt;
# Email Reminder Call For Candidates - August 29, 2018&lt;br /&gt;
# Email Reminder Honorary Membership - August 29, 2018&lt;br /&gt;
# Email Reminder Call for Questions from the Community - August 29, 2018&lt;br /&gt;
# Deadline for Call for Candidates Closes - August 31, 2018 &lt;br /&gt;
# Deadline for Questions from the Community - August 31, 2018 &lt;br /&gt;
# Verification of candidates - September 1 to September 8, 2018&lt;br /&gt;
# Candidates announced via email and social media - September 10, 2018&lt;br /&gt;
# The 6-7 top questions from the community will be selected &amp;amp; shared with Candidates  - September 10, 2018 &lt;br /&gt;
# Scheduling of group interviews - September 10 to September 14, 2018&lt;br /&gt;
# Group interviews will be held - September 14 to 21 &lt;br /&gt;
# Deadline for interview recordings to be completed - September 21, 2018 &lt;br /&gt;
# Recordings posted on the election wiki page - On or before September 30, 2018&lt;br /&gt;
# Email/Social Media notifying the community the recordings are posted - On or before September 30, 2018&lt;br /&gt;
# Paid Membership Deadline - September 30, 2018&lt;br /&gt;
# Voting opens - October 8&lt;br /&gt;
# Voting closes - November 8&lt;br /&gt;
# Results shared with all candidates - November 9, 2018 (morning per US Eastern time)&lt;br /&gt;
# Results shared via email and social media - November 9, 2018 (evening per US Eastern time)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== '''Global Board of Directors Primary Responsibilities''' ===&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation Board of Directors currently consists of seven elected volunteers who serve a [[OWASP Foundation ByLaws|two year term]]. These unpaid volunteers dedicate themselves to the organizational mission and playing a pivotal role in the software security community. Members of the Global Board of Directors are responsible for setting the strategic direction of the organization and ensuring the financial integrity of the Foundation.&lt;br /&gt;
&lt;br /&gt;
Detailed information on meeting requirements, roles and responsibilities within the board, term limits, and elections is found in the [https://www.owasp.org/index.php/OWASP_Foundation_ByLaws OWASP Foundation bylaws].  The Board of Directors Code of Conduct and details of the orientation and on-boarding process are found on our [[Governance|Governance page]].&lt;br /&gt;
&lt;br /&gt;
Please reach out to our [[About The Open Web Application Security Project|current Board Members]] if you'd like additional information on what it's like to be a Global Board member at the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
Additional Responsibilities that the International Board of Directors must adhere to can be found [[Governance|on the Foundation Governance page]]&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP Board History|Board History]]'''&lt;br /&gt;
&lt;br /&gt;
=== '''Eligibility Requirements for Board Candidates''' ===&lt;br /&gt;
You need to be an OWASP individual paid [https://docs.google.com/spreadsheets/d/1ixfWQ7j24lS9Teq9wPUA4-DtgxpMMT5YBJhWFd0JnoM/edit?usp=sharing member] in good standing for a twelve (12) month period of time prior to September 30, 2018. Candidates are required to create a wiki page that includes: a bio, current membership status, a brief description of why you feel you are the best candidate, and why you would like to be elected. You will be contacted on September 4, 2018 to schedule a group audio interview. If you are interesting in running for a seat on the OWASP Global Board please submit your intention along with the requirements listed above. All submissions will be reviewed and verified by OWASP.  '''The Call for Candidates is opened on July 18, 2018.'''  [https://owasp.submittable.com/submit/120825/call-for-candidates-owasp-global-board-of-directors-election-2018 '''SUBMIT HERE''']  &lt;br /&gt;
&lt;br /&gt;
If you have submitted and want to review or update your submission, instructions are available [https://docs.google.com/document/d/1NUMwpqI1AWit1yhURJoexR0vyq9blZIN-Ahpq-hOxzQ/edit here].&lt;br /&gt;
&lt;br /&gt;
=== '''Meet the Candidates and listen to their interviews''' ===&lt;br /&gt;
''Links to the interviews will be posted here on or before September 30, 2018''&lt;br /&gt;
&lt;br /&gt;
''3 seats are open for this election''&lt;br /&gt;
&lt;br /&gt;
* Bil Corry&lt;br /&gt;
* Richard Greenberg&lt;br /&gt;
* Martin Knobloch&lt;br /&gt;
* Kishore Kumar&lt;br /&gt;
* Ofer Maor&lt;br /&gt;
* Gary Robinson&lt;br /&gt;
* Simon Whittaker&lt;br /&gt;
&lt;br /&gt;
=== '''Results''' ===&lt;br /&gt;
Will be posted here after the election closes on November 9, 2018&lt;br /&gt;
&lt;br /&gt;
==='''Call for Questions'''===&lt;br /&gt;
The 2018 Global Board of Directors election will start accepting questions for the candidates on July 19, 2018. If you are interested in helping lead a global community that strives on making the world a safer place, then please consider submitting question for the candidates for the OWASP Global Board of Directors.&lt;br /&gt;
&lt;br /&gt;
From September 12 to 21, all individuals who submitted a candidacy will be interviewed, and asked a series of questions about why they feel they should be elected. The questions they are asked come from you!  We will take the top 6-7 questions and those will be the questions used during the candidate interviews. You may submit your own question(s) and/or give a &amp;quot;thumbs up&amp;quot; to any existing question previously submitted by your fellow community members. &lt;br /&gt;
&lt;br /&gt;
'''The Call for Questions is open!   [https://github.com/OWASP-Foundation/Board-Election-Call-for-Questions/issues/1 SUBMIT HERE]'''&lt;br /&gt;
&lt;br /&gt;
=== '''Honorary Membership''' ===&lt;br /&gt;
Who is eligible for Honorary Membership? &lt;br /&gt;
*OWASP Chapter Leaders - The OWASP Chapter MUST be active and your leadership position MUST be on file with the OWASP Foundation 6 months prior to September 30, 2018.&lt;br /&gt;
*OWASP Project Leaders - The OWASP Project MUST be active and your leadership position MUST be on file with the OWASP Foundation 6 months prior to September 30, 2018.&lt;br /&gt;
&lt;br /&gt;
'''**NOTE**''' If you are an OWASP leader that does not have a current paid Individual Membership or current Honorary Membership on file, but meets the requirements (see eligibility above) for Honorary Membership, then you '''MUST APPLY''' for an Honorary Membership in order to vote in this year's election. The Honorary Membership request form is available '''[[Honorary Membership|HERE]]'''. All submissions will be reviewed and verified by OWASP.&lt;br /&gt;
&lt;br /&gt;
=== '''Who Can Vote?''' ===&lt;br /&gt;
OWASP paid Individual Members, paid Corporate Members and Honorary Members registered as of September 30, 2018 will have (1) vote per seat (there are 3 seats up for this election). &lt;br /&gt;
&lt;br /&gt;
Please check the current [https://docs.google.com/spreadsheets/d/1WN07dNGBldvYC_RmTKKsrYdguSUghlLP5A7QfQa6G9M/edit?usp=sharing Member Directory]. If you are not a member yet, we encourage you to [http://myowasp.force.com/memberappregion '''JOIN NOW'''!]&lt;br /&gt;
&lt;br /&gt;
=== '''How Do I Vote?''' ===&lt;br /&gt;
On October 8, 2018, eligible voting members will receive an email to their registered email address from owasp@simplyvoting.com with subject &amp;quot;BALLOT FOR OWASP 2018 Board Election&amp;quot; &lt;br /&gt;
&lt;br /&gt;
This email will include a specific link for you to cast your vote.  Please do '''NOT''' share this link with anyone.  It is a specific link '''JUST FOR YOU'''! &lt;br /&gt;
&lt;br /&gt;
Additionally, eligible voting members will also receive an email from the OWASP Foundation notifying them that their ballot has been sent. In the instance that they did not receive a ballot they are asked to [https://www.tfaforms.com/308703 contact us] immediately.&lt;br /&gt;
&lt;br /&gt;
=== '''Have additional questions about the OWASP Membership?''' ===&lt;br /&gt;
*Read the Membership FAQ [https://www.owasp.org/index.php/MEMBERSHIP_FAQ CLICK HERE]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== '''Election FAQ''' ===&lt;br /&gt;
If you have a question about the current election please [https://www.tfaforms.com/308703 '''CLICK HERE'''].&lt;br /&gt;
*'''Where can I find communication to the OWASP Community about the upcoming election?'''&lt;br /&gt;
** Answer: We will try to publish announcements and key milestone reminders to as many communication channels as possible, including the OWASP Blog, OWASP Connector, OWASP Leader's List and this Wiki Page. Please feel free to help us communicate the message, by re-posting, re-tweeting, or sharing with the OWASP Chapter, Project, or Initiatives you are involved with.&lt;br /&gt;
&lt;br /&gt;
* '''Where can I find information on last years Board election?'''&lt;br /&gt;
** Answer: [[2017 Global Board of Directors Election]]&lt;br /&gt;
&lt;br /&gt;
=== '''Communications''' ===&lt;br /&gt;
# July 17, 2018 - Email sent to current OWASP Foundation Board members whose terms are ending in 2018.&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=242468</id>
		<title>OWASP Board History</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=242468"/>
				<updated>2018-08-12T06:29:23Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Broke out the tables into 10-year segments&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The data here was compiled from the OWASP Foundation Tax Returns and official election results.  Asterisked years were taken from other sources and may be incomplete.&lt;br /&gt;
&lt;br /&gt;
== 2014 to Current ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2014 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2015 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2016 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2017 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2018 BoD&lt;br /&gt;
|- style=&amp;quot;background: #FE9A2E; color: black&amp;quot;&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #8181F7; color: black&amp;quot;&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #F7FE2E; color: black&amp;quot;&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #0066FF; color: black&amp;quot;&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico/Jonathan Carter&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FFCC00; color: black&amp;quot;&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #339933; color: black&amp;quot;&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #CC6600; color: black&amp;quot;&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
| Matt Konda&lt;br /&gt;
|- style=&amp;quot;background: #FFC744; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Johanna Curiel/Martin Knobloch&lt;br /&gt;
| Martin Knobloch&lt;br /&gt;
|- style=&amp;quot;background: #FA5858; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Owen Pendlebury&lt;br /&gt;
|- style=&amp;quot;background: #F7FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Chenxi Wang&lt;br /&gt;
|- style=&amp;quot;background: #8181F7; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Greg Anderson&lt;br /&gt;
|- style=&amp;quot;background: #0066FF; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Sherif Mansour&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2004 to 2013 ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2004 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2005 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2006 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2007 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2008 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2009 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2010 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2011 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2012 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2013 BoD&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| Jeff Williams &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
|- style=&amp;quot;background: #CC2EFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| David Anderson&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #00FF80; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FA5858; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
|- style=&amp;quot;background: #FE9A2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|- style=&amp;quot;background: #01DF01; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #8181F7; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
|- style=&amp;quot;background: #F7FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
|- style=&amp;quot;background: #0066FF; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Jim Manico&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=231626</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=231626"/>
				<updated>2017-07-12T20:42:23Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Updated with election results&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
You can get an OWASP Slack invite here: [https://owasp.herokuapp.com/ OWASP Slack Invite]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##Tanya Janca&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##Loredana Mancini&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##Cathy Hall&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##Cathy Hall&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##Vandana Verma (Asia), Loredana Mancini (Europe), Wendy Istvanick (North America)&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##Katherine Cancelado&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=2017 ELECTIONS=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
* June 23, 2017 (Friday) - Call for Candidates closes&lt;br /&gt;
* June 24, 2017 (Saturday) - Election emails send to voting members&lt;br /&gt;
* July 2, 2017 (Sunday) - Election closes&lt;br /&gt;
* July 3, 2017 (Monday) - Election results announced on WIA list&lt;br /&gt;
&lt;br /&gt;
==Candidates==&lt;br /&gt;
===Committee Officers===&lt;br /&gt;
&lt;br /&gt;
''Positions can only be filled by Voting Members.''&lt;br /&gt;
&lt;br /&gt;
====Chair====&lt;br /&gt;
* Tanya Janca&lt;br /&gt;
&lt;br /&gt;
====Vice Chair====&lt;br /&gt;
* Loredana Mancini &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
====Secretary====&lt;br /&gt;
* Cathy Hall &lt;br /&gt;
&lt;br /&gt;
====Treasurer====&lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
===Sub-Committee Coordinators===&lt;br /&gt;
&lt;br /&gt;
''Positions can be filled by Voting and Participating Members.''&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - Asia====&lt;br /&gt;
* Vandana Verma&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - Europe====&lt;br /&gt;
* Loredana Mancini&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - North America====&lt;br /&gt;
* Wendy Istvanick&lt;br /&gt;
&lt;br /&gt;
====Media Relations Coordinator====&lt;br /&gt;
* Katherine Cancelado&lt;br /&gt;
&lt;br /&gt;
==Ballot==&lt;br /&gt;
This is the ballot that was sent to Voting Members on June 24, 2017&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Dear Voting Members of WIA,&lt;br /&gt;
&lt;br /&gt;
This is your 2017 WIA Ballot.  You must respond by Sunday, July 2.  On Monday, July 3, I will tally the votes and announce the winners.  The candidate with the most vote wins.  Votes not received by the deadline will not be counted.&lt;br /&gt;
&lt;br /&gt;
To vote, please reply to me with your candidate selections.  You may optionally choose to cc Tiffany Long as an extra ballot counter.  And you may optionally choose to &amp;quot;reply all&amp;quot; if you want your vote to be transparent to your fellow Voting Members.&lt;br /&gt;
&lt;br /&gt;
Please choose one candidate for each role.  You have the option to choose &amp;quot;None&amp;quot; if you do not want to elect any of the listed candidate(s) for that role.  Omitting a vote for a role will cause your vote to not be counted.&lt;br /&gt;
&lt;br /&gt;
For candidates running for multiple roles, if the candidate wins more than one position, they will pick the role they want, and for the other role(s), the runner-up candidate is declared the winner.  For roles left empty, the incoming leadership team will decide how best to fill the role.&lt;br /&gt;
&lt;br /&gt;
The candidates for 2017 are as follows:&lt;br /&gt;
&lt;br /&gt;
Chair&lt;br /&gt;
# Tanya Janca&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Vice Chair&lt;br /&gt;
# Loredana Mancini&lt;br /&gt;
# Cathy Hall&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Secretary&lt;br /&gt;
# Cathy Hall&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Treasurer&lt;br /&gt;
# Cathy Hall&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Volunteer Coordinator - Asia&lt;br /&gt;
# Vandana Verma&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Volunteer Coordinator - Europe&lt;br /&gt;
# Loredana Mancini&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Volunteer Coordinator - North America&lt;br /&gt;
# Wendy Istvanick&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Media Relations Coordinator&lt;br /&gt;
# Katherine Cancelado&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please let me know if you have any questions.  Otherwise, I look forward to receiving your votes.&lt;br /&gt;
&lt;br /&gt;
- Bil&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Election Results==&lt;br /&gt;
===Committee Officers===&lt;br /&gt;
&lt;br /&gt;
''Positions can only be filled by Voting Members.''&lt;br /&gt;
&lt;br /&gt;
====Chair====&lt;br /&gt;
* Tanya Janca&lt;br /&gt;
&lt;br /&gt;
====Vice Chair====&lt;br /&gt;
* Loredana Mancini &lt;br /&gt;
&lt;br /&gt;
====Secretary====&lt;br /&gt;
* Cathy Hall &lt;br /&gt;
&lt;br /&gt;
====Treasurer====&lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
===Sub-Committee Coordinators===&lt;br /&gt;
&lt;br /&gt;
''Positions can be filled by Voting and Participating Members.''&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - Asia====&lt;br /&gt;
* Vandana Verma&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - Europe====&lt;br /&gt;
* Loredana Mancini&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - North America====&lt;br /&gt;
* Wendy Istvanick&lt;br /&gt;
&lt;br /&gt;
====Media Relations Coordinator====&lt;br /&gt;
* Katherine Cancelado&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2017 ==&lt;br /&gt;
Women in AppSec is kicking it up a notch at AppSec EU 2017 and we want YOU to join us! Make sure you stop by during the week to check out our events and to learn more about the group.&lt;br /&gt;
&lt;br /&gt;
Events are free to attend and do not require a conference ticket.&lt;br /&gt;
&lt;br /&gt;
Monday, May 8, 2017 6:00-9:00 pm Networking Session&lt;br /&gt;
&lt;br /&gt;
On Monday 8th May at 6:00 pm in the Waterfront Conference Centre, we will have a group of mentors each give a brief talk about their experience followed by an &amp;quot;unconference&amp;quot; event. During the &amp;quot;unconference&amp;quot; event, we will break into groups to discuss popular technical topics. This will be a fantastic opportunity to engage in mentoring relationships and hear from women in the field. You can sign up for this free event on Meetup.com here:  &amp;lt;nowiki&amp;gt;https://www.meetup.com/OWASP-Belfast/events/238434511/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Thursday, May 11, 2017 7:30-8:45 a.m. Mentoring Breakfast&lt;br /&gt;
&lt;br /&gt;
Join us at our pre-conference WiA breakfast in the Waterfront Conference Centre at 7.30 am on Thursday 11th May. A light breakfast will be provided for table discussions on various topics. This will also be a second opportunity to chat with anyone you didn't get to during the Monday evening event. Details to register for this event will be available soon, it will also be free to attend.&lt;br /&gt;
&lt;br /&gt;
=== Wondering what to expect? ===&lt;br /&gt;
Organisers Michelle and Claire discuss what you can expect here:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://drive.google.com/open?id=0B3mw0mZ4CcgtbG5FUDJxbzVqX28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Interested in being a Mentor? ===&lt;br /&gt;
We’re looking for mentors to participate in both events. Both men and women are invited to contribute as mentors. This is the commitment we’re asking for:&lt;br /&gt;
* A picture and bio for the website&lt;br /&gt;
* A time commitment of two hours between the two events&lt;br /&gt;
** 30+ minutes at the networking event&lt;br /&gt;
** 1½ hours at the mentoring breakfast&lt;br /&gt;
Let us know if you’re interested in joining us!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSfy0qx9hnkJiCiceeUDmaq78i9aYXeGsHNv9B95Z_ZeN5Z_KA/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Not sure if you’re interested yet? Provide your email address for updates as they become available.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSc2DYBKcGzESX6U8-Syohqvm_g7bLLyTBPaw5E7sUj5KO3O4A/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''We look forward to seeing you at AppSec EU 2017!'''&lt;br /&gt;
&lt;br /&gt;
=== Meet the EU WIA planning team ===&lt;br /&gt;
*  === Michelle Simpson === Security Consultant at NCC Group&lt;br /&gt;
*  === Claire Burn === Field Applications Engineer at Titan-IC&lt;br /&gt;
*  === Cathy Hall === Principal Consultant at Sila Solutions Group&lt;br /&gt;
*  === Owen Pendelbury === Manager Cyber Risk Services - Penetration Testing @ Deloitte&lt;br /&gt;
*  === Zoe Braiterman === Business Studies graduate from Drew University&lt;br /&gt;
*  === Wendy Istvanick === Object Tactician at ThoughtWorks&lt;br /&gt;
*  === Fiona Collins === IT Security Engineer, Staff at Qualcomm&lt;br /&gt;
*  === Bev Corwin === Director of Technology at DDC&lt;br /&gt;
*  === Loredana Mancini === Chief Operation Officer at ITWAY&lt;br /&gt;
*  === Emily Verwee === Online Project Manager at The Arc of the United States&lt;br /&gt;
*  === Tiffany Long === Community Manager at OWASP&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230959</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230959"/>
				<updated>2017-06-24T16:12:19Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: added copy of the ballot&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
You can get an OWASP Slack invite here: [https://owasp.herokuapp.com/ OWASP Slack Invite]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=2017 ELECTIONS=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
* June 23, 2017 (Friday) - Call for Candidates closes&lt;br /&gt;
* June 24, 2017 (Saturday) - Election emails send to voting members&lt;br /&gt;
* July 2, 2017 (Sunday) - Election closes&lt;br /&gt;
* July 3, 2017 (Monday) - Election results announced on WIA list&lt;br /&gt;
&lt;br /&gt;
==Candidates==&lt;br /&gt;
===Committee Officers===&lt;br /&gt;
&lt;br /&gt;
''Positions can only be filled by Voting Members.''&lt;br /&gt;
&lt;br /&gt;
====Chair====&lt;br /&gt;
* Tanya Janca&lt;br /&gt;
&lt;br /&gt;
====Vice Chair====&lt;br /&gt;
* Loredana Mancini &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
====Secretary====&lt;br /&gt;
* Cathy Hall &lt;br /&gt;
&lt;br /&gt;
====Treasurer====&lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
===Sub-Committee Coordinators===&lt;br /&gt;
&lt;br /&gt;
''Positions can be filled by Voting and Participating Members.''&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - Asia====&lt;br /&gt;
* Vandana Verma&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - Europe====&lt;br /&gt;
* Loredana Mancini&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - North America====&lt;br /&gt;
* Wendy Istvanick&lt;br /&gt;
&lt;br /&gt;
====Media Relations Coordinator====&lt;br /&gt;
* Katherine Cancelado&lt;br /&gt;
&lt;br /&gt;
==Ballot==&lt;br /&gt;
This is the ballot that was sent to Voting Members on June 24, 2017&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Dear Voting Members of WIA,&lt;br /&gt;
&lt;br /&gt;
This is your 2017 WIA Ballot.  You must respond by Sunday, July 2.  On Monday, July 3, I will tally the votes and announce the winners.  The candidate with the most vote wins.  Votes not received by the deadline will not be counted.&lt;br /&gt;
&lt;br /&gt;
To vote, please reply to me with your candidate selections.  You may optionally choose to cc Tiffany Long as an extra ballot counter.  And you may optionally choose to &amp;quot;reply all&amp;quot; if you want your vote to be transparent to your fellow Voting Members.&lt;br /&gt;
&lt;br /&gt;
Please choose one candidate for each role.  You have the option to choose &amp;quot;None&amp;quot; if you do not want to elect any of the listed candidate(s) for that role.  Omitting a vote for a role will cause your vote to not be counted.&lt;br /&gt;
&lt;br /&gt;
For candidates running for multiple roles, if the candidate wins more than one position, they will pick the role they want, and for the other role(s), the runner-up candidate is declared the winner.  For roles left empty, the incoming leadership team will decide how best to fill the role.&lt;br /&gt;
&lt;br /&gt;
The candidates for 2017 are as follows:&lt;br /&gt;
&lt;br /&gt;
Chair&lt;br /&gt;
# Tanya Janca&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Vice Chair&lt;br /&gt;
# Loredana Mancini&lt;br /&gt;
# Cathy Hall&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Secretary&lt;br /&gt;
# Cathy Hall&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Treasurer&lt;br /&gt;
# Cathy Hall&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Volunteer Coordinator - Asia&lt;br /&gt;
# Vandana Verma&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Volunteer Coordinator - Europe&lt;br /&gt;
# Loredana Mancini&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Volunteer Coordinator - North America&lt;br /&gt;
# Wendy Istvanick&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
Media Relations Coordinator&lt;br /&gt;
# Katherine Cancelado&lt;br /&gt;
# None&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please let me know if you have any questions.  Otherwise, I look forward to receiving your votes.&lt;br /&gt;
&lt;br /&gt;
- Bil&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2017 ==&lt;br /&gt;
Women in AppSec is kicking it up a notch at AppSec EU 2017 and we want YOU to join us! Make sure you stop by during the week to check out our events and to learn more about the group.&lt;br /&gt;
&lt;br /&gt;
Events are free to attend and do not require a conference ticket.&lt;br /&gt;
&lt;br /&gt;
Monday, May 8, 2017 6:00-9:00 pm Networking Session&lt;br /&gt;
&lt;br /&gt;
On Monday 8th May at 6:00 pm in the Waterfront Conference Centre, we will have a group of mentors each give a brief talk about their experience followed by an &amp;quot;unconference&amp;quot; event. During the &amp;quot;unconference&amp;quot; event, we will break into groups to discuss popular technical topics. This will be a fantastic opportunity to engage in mentoring relationships and hear from women in the field. You can sign up for this free event on Meetup.com here:  &amp;lt;nowiki&amp;gt;https://www.meetup.com/OWASP-Belfast/events/238434511/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Thursday, May 11, 2017 7:30-8:45 a.m. Mentoring Breakfast&lt;br /&gt;
&lt;br /&gt;
Join us at our pre-conference WiA breakfast in the Waterfront Conference Centre at 7.30 am on Thursday 11th May. A light breakfast will be provided for table discussions on various topics. This will also be a second opportunity to chat with anyone you didn't get to during the Monday evening event. Details to register for this event will be available soon, it will also be free to attend.&lt;br /&gt;
&lt;br /&gt;
=== Wondering what to expect? ===&lt;br /&gt;
Organisers Michelle and Claire discuss what you can expect here:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://drive.google.com/open?id=0B3mw0mZ4CcgtbG5FUDJxbzVqX28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Interested in being a Mentor? ===&lt;br /&gt;
We’re looking for mentors to participate in both events. Both men and women are invited to contribute as mentors. This is the commitment we’re asking for:&lt;br /&gt;
* A picture and bio for the website&lt;br /&gt;
* A time commitment of two hours between the two events&lt;br /&gt;
** 30+ minutes at the networking event&lt;br /&gt;
** 1½ hours at the mentoring breakfast&lt;br /&gt;
Let us know if you’re interested in joining us!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSfy0qx9hnkJiCiceeUDmaq78i9aYXeGsHNv9B95Z_ZeN5Z_KA/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Not sure if you’re interested yet? Provide your email address for updates as they become available.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSc2DYBKcGzESX6U8-Syohqvm_g7bLLyTBPaw5E7sUj5KO3O4A/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''We look forward to seeing you at AppSec EU 2017!'''&lt;br /&gt;
&lt;br /&gt;
=== Meet the EU WIA planning team ===&lt;br /&gt;
*  === Michelle Simpson === Security Consultant at NCC Group&lt;br /&gt;
*  === Claire Burn === Field Applications Engineer at Titan-IC&lt;br /&gt;
*  === Cathy Hall === Principal Consultant at Sila Solutions Group&lt;br /&gt;
*  === Owen Pendelbury === Manager Cyber Risk Services - Penetration Testing @ Deloitte&lt;br /&gt;
*  === Zoe Braiterman === Business Studies graduate from Drew University&lt;br /&gt;
*  === Wendy Istvanick === Object Tactician at ThoughtWorks&lt;br /&gt;
*  === Fiona Collins === IT Security Engineer, Staff at Qualcomm&lt;br /&gt;
*  === Bev Corwin === Director of Technology at DDC&lt;br /&gt;
*  === Loredana Mancini === Chief Operation Officer at ITWAY&lt;br /&gt;
*  === Emily Verwee === Online Project Manager at The Arc of the United States&lt;br /&gt;
*  === Tiffany Long === Community Manager at OWASP&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230958</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230958"/>
				<updated>2017-06-24T15:20:42Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: /* Volunteer Coordinator - India */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
You can get an OWASP Slack invite here: [https://owasp.herokuapp.com/ OWASP Slack Invite]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=2017 ELECTIONS=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
* June 23, 2017 (Friday) - Call for Candidates closes&lt;br /&gt;
* June 24, 2017 (Saturday) - Election emails send to voting members&lt;br /&gt;
* July 2, 2017 (Sunday) - Election closes&lt;br /&gt;
* July 3, 2017 (Monday) - Election results announced on WIA list&lt;br /&gt;
&lt;br /&gt;
==Candidates==&lt;br /&gt;
===Committee Officers===&lt;br /&gt;
&lt;br /&gt;
''Positions can only be filled by Voting Members.''&lt;br /&gt;
&lt;br /&gt;
====Chair====&lt;br /&gt;
* Tanya Janca&lt;br /&gt;
&lt;br /&gt;
====Vice Chair====&lt;br /&gt;
* Loredana Mancini &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
====Secretary====&lt;br /&gt;
* Cathy Hall &lt;br /&gt;
&lt;br /&gt;
====Treasurer====&lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
===Sub-Committee Coordinators===&lt;br /&gt;
&lt;br /&gt;
''Positions can be filled by Voting and Participating Members.''&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - Asia====&lt;br /&gt;
* Vandana Verma&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - Europe====&lt;br /&gt;
* Loredana Mancini&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - North America====&lt;br /&gt;
* Wendy Istvanick&lt;br /&gt;
&lt;br /&gt;
====Media Relations Coordinator====&lt;br /&gt;
* Katherine Cancelado&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2017 ==&lt;br /&gt;
Women in AppSec is kicking it up a notch at AppSec EU 2017 and we want YOU to join us! Make sure you stop by during the week to check out our events and to learn more about the group.&lt;br /&gt;
&lt;br /&gt;
Events are free to attend and do not require a conference ticket.&lt;br /&gt;
&lt;br /&gt;
Monday, May 8, 2017 6:00-9:00 pm Networking Session&lt;br /&gt;
&lt;br /&gt;
On Monday 8th May at 6:00 pm in the Waterfront Conference Centre, we will have a group of mentors each give a brief talk about their experience followed by an &amp;quot;unconference&amp;quot; event. During the &amp;quot;unconference&amp;quot; event, we will break into groups to discuss popular technical topics. This will be a fantastic opportunity to engage in mentoring relationships and hear from women in the field. You can sign up for this free event on Meetup.com here:  &amp;lt;nowiki&amp;gt;https://www.meetup.com/OWASP-Belfast/events/238434511/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Thursday, May 11, 2017 7:30-8:45 a.m. Mentoring Breakfast&lt;br /&gt;
&lt;br /&gt;
Join us at our pre-conference WiA breakfast in the Waterfront Conference Centre at 7.30 am on Thursday 11th May. A light breakfast will be provided for table discussions on various topics. This will also be a second opportunity to chat with anyone you didn't get to during the Monday evening event. Details to register for this event will be available soon, it will also be free to attend.&lt;br /&gt;
&lt;br /&gt;
=== Wondering what to expect? ===&lt;br /&gt;
Organisers Michelle and Claire discuss what you can expect here:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://drive.google.com/open?id=0B3mw0mZ4CcgtbG5FUDJxbzVqX28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Interested in being a Mentor? ===&lt;br /&gt;
We’re looking for mentors to participate in both events. Both men and women are invited to contribute as mentors. This is the commitment we’re asking for:&lt;br /&gt;
* A picture and bio for the website&lt;br /&gt;
* A time commitment of two hours between the two events&lt;br /&gt;
** 30+ minutes at the networking event&lt;br /&gt;
** 1½ hours at the mentoring breakfast&lt;br /&gt;
Let us know if you’re interested in joining us!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSfy0qx9hnkJiCiceeUDmaq78i9aYXeGsHNv9B95Z_ZeN5Z_KA/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Not sure if you’re interested yet? Provide your email address for updates as they become available.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSc2DYBKcGzESX6U8-Syohqvm_g7bLLyTBPaw5E7sUj5KO3O4A/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''We look forward to seeing you at AppSec EU 2017!'''&lt;br /&gt;
&lt;br /&gt;
=== Meet the EU WIA planning team ===&lt;br /&gt;
*  === Michelle Simpson === Security Consultant at NCC Group&lt;br /&gt;
*  === Claire Burn === Field Applications Engineer at Titan-IC&lt;br /&gt;
*  === Cathy Hall === Principal Consultant at Sila Solutions Group&lt;br /&gt;
*  === Owen Pendelbury === Manager Cyber Risk Services - Penetration Testing @ Deloitte&lt;br /&gt;
*  === Zoe Braiterman === Business Studies graduate from Drew University&lt;br /&gt;
*  === Wendy Istvanick === Object Tactician at ThoughtWorks&lt;br /&gt;
*  === Fiona Collins === IT Security Engineer, Staff at Qualcomm&lt;br /&gt;
*  === Bev Corwin === Director of Technology at DDC&lt;br /&gt;
*  === Loredana Mancini === Chief Operation Officer at ITWAY&lt;br /&gt;
*  === Emily Verwee === Online Project Manager at The Arc of the United States&lt;br /&gt;
*  === Tiffany Long === Community Manager at OWASP&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230957</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230957"/>
				<updated>2017-06-24T15:10:13Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: finalized candidate list&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
You can get an OWASP Slack invite here: [https://owasp.herokuapp.com/ OWASP Slack Invite]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=2017 ELECTIONS=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
* June 23, 2017 (Friday) - Call for Candidates closes&lt;br /&gt;
* June 24, 2017 (Saturday) - Election emails send to voting members&lt;br /&gt;
* July 2, 2017 (Sunday) - Election closes&lt;br /&gt;
* July 3, 2017 (Monday) - Election results announced on WIA list&lt;br /&gt;
&lt;br /&gt;
==Candidates==&lt;br /&gt;
===Committee Officers===&lt;br /&gt;
&lt;br /&gt;
''Positions can only be filled by Voting Members.''&lt;br /&gt;
&lt;br /&gt;
====Chair====&lt;br /&gt;
* Tanya Janca&lt;br /&gt;
&lt;br /&gt;
====Vice Chair====&lt;br /&gt;
* Loredana Mancini &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
====Secretary====&lt;br /&gt;
* Cathy Hall &lt;br /&gt;
&lt;br /&gt;
====Treasurer====&lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
===Sub-Committee Coordinators===&lt;br /&gt;
&lt;br /&gt;
''Positions can be filled by Voting and Participating Members.''&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - India====&lt;br /&gt;
* Vandana Verma&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - Europe====&lt;br /&gt;
* Loredana Mancini&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - North America====&lt;br /&gt;
* Wendy Istvanick&lt;br /&gt;
&lt;br /&gt;
====Media Relations Coordinator====&lt;br /&gt;
* Katherine Cancelado&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2017 ==&lt;br /&gt;
Women in AppSec is kicking it up a notch at AppSec EU 2017 and we want YOU to join us! Make sure you stop by during the week to check out our events and to learn more about the group.&lt;br /&gt;
&lt;br /&gt;
Events are free to attend and do not require a conference ticket.&lt;br /&gt;
&lt;br /&gt;
Monday, May 8, 2017 6:00-9:00 pm Networking Session&lt;br /&gt;
&lt;br /&gt;
On Monday 8th May at 6:00 pm in the Waterfront Conference Centre, we will have a group of mentors each give a brief talk about their experience followed by an &amp;quot;unconference&amp;quot; event. During the &amp;quot;unconference&amp;quot; event, we will break into groups to discuss popular technical topics. This will be a fantastic opportunity to engage in mentoring relationships and hear from women in the field. You can sign up for this free event on Meetup.com here:  &amp;lt;nowiki&amp;gt;https://www.meetup.com/OWASP-Belfast/events/238434511/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Thursday, May 11, 2017 7:30-8:45 a.m. Mentoring Breakfast&lt;br /&gt;
&lt;br /&gt;
Join us at our pre-conference WiA breakfast in the Waterfront Conference Centre at 7.30 am on Thursday 11th May. A light breakfast will be provided for table discussions on various topics. This will also be a second opportunity to chat with anyone you didn't get to during the Monday evening event. Details to register for this event will be available soon, it will also be free to attend.&lt;br /&gt;
&lt;br /&gt;
=== Wondering what to expect? ===&lt;br /&gt;
Organisers Michelle and Claire discuss what you can expect here:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://drive.google.com/open?id=0B3mw0mZ4CcgtbG5FUDJxbzVqX28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Interested in being a Mentor? ===&lt;br /&gt;
We’re looking for mentors to participate in both events. Both men and women are invited to contribute as mentors. This is the commitment we’re asking for:&lt;br /&gt;
* A picture and bio for the website&lt;br /&gt;
* A time commitment of two hours between the two events&lt;br /&gt;
** 30+ minutes at the networking event&lt;br /&gt;
** 1½ hours at the mentoring breakfast&lt;br /&gt;
Let us know if you’re interested in joining us!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSfy0qx9hnkJiCiceeUDmaq78i9aYXeGsHNv9B95Z_ZeN5Z_KA/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Not sure if you’re interested yet? Provide your email address for updates as they become available.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSc2DYBKcGzESX6U8-Syohqvm_g7bLLyTBPaw5E7sUj5KO3O4A/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''We look forward to seeing you at AppSec EU 2017!'''&lt;br /&gt;
&lt;br /&gt;
=== Meet the EU WIA planning team ===&lt;br /&gt;
*  === Michelle Simpson === Security Consultant at NCC Group&lt;br /&gt;
*  === Claire Burn === Field Applications Engineer at Titan-IC&lt;br /&gt;
*  === Cathy Hall === Principal Consultant at Sila Solutions Group&lt;br /&gt;
*  === Owen Pendelbury === Manager Cyber Risk Services - Penetration Testing @ Deloitte&lt;br /&gt;
*  === Zoe Braiterman === Business Studies graduate from Drew University&lt;br /&gt;
*  === Wendy Istvanick === Object Tactician at ThoughtWorks&lt;br /&gt;
*  === Fiona Collins === IT Security Engineer, Staff at Qualcomm&lt;br /&gt;
*  === Bev Corwin === Director of Technology at DDC&lt;br /&gt;
*  === Loredana Mancini === Chief Operation Officer at ITWAY&lt;br /&gt;
*  === Emily Verwee === Online Project Manager at The Arc of the United States&lt;br /&gt;
*  === Tiffany Long === Community Manager at OWASP&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230943</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230943"/>
				<updated>2017-06-23T18:13:17Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: split out volunteer coordinator by region&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
You can get an OWASP Slack invite here: [https://owasp.herokuapp.com/ OWASP Slack Invite]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=2017 ELECTIONS=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
* June 23, 2017 (Friday) - Call for Candidates closes&lt;br /&gt;
* June 24, 2017 (Saturday) - Election emails send to voting members&lt;br /&gt;
* July 2, 2017 (Sunday) - Election closes&lt;br /&gt;
* July 3, 2017 (Monday) - Election results announced on WIA list&lt;br /&gt;
&lt;br /&gt;
==Candidates==&lt;br /&gt;
===Committee Officers===&lt;br /&gt;
&lt;br /&gt;
''Positions can only be filled by Voting Members.''&lt;br /&gt;
&lt;br /&gt;
====Chair====&lt;br /&gt;
* Bev Corwin&lt;br /&gt;
&lt;br /&gt;
====Vice Chair====&lt;br /&gt;
* Loredana Mancini &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
====Secretary====&lt;br /&gt;
* Cathy Hall &lt;br /&gt;
&lt;br /&gt;
====Treasurer====&lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
===Sub-Committee Coordinators===&lt;br /&gt;
&lt;br /&gt;
''Positions can be filled by Voting and Participating Members.''&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - North America====&lt;br /&gt;
* Wendy Istvanick&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator - Europe====&lt;br /&gt;
* Loredana Mancini&lt;br /&gt;
&lt;br /&gt;
====Media Relations Coordinator====&lt;br /&gt;
* Katherine Cancelado&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2017 ==&lt;br /&gt;
Women in AppSec is kicking it up a notch at AppSec EU 2017 and we want YOU to join us! Make sure you stop by during the week to check out our events and to learn more about the group.&lt;br /&gt;
&lt;br /&gt;
Events are free to attend and do not require a conference ticket.&lt;br /&gt;
&lt;br /&gt;
Monday, May 8, 2017 6:00-9:00 pm Networking Session&lt;br /&gt;
&lt;br /&gt;
On Monday 8th May at 6:00 pm in the Waterfront Conference Centre, we will have a group of mentors each give a brief talk about their experience followed by an &amp;quot;unconference&amp;quot; event. During the &amp;quot;unconference&amp;quot; event, we will break into groups to discuss popular technical topics. This will be a fantastic opportunity to engage in mentoring relationships and hear from women in the field. You can sign up for this free event on Meetup.com here:  &amp;lt;nowiki&amp;gt;https://www.meetup.com/OWASP-Belfast/events/238434511/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Thursday, May 11, 2017 7:30-8:45 a.m. Mentoring Breakfast&lt;br /&gt;
&lt;br /&gt;
Join us at our pre-conference WiA breakfast in the Waterfront Conference Centre at 7.30 am on Thursday 11th May. A light breakfast will be provided for table discussions on various topics. This will also be a second opportunity to chat with anyone you didn't get to during the Monday evening event. Details to register for this event will be available soon, it will also be free to attend.&lt;br /&gt;
&lt;br /&gt;
=== Wondering what to expect? ===&lt;br /&gt;
Organisers Michelle and Claire discuss what you can expect here:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://drive.google.com/open?id=0B3mw0mZ4CcgtbG5FUDJxbzVqX28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Interested in being a Mentor? ===&lt;br /&gt;
We’re looking for mentors to participate in both events. Both men and women are invited to contribute as mentors. This is the commitment we’re asking for:&lt;br /&gt;
* A picture and bio for the website&lt;br /&gt;
* A time commitment of two hours between the two events&lt;br /&gt;
** 30+ minutes at the networking event&lt;br /&gt;
** 1½ hours at the mentoring breakfast&lt;br /&gt;
Let us know if you’re interested in joining us!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSfy0qx9hnkJiCiceeUDmaq78i9aYXeGsHNv9B95Z_ZeN5Z_KA/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Not sure if you’re interested yet? Provide your email address for updates as they become available.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSc2DYBKcGzESX6U8-Syohqvm_g7bLLyTBPaw5E7sUj5KO3O4A/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''We look forward to seeing you at AppSec EU 2017!'''&lt;br /&gt;
&lt;br /&gt;
=== Meet the EU WIA planning team ===&lt;br /&gt;
*  === Michelle Simpson === Security Consultant at NCC Group&lt;br /&gt;
*  === Claire Burn === Field Applications Engineer at Titan-IC&lt;br /&gt;
*  === Cathy Hall === Principal Consultant at Sila Solutions Group&lt;br /&gt;
*  === Owen Pendelbury === Manager Cyber Risk Services - Penetration Testing @ Deloitte&lt;br /&gt;
*  === Zoe Braiterman === Business Studies graduate from Drew University&lt;br /&gt;
*  === Wendy Istvanick === Object Tactician at ThoughtWorks&lt;br /&gt;
*  === Fiona Collins === IT Security Engineer, Staff at Qualcomm&lt;br /&gt;
*  === Bev Corwin === Director of Technology at DDC&lt;br /&gt;
*  === Loredana Mancini === Chief Operation Officer at ITWAY&lt;br /&gt;
*  === Emily Verwee === Online Project Manager at The Arc of the United States&lt;br /&gt;
*  === Tiffany Long === Community Manager at OWASP&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230941</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230941"/>
				<updated>2017-06-23T17:43:19Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: added a candidate to the election&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
You can get an OWASP Slack invite here: [https://owasp.herokuapp.com/ OWASP Slack Invite]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=2017 ELECTIONS=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
* June 23, 2017 (Friday) - Call for Candidates closes&lt;br /&gt;
* June 24, 2017 (Saturday) - Election emails send to voting members&lt;br /&gt;
* July 2, 2017 (Sunday) - Election closes&lt;br /&gt;
* July 3, 2017 (Monday) - Election results announced on WIA list&lt;br /&gt;
&lt;br /&gt;
==Candidates==&lt;br /&gt;
===Committee Officers===&lt;br /&gt;
&lt;br /&gt;
''Positions can only be filled by Voting Members.''&lt;br /&gt;
&lt;br /&gt;
====Chair====&lt;br /&gt;
* Bev Corwin&lt;br /&gt;
&lt;br /&gt;
====Vice Chair====&lt;br /&gt;
* Loredana Mancini &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
====Secretary====&lt;br /&gt;
* Cathy Hall &lt;br /&gt;
&lt;br /&gt;
====Treasurer====&lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
===Sub-Committee Coordinators===&lt;br /&gt;
&lt;br /&gt;
''Positions can be filled by Voting and Participating Members.''&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator====&lt;br /&gt;
*Wendy Istvanick&lt;br /&gt;
*Loredana Mancini&lt;br /&gt;
&lt;br /&gt;
====Media Relations Coordinator====&lt;br /&gt;
* Katherine Cancelado&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2017 ==&lt;br /&gt;
Women in AppSec is kicking it up a notch at AppSec EU 2017 and we want YOU to join us! Make sure you stop by during the week to check out our events and to learn more about the group.&lt;br /&gt;
&lt;br /&gt;
Events are free to attend and do not require a conference ticket.&lt;br /&gt;
&lt;br /&gt;
Monday, May 8, 2017 6:00-9:00 pm Networking Session&lt;br /&gt;
&lt;br /&gt;
On Monday 8th May at 6:00 pm in the Waterfront Conference Centre, we will have a group of mentors each give a brief talk about their experience followed by an &amp;quot;unconference&amp;quot; event. During the &amp;quot;unconference&amp;quot; event, we will break into groups to discuss popular technical topics. This will be a fantastic opportunity to engage in mentoring relationships and hear from women in the field. You can sign up for this free event on Meetup.com here:  &amp;lt;nowiki&amp;gt;https://www.meetup.com/OWASP-Belfast/events/238434511/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Thursday, May 11, 2017 7:30-8:45 a.m. Mentoring Breakfast&lt;br /&gt;
&lt;br /&gt;
Join us at our pre-conference WiA breakfast in the Waterfront Conference Centre at 7.30 am on Thursday 11th May. A light breakfast will be provided for table discussions on various topics. This will also be a second opportunity to chat with anyone you didn't get to during the Monday evening event. Details to register for this event will be available soon, it will also be free to attend.&lt;br /&gt;
&lt;br /&gt;
=== Wondering what to expect? ===&lt;br /&gt;
Organisers Michelle and Claire discuss what you can expect here:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://drive.google.com/open?id=0B3mw0mZ4CcgtbG5FUDJxbzVqX28&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Interested in being a Mentor? ===&lt;br /&gt;
We’re looking for mentors to participate in both events. Both men and women are invited to contribute as mentors. This is the commitment we’re asking for:&lt;br /&gt;
* A picture and bio for the website&lt;br /&gt;
* A time commitment of two hours between the two events&lt;br /&gt;
** 30+ minutes at the networking event&lt;br /&gt;
** 1½ hours at the mentoring breakfast&lt;br /&gt;
Let us know if you’re interested in joining us!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSfy0qx9hnkJiCiceeUDmaq78i9aYXeGsHNv9B95Z_ZeN5Z_KA/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Not sure if you’re interested yet? Provide your email address for updates as they become available.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://docs.google.com/forms/d/e/1FAIpQLSc2DYBKcGzESX6U8-Syohqvm_g7bLLyTBPaw5E7sUj5KO3O4A/viewform&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''We look forward to seeing you at AppSec EU 2017!'''&lt;br /&gt;
&lt;br /&gt;
=== Meet the EU WIA planning team ===&lt;br /&gt;
*  === Michelle Simpson === Security Consultant at NCC Group&lt;br /&gt;
*  === Claire Burn === Field Applications Engineer at Titan-IC&lt;br /&gt;
*  === Cathy Hall === Principal Consultant at Sila Solutions Group&lt;br /&gt;
*  === Owen Pendelbury === Manager Cyber Risk Services - Penetration Testing @ Deloitte&lt;br /&gt;
*  === Zoe Braiterman === Business Studies graduate from Drew University&lt;br /&gt;
*  === Wendy Istvanick === Object Tactician at ThoughtWorks&lt;br /&gt;
*  === Fiona Collins === IT Security Engineer, Staff at Qualcomm&lt;br /&gt;
*  === Bev Corwin === Director of Technology at DDC&lt;br /&gt;
*  === Loredana Mancini === Chief Operation Officer at ITWAY&lt;br /&gt;
*  === Emily Verwee === Online Project Manager at The Arc of the United States&lt;br /&gt;
*  === Tiffany Long === Community Manager at OWASP&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230907</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230907"/>
				<updated>2017-06-22T18:48:39Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: minor formatting change&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
You can get an OWASP Slack invite here: [https://owasp.herokuapp.com/ OWASP Slack Invite]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=2017 ELECTIONS=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
* June 23, 2017 (Friday) - Call for Candidates closes&lt;br /&gt;
* June 24, 2017 (Saturday) - Election emails send to voting members&lt;br /&gt;
* July 2, 2017 (Sunday) - Election closes&lt;br /&gt;
* July 3, 2017 (Monday) - Election results announced on WIA list&lt;br /&gt;
&lt;br /&gt;
==Candidates==&lt;br /&gt;
===Committee Officers===&lt;br /&gt;
&lt;br /&gt;
''Positions can only be filled by Voting Members.''&lt;br /&gt;
&lt;br /&gt;
====Chair====&lt;br /&gt;
* Bev Corwin&lt;br /&gt;
&lt;br /&gt;
====Vice Chair====&lt;br /&gt;
* Owen Pendlebury &lt;br /&gt;
* Loredana Mancini &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
====Secretary====&lt;br /&gt;
* Owen Pendlebury &lt;br /&gt;
* Cathy Hall &lt;br /&gt;
&lt;br /&gt;
====Treasurer====&lt;br /&gt;
* Owen Pendlebury &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
===Sub-Committee Coordinators===&lt;br /&gt;
&lt;br /&gt;
''Positions can be filled by Voting and Participating Members.''&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator====&lt;br /&gt;
*Wendy Istvanick&lt;br /&gt;
*Owen Pendlebury &lt;br /&gt;
*Loredana Mancini&lt;br /&gt;
&lt;br /&gt;
====Media Relations Coordinator====&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230906</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230906"/>
				<updated>2017-06-22T18:42:10Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: add tab on elections with candidates&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
You can get an OWASP Slack invite here: [https://owasp.herokuapp.com/ OWASP Slack Invite]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=2017 ELECTIONS=&lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
* June 23, 2017 (Friday) - Call for Candidates closes&lt;br /&gt;
* June 24, 2017 (Saturday) - Election emails send to voting members&lt;br /&gt;
* July 2, 2017 (Sunday) - Election closes&lt;br /&gt;
* July 3, 2017 (Monday) - Election results announced on WIA list&lt;br /&gt;
&lt;br /&gt;
==Candidates==&lt;br /&gt;
===Committee Officers===&lt;br /&gt;
&lt;br /&gt;
Positions can only be filled by Voting Members.&lt;br /&gt;
&lt;br /&gt;
====Chair====&lt;br /&gt;
* Bev Corwin&lt;br /&gt;
&lt;br /&gt;
====Vice Chair====&lt;br /&gt;
* Owen Pendlebury &lt;br /&gt;
* Loredana Mancini &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
====Secretary====&lt;br /&gt;
* Owen Pendlebury &lt;br /&gt;
* Cathy Hall &lt;br /&gt;
&lt;br /&gt;
====Treasurer====&lt;br /&gt;
* Owen Pendlebury &lt;br /&gt;
* Cathy Hall&lt;br /&gt;
&lt;br /&gt;
===Sub-Committee Coordinators===&lt;br /&gt;
&lt;br /&gt;
Positions can be filled by Voting and Participating Members.&lt;br /&gt;
&lt;br /&gt;
====Volunteer Coordinator====&lt;br /&gt;
*Wendy Istvanick&lt;br /&gt;
*Owen Pendlebury &lt;br /&gt;
*Loredana Mancini&lt;br /&gt;
&lt;br /&gt;
====Media Relations Coordinator====&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230867</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230867"/>
				<updated>2017-06-21T23:05:50Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: add slack invite link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
You can get an OWASP Slack invite here: [https://owasp.herokuapp.com/ OWASP Slack Invite]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230864</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230864"/>
				<updated>2017-06-21T19:54:31Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Added duties to roles&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Open/run the meetings&lt;br /&gt;
###Put items to vote and announce the result&lt;br /&gt;
###Oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Serve in place of the chair when the chair is not available, temporarily or permanently&lt;br /&gt;
###Confirm and validate results of votes&lt;br /&gt;
###Help the chair oversee progress of committee activities&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Run doodles for upcoming meetings &lt;br /&gt;
###Send out meeting invites&lt;br /&gt;
#Secretary&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain the WIA membership list and associated bookkeeping&lt;br /&gt;
###Take attendance/minutes at meetings&lt;br /&gt;
###Create an agenda for each meeting, put out a call to members for agenda items&lt;br /&gt;
###Post agendas and meetings&lt;br /&gt;
###Edit/update committee Wiki page&lt;br /&gt;
#Treasurer&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain budget&lt;br /&gt;
###Track income and expenses for all committee activities&lt;br /&gt;
###Report at each meeting the expenditures and incoming revenue for the month and the balance of the fund&lt;br /&gt;
###Check the balance of the WIA budget with the OWASP accountant quarterly&lt;br /&gt;
###Participates in fundraising activities/sponsorship acquisition&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Coordinators==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Recruit new members for WIA/volunteers for specific events&lt;br /&gt;
###Schedule/train volunteers as needed&lt;br /&gt;
###Provides direction and coordination for volunteers&lt;br /&gt;
###Plan for retention and replacement&lt;br /&gt;
###Support in fundraising activities/sponsorship acquisition&lt;br /&gt;
###Connect with other local  active groups in security to create volunteer networking&lt;br /&gt;
###Maintain lessons learned in the volunteer recruiting for the different events to improve the recruiting process&lt;br /&gt;
###Keep informal/formal contacts with all the volunteer to be able to reach them in case of new needs&lt;br /&gt;
#Media Relations Coordinator&lt;br /&gt;
##TBD for 2017 Term&lt;br /&gt;
##Duties&lt;br /&gt;
###Maintain list of media contacts&lt;br /&gt;
###Maintain list of media articles mentioning WIA&lt;br /&gt;
###Promote WIA to media&lt;br /&gt;
###Prepare talking points, messaging strategy&lt;br /&gt;
###Work with OWASP Global to issue press releases&lt;br /&gt;
&lt;br /&gt;
Note: All Committee Members may serve as Sub-Committee Coordinators&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230832</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230832"/>
				<updated>2017-06-20T22:03:47Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Corrected typos, added more to governance&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=MEMBERSHIP=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five officer positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority affirmative vote, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee officer roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
==Operating Model==&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
==Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Chair&lt;br /&gt;
#Vice-Chair&lt;br /&gt;
#Secretary&lt;br /&gt;
#Treasurer&lt;br /&gt;
&lt;br /&gt;
Note: Only Voting Members may serve as Committee Officers&lt;br /&gt;
&lt;br /&gt;
==Sub-Committee Officers==&lt;br /&gt;
&lt;br /&gt;
#Volunteer Coordinator&lt;br /&gt;
#Media Relations&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230831</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230831"/>
				<updated>2017-06-20T21:35:03Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Added membership types and governance link.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=Membership=&lt;br /&gt;
&lt;br /&gt;
==Membership Types==&lt;br /&gt;
&lt;br /&gt;
===Voting===&lt;br /&gt;
&lt;br /&gt;
Voting Members are members of OWASP who have formally joined the WIA Committee.  Voting Members are allowed to vote on Committee business and are allowed to serve in one of the five leadership positions of the Committee.&lt;br /&gt;
&lt;br /&gt;
In order to become a Voting Member, you must first become a Participating Member and participate for three months, become an OWASP member in good standing, and obtain a written endorsement from a current Voting Member or an OWASP Board of Director.  Once all three criteria are met, you must formally request to join as a Voting Member to the WIA List.  The Voting Members then vote via the WIA list, and if you receive a majority, you are then made a Voting Member. &lt;br /&gt;
&lt;br /&gt;
Voting Members have an obligation to maintain participation and to reaffirm their commitment every six months (the Secretary will send an email every six months to affirm commitment, replying &amp;quot;no&amp;quot; or not replying will result in removal).&lt;br /&gt;
&lt;br /&gt;
===Participating===&lt;br /&gt;
&lt;br /&gt;
Participating Members are anyone that is interested in volunteering time to the WIA Committee or sub-committees.  Participating Members are able to participate in all activities, with the exception of voting and serving in one of the five Committee leadership roles.&lt;br /&gt;
&lt;br /&gt;
In order to become a Participating member, you must express your volunteering commitment to the Secretary, who will then add you to the Membership List.  Participating Members can withdraw their commitment at any time by notifying the Secretary.  Participating Members do not need to be OWASP members.&lt;br /&gt;
&lt;br /&gt;
==Membership List==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/spreadsheets/d/1T7I0FJwfrI-h3XY-iL5URNNeZ-A0wxPTV0nfQHrSZVs/edit?usp=sharing Membership List]&lt;br /&gt;
&lt;br /&gt;
=GOVERNANCE=&lt;br /&gt;
&lt;br /&gt;
WIA is a formal Committee of OWASP.  WIA is governed by the rules set forth in the [https://www.owasp.org/index.php/Governance/OWASP_Committees OWASP Committees 2.0 Operational Model].&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230830</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230830"/>
				<updated>2017-06-20T21:10:56Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: added back in headertabs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230829</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=230829"/>
				<updated>2017-06-20T20:55:06Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Removed and/or updated aged content for the Committee&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
&lt;br /&gt;
==Women in Application Security Committee==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally.&lt;br /&gt;
&lt;br /&gt;
The Women in AppSec program is for anyone who believes that diversity is important to the success of the organization, as well as for women looking to learn more about AppSec or who want to make career connections with like-minded colleagues.  This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=WIA PURPOSE AND SCOPE=&lt;br /&gt;
&lt;br /&gt;
==Purpose==&lt;br /&gt;
&lt;br /&gt;
The purpose of Women in AppSec (WIA) Committee is to develop leadership, promote active membership and participation, and contributions by women in application security professional communities, globally and locally. &lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The scope for OWASP WIA Committee falls into the following areas:&lt;br /&gt;
&lt;br /&gt;
# Attract women to OWASP, as active members, contributors and leaders.&lt;br /&gt;
# Offer opportunities for women to become engaged in AppSec and related professional communities.&lt;br /&gt;
# Provide inclusive targeted application security programs for all women learners.&lt;br /&gt;
# Provide inclusive training and mentorship for all interested OWASP women.&lt;br /&gt;
# Provide financial support to OWASP women members through scholarships, sponsorships, and grant making.&lt;br /&gt;
# Pursue fundraising, advancement and development to secure financial support for OWASP WIA activities..&lt;br /&gt;
# Integrate WIA track and related activities into OWASP events at all levels.&lt;br /&gt;
# Cultivate women for community leadership, speakers for conferences, thought leadership, learning leaders, and local chapter events.&lt;br /&gt;
# Collaborate with other committees and initiatives as needs present.&lt;br /&gt;
# Collaborate with local OWASP Chapters and Global OWASP leadership, including but not limited to offering advisory support to local and global OWASP leadership for WIA advancement and collaboratively building pro-WIA OWASP communities.&lt;br /&gt;
# Develop other special projects and events designed to further the purpose of WIA.&lt;br /&gt;
&lt;br /&gt;
=FIND US=&lt;br /&gt;
&lt;br /&gt;
==Email List==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_usa_women_in_security WIA List and Archive]&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owaspwia @OWASPWIA]&lt;br /&gt;
&lt;br /&gt;
==Slack Channel==&lt;br /&gt;
&lt;br /&gt;
[https://owasp.slack.com/messages/C2NUH1J5B/ WIA Slack Channel]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=PREVIOUS WIA ACTIVITIES=&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
The Women in AppSec (WIA) program is for all OWASP members who believe that diversity is important to the success of an organization, as well as for women who want to make career connections with like-minded colleagues. We encourage you to attend our session on Thursday at 3:30pm in Room F, featuring the founders of InfoSec Girls, Apoorva Giri and Shruthi Kamath.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We also invite you to join us for our networking and “Birds of a Feather” sessions on on Thursday in WIA meeting room . Stop by anytime between 10:00am and 3:30pm to meet other members and learn more about the WIA program. You can also suggest a discussion topic on the sign-up at the room entrance.  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sponsorship opportunities for commercial organizations and OWASP chapters are also available.&lt;br /&gt;
&lt;br /&gt;
'''AppSec USA 2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
Currently, there is an effort to plan activities for AppSec USA 2015. Volunteers are eagerly sought to support the program at AppSec USA! We are especially excited to invite the founders of the '''InfoSec Girls''' initiative to the AppSec USA 2015 conference. To bring InfoSec Girls to AppSec USA, we need to raise $7500. We are very close to our goal and know that with the support of the OWASP community, we can easily get there! Donations above and beyond our goal will be used for future WIA programs around the world. &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''Donate now:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AppSec EU 2015 ==&lt;br /&gt;
During AppSec EU there was a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hoped to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions was be open to all so we can help build support for the women around us. Learn more here: [http://2015.appsec.eu/women-in-application-security/ http://2015.appsec.eu/women-in-application-security]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
During this panel session we discussed what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
'''Workshop'''&amp;lt;br&amp;gt;&lt;br /&gt;
During the workshop we introduced female attendees of the conference to what a career in App Sec can involve. We discussed application security and the many career paths available. We hope to build relationships that may lead to a mentoring program for these women.&lt;br /&gt;
&lt;br /&gt;
== AppSec USA 2013 ==&lt;br /&gt;
Learn more about the program here: http://2013.appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/index.html &lt;br /&gt;
&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
'''Carrie Schaper, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Nancy Lornston, 2013 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tara Wilson, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chandni Bhowmik, 2011 Winner'''&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=223066</id>
		<title>OWASP Board History</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=223066"/>
				<updated>2016-11-04T19:36:37Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Updating for 2017 election results&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The data here was compiled from the OWASP Foundation Tax Returns and official election results.  Asterisked years were taken from other sources and may be incomplete.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2004 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2005 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2006 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2007 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2008 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2009 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2010 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2011 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2012 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2013 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2014 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2015 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2016 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2017 BoD&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| Jeff Williams &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #CC2EFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| David Anderson&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #00FF80; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FA5858; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FE9A2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|- style=&amp;quot;background: #01DF01; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #8181F7; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #F7FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
|- style=&amp;quot;background: #0066FF; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FFCC00; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #339933; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
|- style=&amp;quot;background: #CC6600; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
|- style=&amp;quot;background: #FFC744; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Johanna Curiel&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=202824</id>
		<title>OWASP Board History</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=202824"/>
				<updated>2015-10-28T21:36:32Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Updated with 2016 Election results&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The data here was compiled from the OWASP Foundation Tax Returns and official election results.  Asterisked years were taken from other sources and may be incomplete.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2004 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2005 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2006 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2007 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2008 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2009 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2010 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2011 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2012 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2013 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2014 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2015 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2016 BoD&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| Jeff Williams &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #CC2EFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| David Anderson&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #00FF80; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FA5858; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FE9A2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|- style=&amp;quot;background: #01DF01; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #8181F7; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #F7FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
|- style=&amp;quot;background: #0066FF; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
|- style=&amp;quot;background: #FFCC00; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #339933; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
|- style=&amp;quot;background: #CC6600; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=198847</id>
		<title>OWASP Board History</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=198847"/>
				<updated>2015-08-11T08:42:43Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The data here was compiled from the OWASP Foundation Tax Returns and official election results.  Asterisked years were taken from other sources and may be incomplete.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2004 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2005 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2006 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2007 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2008 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2009 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2010 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2011 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2012 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2013 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2014 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2015 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2016 BoD&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| Jeff Williams &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #CC2EFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| David Anderson&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #00FF80; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FA5858; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FE9A2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #FFFFFF; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #01DF01; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #8181F7; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #F7FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| style=&amp;quot;background: #FFFFFF; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #0066FF; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
|- style=&amp;quot;background: #FFCC00; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #339933; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| style=&amp;quot;background: #FFFFFF; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #CC6600; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| style=&amp;quot;background: #FFFFFF; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=197856</id>
		<title>OWASP Board History</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=197856"/>
				<updated>2015-07-24T12:04:40Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Added 2016 in anticipation of the upcoming elections&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The data here was compiled from the OWASP Foundation Tax Returns and official election results.  Asterisked years were taken from other sources and may be incomplete.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2004 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2005 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2006 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2007 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2008 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2009 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2010 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2011 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2012 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2013 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2014 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2015 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2016 BoD&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| Jeff Williams &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #CC2EFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| David Anderson&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #00FF80; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FA5858; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FE9A2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #01DF01; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #8181F7; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #F7FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| style=&amp;quot;background: #FFFFFF; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #0066FF; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
|- style=&amp;quot;background: #FFCC00; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| style=&amp;quot;background: #FFFFFF; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #339933; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| style=&amp;quot;background: #FFFFFF; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #CC6600; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| style=&amp;quot;background: #FFFFFF; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=184725</id>
		<title>OWASP Board History</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=184725"/>
				<updated>2014-11-04T20:27:08Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Updated with 2015 BoD election results&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The data here was compiled from the OWASP Foundation Tax Returns and official election results.  Asterisked years were taken from other sources and may be incomplete.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2004 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2005 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2006 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2007 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2008 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2009 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2010 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2011 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2012 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2013 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2014 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2015 BoD&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| Jeff Williams &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #CC2EFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| David Anderson&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #00FF80; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FA5858; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FE9A2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #01DF01; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #8181F7; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #F7FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
|- style=&amp;quot;background: #0066FF; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
|- style=&amp;quot;background: #FFCC00; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
|- style=&amp;quot;background: #339933; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
|- style=&amp;quot;background: #CC6600; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Andrew van der Stock&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matthew Konda&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=182189</id>
		<title>OWASP Board History</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=182189"/>
				<updated>2014-09-12T07:14:12Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Getting ready for 2015 elections&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The data here was compiled from the OWASP Foundation Tax Returns and official election results.  Asterisked years were taken from other sources and may be incomplete.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2004 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2005 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2006 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2007 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2008 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2009 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2010 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2011 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2012 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2013 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2014 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2015 BoD&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| Jeff Williams &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #CC2EFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| David Anderson&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #00FF80; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FA5858; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FE9A2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #01DF01; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #8181F7; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #F7FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
|- style=&amp;quot;background: #0066FF; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| style=&amp;quot;background: #A4A4A4; color: black&amp;quot; | Candidate&lt;br /&gt;
|- style=&amp;quot;background: #FFCC00; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
|- style=&amp;quot;background: #339933; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
|- style=&amp;quot;background: #CC6600; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
|- style=&amp;quot;background: #A4A4A4; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Candidate&lt;br /&gt;
|- style=&amp;quot;background: #A4A4A4; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Candidate&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Transparency_Policy&amp;diff=177368</id>
		<title>Transparency Policy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Transparency_Policy&amp;diff=177368"/>
				<updated>2014-06-21T12:50:57Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Added addtional exclusions, note about complying with court orders&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Transparency Policy=&lt;br /&gt;
&lt;br /&gt;
==Policy Status==&lt;br /&gt;
&amp;lt;blockquote&amp;gt;'''WORKING DRAFT''' - this is a working draft being discussed on the [https://lists.owasp.org/mailman/listinfo/governance Governance List].  When completed, this will be presented to the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#2014_Global_Board_Members Board of Directors] for adoption.  Once accepted, this notice will be updated to reflect the the policy is binding on members.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==&amp;quot;O&amp;quot; is for Open: An introduction==&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;O&amp;quot; in OWASP is for &amp;quot;Open&amp;quot; - Section 1.03 of the [https://www.owasp.org/images/9/92/April2014OWASPFoundationByLaws.pdf OWASP Bylaws] defines the value &amp;quot;Open&amp;quot; to mean:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt; &amp;quot;Everything at OWASP is radically transparent from our finances to our code.&amp;quot;&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This raises the question, what does &amp;quot;radically transparent&amp;quot; mean?  Is there anything that can't be disclosed to the membership and/or public?&lt;br /&gt;
&lt;br /&gt;
This policy defines what is not allowed to be disclosed, either because of legal, ethical, or privacy obligations.&lt;br /&gt;
&lt;br /&gt;
== Radical Transparency ==&lt;br /&gt;
&lt;br /&gt;
OWASP is committed to making its governance, processes, and finances transparent, so that any outside observer can determine how decisions were considered and ultimately agreed upon.  When and where possible, OWASP must provide transparency.&lt;br /&gt;
&lt;br /&gt;
There are, however, certain areas where transparency cannot be provided, either because it violates a law, is unethical, or goes against the expectation of privacy.  The rule of thumb for transparency is to default all information as public, or if it must be restricted, the mandate is to make it as widely available as possible.&lt;br /&gt;
&lt;br /&gt;
Levels of information restriction:&lt;br /&gt;
# Public (most open)&lt;br /&gt;
# All OWASP members, staff, Board of Directors&lt;br /&gt;
# Some members and/or staff, Board of Directors&lt;br /&gt;
# Executive Director, Compliance Officer, Board of Directors&lt;br /&gt;
# Executive Director, Board of Directors&lt;br /&gt;
# Board of Directors (most restricted)&lt;br /&gt;
&lt;br /&gt;
== Exclusions from Radical Transparency ==&lt;br /&gt;
&lt;br /&gt;
In this section, an attempt is made to enumerate situations where OWASP cannot provide transparency.  Note that this list is not exhaustive, and future situations where there is a question about transparency should use this as a guide.&lt;br /&gt;
&lt;br /&gt;
While OWASP excludes the following information from public disclosure, OWASP will disclose information when compelled by a legally-binding court order.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Exclusion&lt;br /&gt;
! Notes&lt;br /&gt;
|- &lt;br /&gt;
| Staff records as maintained for Human Resources purposes&lt;br /&gt;
| Restricted to just staff and BoD members with a legitimate need to access the records.  Must never be disclosed unless permission is given from the staff member that the record pertains to.&lt;br /&gt;
|- &lt;br /&gt;
| Information pertaining to legal action, or pending legal action&lt;br /&gt;
| Restricted to just staff and BoD members with a legitimate need to access information.  Must never be disclosed publicly either before, during, or after the legal action unless permitted by legal counsel.&lt;br /&gt;
|- &lt;br /&gt;
| Information pertaining to a whistlerblower complaint, ethics complaint, or similar, including the allegation, the investigation, and the outcome.  &lt;br /&gt;
| Restricted to just the Compliance officer, BoD members, Executive Director, and select staff when required.  Must never be disclosed publicly either before, during, or after the processing of the complaint via the [https://www.owasp.org/index.php/Governance/Whistleblower_Policy Whistlerblower policy].  Should the complaint be made public, then the Board of Directors may choose which information, if any, to release based on the situation and the best interest of the organization.&lt;br /&gt;
|-&lt;br /&gt;
| Information covered under a Non-Disclosure Agreement (NDA).  OWASP should strive to avoid NDAs, but when an NDA is required, that information must be protected per the terms of the NDA.  The Board of Directors must always be a party to the NDA, at a minimum.&lt;br /&gt;
| Restricted to just the parties covered by the NDA.&lt;br /&gt;
|-&lt;br /&gt;
| Sensitive data, such as tax ID numbers of individuals, credit card numbers, home addresses, phone numbers, and similar must not be disclosed except as authorized by the owner of the data.&lt;br /&gt;
| Restricted to just staff and/or BoD members with a legitimate need to access the data.&lt;br /&gt;
|-&lt;br /&gt;
| Contents of individual OWASP email accounts.&lt;br /&gt;
| Restricted to the person assigned to the OWASP email account.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Policy Violations ==&lt;br /&gt;
&lt;br /&gt;
All members must comply with this policy, or will be subject to [https://www.owasp.org/index.php/Governance/Whistleblower_Policy disciplinary action], including the possibility of suspension or revocation of membership, exclusion from OWASP events and email lists, or other such action as determined.&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Transparency_Policy&amp;diff=177305</id>
		<title>Transparency Policy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Transparency_Policy&amp;diff=177305"/>
				<updated>2014-06-19T14:47:19Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Added the whistleblower exception&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Transparency Policy=&lt;br /&gt;
&lt;br /&gt;
==Policy Status==&lt;br /&gt;
&amp;lt;blockquote&amp;gt;'''WORKING DRAFT''' - this is a working draft being discussed on the [https://lists.owasp.org/mailman/listinfo/governance Governance List].  When completed, this will be presented to the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#2014_Global_Board_Members Board of Directors] for adoption.  Once accepted, this notice will be updated to reflect the the policy is binding on members.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==&amp;quot;O&amp;quot; is for Open: An introduction==&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;O&amp;quot; in OWASP is for &amp;quot;Open&amp;quot; - Section 1.03 of the [https://www.owasp.org/images/9/92/April2014OWASPFoundationByLaws.pdf OWASP Bylaws] defines the value &amp;quot;Open&amp;quot; to mean:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt; &amp;quot;Everything at OWASP is radically transparent from our finances to our code.&amp;quot;&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This raises the question, what does &amp;quot;radically transparent&amp;quot; mean?  Is there anything that can't be disclosed to the membership and/or public?&lt;br /&gt;
&lt;br /&gt;
This policy defines what is not allowed to be disclosed, either because of legal, ethical, or privacy obligations.&lt;br /&gt;
&lt;br /&gt;
== Radical Transparency ==&lt;br /&gt;
&lt;br /&gt;
OWASP is committed to making its governance, processes, and finances transparent, so that any outside observer can determine how decisions were considered and ultimately agreed upon.  When and where possible, OWASP must provide transparency.&lt;br /&gt;
&lt;br /&gt;
There are, however, certain areas where transparency cannot be provided, either because it violates a law, is unethical, or goes against the expectation of privacy.  The rule of thumb for transparency is to default all information as public, or if it must be restricted, the mandate is to make it as widely available as possible.&lt;br /&gt;
&lt;br /&gt;
Levels of information restriction:&lt;br /&gt;
# Public (most open)&lt;br /&gt;
# All OWASP members, staff, Board of Directors&lt;br /&gt;
# Some members and/or staff, Board of Directors&lt;br /&gt;
# Executive Director, Compliance Officer, Board of Directors&lt;br /&gt;
# Executive Director, Board of Directors&lt;br /&gt;
# Board of Directors (most restricted)&lt;br /&gt;
&lt;br /&gt;
== Exclusions from Radical Transparency ==&lt;br /&gt;
&lt;br /&gt;
In this section, an attempt is made to enumerate situations where OWASP cannot provide transparency.  Note that this list is not exhaustive, and future situations where there is a question about transparency should use this as a guide.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Exclusion&lt;br /&gt;
! Notes&lt;br /&gt;
|- &lt;br /&gt;
| Staff records as maintained for Human Resources purposes&lt;br /&gt;
| Restricted to just staff and BoD members with a legitimate need to access records.  Must never be disclosed unless permission is given from the staff member that the record pertains to.&lt;br /&gt;
|- &lt;br /&gt;
| Information pertaining to legal action, or pending legal action&lt;br /&gt;
| Restricted to just staff and BoD members with a legitimate need to access information.  Must never be disclosed publicly either before, during, or after the legal action unless permitted by legal counsel.&lt;br /&gt;
|- &lt;br /&gt;
| Information pertaining to a whistlerblower complaint, ethics complaint, or similar, including the allegation, the investigation, and the outcome.  &lt;br /&gt;
| Restricted to just the Compliance officer, BoD members, Executive Director, and select staff when required.  Must never be disclosed publicly either before, during, or after the processing of the complaint via the [https://www.owasp.org/index.php/Governance/Whistleblower_Policy Whistlerblower policy].  Should the complaint be made public, then the Board of Directors may choose which information, if any, to release based on the situation and the best interest of the organization.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Policy Violations ==&lt;br /&gt;
&lt;br /&gt;
All members must comply with this policy, or will be subject to [https://www.owasp.org/index.php/Governance/Whistleblower_Policy disciplinary action], including the possibility of suspension or revocation of membership, exclusion from OWASP events and email lists, or other such action as determined.&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Transparency_Policy&amp;diff=177304</id>
		<title>Transparency Policy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Transparency_Policy&amp;diff=177304"/>
				<updated>2014-06-19T14:34:14Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: cleanup of links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Transparency Policy=&lt;br /&gt;
&lt;br /&gt;
==Policy Status==&lt;br /&gt;
&amp;lt;blockquote&amp;gt;'''WORKING DRAFT''' - this is a working draft being discussed on the [https://lists.owasp.org/mailman/listinfo/governance Governance List].  When completed, this will be presented to the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#2014_Global_Board_Members Board of Directors] for adoption.  Once accepted, this notice will be updated to reflect the the policy is binding on members.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==&amp;quot;O&amp;quot; is for Open: An introduction==&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;O&amp;quot; in OWASP is for &amp;quot;Open&amp;quot; - Section 1.03 of the [https://www.owasp.org/images/9/92/April2014OWASPFoundationByLaws.pdf OWASP Bylaws] defines the value &amp;quot;Open&amp;quot; to mean:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt; &amp;quot;Everything at OWASP is radically transparent from our finances to our code.&amp;quot;&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This raises the question, what does &amp;quot;radically transparent&amp;quot; mean?  Is there anything that can't be disclosed to the membership and/or public?&lt;br /&gt;
&lt;br /&gt;
This policy defines what is not allowed to be disclosed, either because of legal, ethical, or privacy obligations.&lt;br /&gt;
&lt;br /&gt;
== Radical Transparency ==&lt;br /&gt;
&lt;br /&gt;
OWASP is committed to making its governance, processes, and finances transparent, so that any outside observer can determine how decisions were considered and ultimately agreed upon.  When and where possible, OWASP must provide transparency.&lt;br /&gt;
&lt;br /&gt;
There are, however, certain areas where transparency cannot be provided, either because it violates a law, is unethical, or goes against the expectation of privacy.  The rule of thumb for transparency is to default all information as public, or if it must be restricted, the mandate is to make it as widely available as possible.&lt;br /&gt;
&lt;br /&gt;
Levels of information restriction:&lt;br /&gt;
# Public (most open)&lt;br /&gt;
# All OWASP members, staff, Board of Directors&lt;br /&gt;
# Some members and/or staff, Board of Directors&lt;br /&gt;
# Executive Director, Compliance Officer, Board of Directors&lt;br /&gt;
# Executive Director, Board of Directors&lt;br /&gt;
# Board of Directors (most restricted)&lt;br /&gt;
&lt;br /&gt;
== Exclusions from Radical Transparency ==&lt;br /&gt;
&lt;br /&gt;
In this section, an attempt is made to enumerate situations where OWASP cannot provide transparency.  Note that this list is not exhaustive, and future situations where there is a question about transparency should use this as a guide.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Exclusion&lt;br /&gt;
! Notes&lt;br /&gt;
|- &lt;br /&gt;
| Staff records as maintained for Human Resources purposes&lt;br /&gt;
| Restricted to just staff and BoD members with a legitimate need to access records.  Must never be disclosed unless permission is given from the staff member that the record pertains to.&lt;br /&gt;
|- &lt;br /&gt;
| Information pertaining to legal action, or pending legal action&lt;br /&gt;
| Restricted to just staff and BoD members with a legitimate need to access information.  Must never be disclosed publicly either before, during, or after the legal action unless permitted by legal counsel.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Policy Violations ==&lt;br /&gt;
&lt;br /&gt;
All members must comply with this policy, or will be subject to [https://www.owasp.org/index.php/Governance/Whistleblower_Policy disciplinary action], including the possibility of suspension or revocation of membership, exclusion from OWASP events and email lists, or other such action as determined.&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Transparency_Policy&amp;diff=177302</id>
		<title>Transparency Policy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Transparency_Policy&amp;diff=177302"/>
				<updated>2014-06-19T14:32:45Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: minor rewording of the policy violations section based on a suggestion from Josh Sokol&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Transparency Policy=&lt;br /&gt;
&lt;br /&gt;
==Policy Status==&lt;br /&gt;
&amp;lt;blockquote&amp;gt;'''WORKING DRAFT''' - this is a working draft being discussed on the [[https://lists.owasp.org/mailman/listinfo/governance Governance List]].  When completed, this will be presented to the [[https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#2014_Global_Board_Members Board of Directors]] for adoption.  Once accepted, this notice will be updated to reflect the the policy is binding on members.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==&amp;quot;O&amp;quot; is for Open: An introduction==&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;O&amp;quot; in OWASP is for &amp;quot;Open&amp;quot; - Section 1.03 of the [[https://www.owasp.org/images/9/92/April2014OWASPFoundationByLaws.pdf OWASP Bylaws]] defines the value &amp;quot;Open&amp;quot; to mean:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt; &amp;quot;Everything at OWASP is radically transparent from our finances to our code.&amp;quot;&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This raises the question, what does &amp;quot;radically transparent&amp;quot; mean?  Is there anything that can't be disclosed to the membership and/or public?&lt;br /&gt;
&lt;br /&gt;
This policy defines what is not allowed to be disclosed, either because of legal, ethical, or privacy obligations.&lt;br /&gt;
&lt;br /&gt;
== Radical Transparency ==&lt;br /&gt;
&lt;br /&gt;
OWASP is committed to making its governance, processes, and finances transparent, so that any outside observer can determine how decisions were considered and ultimately agreed upon.  When and where possible, OWASP must provide transparency.&lt;br /&gt;
&lt;br /&gt;
There are, however, certain areas where transparency cannot be provided, either because it violates a law, is unethical, or goes against the expectation of privacy.  The rule of thumb for transparency is to default all information as public, or if it must be restricted, the mandate is to make it as widely available as possible.&lt;br /&gt;
&lt;br /&gt;
Levels of information restriction:&lt;br /&gt;
# Public (most open)&lt;br /&gt;
# All OWASP members, staff, Board of Directors&lt;br /&gt;
# Some members and/or staff, Board of Directors&lt;br /&gt;
# Executive Director, Compliance Officer, Board of Directors&lt;br /&gt;
# Executive Director, Board of Directors&lt;br /&gt;
# Board of Directors (most restricted)&lt;br /&gt;
&lt;br /&gt;
== Exclusions from Radical Transparency ==&lt;br /&gt;
&lt;br /&gt;
In this section, an attempt is made to enumerate situations where OWASP cannot provide transparency.  Note that this list is not exhaustive, and future situations where there is a question about transparency should use this as a guide.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Exclusion&lt;br /&gt;
! Notes&lt;br /&gt;
|- &lt;br /&gt;
| Staff records as maintained for Human Resources purposes&lt;br /&gt;
| Restricted to just staff and BoD members with a legitimate need to access records.  Must never be disclosed unless permission is given from the staff member that the record pertains to.&lt;br /&gt;
|- &lt;br /&gt;
| Information pertaining to legal action, or pending legal action&lt;br /&gt;
| Restricted to just staff and BoD members with a legitimate need to access information.  Must never be disclosed publicly either before, during, or after the legal action unless permitted by legal counsel.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Policy Violations ==&lt;br /&gt;
&lt;br /&gt;
All members must comply with this policy, or will be subject to [[https://www.owasp.org/index.php/Governance/Whistleblower_Policy disciplinary action]], including the possibility of suspension or revocation of membership, exclusion from OWASP events and email lists, or other such action as determined.&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Transparency_Policy&amp;diff=177296</id>
		<title>Transparency Policy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Transparency_Policy&amp;diff=177296"/>
				<updated>2014-06-19T10:08:17Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Created page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Transparency Policy=&lt;br /&gt;
&lt;br /&gt;
==Policy Status==&lt;br /&gt;
&amp;lt;blockquote&amp;gt;'''WORKING DRAFT''' - this is a working draft being discussed on the [[https://lists.owasp.org/mailman/listinfo/governance Governance List]].  When completed, this will be presented to the [[https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#2014_Global_Board_Members Board of Directors]] for adoption.  Once accepted, this notice will be updated to reflect the the policy is binding on members.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==&amp;quot;O&amp;quot; is for Open: An introduction==&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;O&amp;quot; in OWASP is for &amp;quot;Open&amp;quot; - Section 1.03 of the [[https://www.owasp.org/images/9/92/April2014OWASPFoundationByLaws.pdf OWASP Bylaws]] defines the value &amp;quot;Open&amp;quot; to mean:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt; &amp;quot;Everything at OWASP is radically transparent from our finances to our code.&amp;quot;&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This raises the question, what does &amp;quot;radically transparent&amp;quot; mean?  Is there anything that can't be disclosed to the membership and/or public?&lt;br /&gt;
&lt;br /&gt;
This policy defines what is not allowed to be disclosed, either because of legal, ethical, or privacy obligations.&lt;br /&gt;
&lt;br /&gt;
== Radical Transparency ==&lt;br /&gt;
&lt;br /&gt;
OWASP is committed to making its governance, processes, and finances transparent, so that any outside observer can determine how decisions were considered and ultimately agreed upon.  When and where possible, OWASP must provide transparency.&lt;br /&gt;
&lt;br /&gt;
There are, however, certain areas where transparency cannot be provided, either because it violates a law, is unethical, or goes against the expectation of privacy.  The rule of thumb for transparency is to default all information as public, or if it must be restricted, the mandate is to make it as widely available as possible.&lt;br /&gt;
&lt;br /&gt;
Levels of information restriction:&lt;br /&gt;
# Public (most open)&lt;br /&gt;
# All OWASP members, staff, Board of Directors&lt;br /&gt;
# Some members and/or staff, Board of Directors&lt;br /&gt;
# Executive Director, Compliance Officer, Board of Directors&lt;br /&gt;
# Executive Director, Board of Directors&lt;br /&gt;
# Board of Directors (most restricted)&lt;br /&gt;
&lt;br /&gt;
== Exclusions from Radical Transparency ==&lt;br /&gt;
&lt;br /&gt;
In this section, an attempt is made to enumerate situations where OWASP cannot provide transparency.  Note that this list is not exhaustive, and future situations where there is a question about transparency should use this as a guide.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Exclusion&lt;br /&gt;
! Notes&lt;br /&gt;
|- &lt;br /&gt;
| Staff records as maintained for Human Resources purposes&lt;br /&gt;
| Restricted to just staff and BoD members with a legitimate need to access records.  Must never be disclosed unless permission is given from the staff member that the record pertains to.&lt;br /&gt;
|- &lt;br /&gt;
| Information pertaining to legal action, or pending legal action&lt;br /&gt;
| Restricted to just staff and BoD members with a legitimate need to access information.  Must never be disclosed publicly either before, during, or after the legal action unless permitted by legal counsel.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Policy Violations ==&lt;br /&gt;
&lt;br /&gt;
All members must comply with this policy, or will be subject to [[https://www.owasp.org/index.php/Governance/Whistleblower_Policy disciplinary action]], including suspension or revocation of membership, and/or exclusion from OWASP events, email lists, or other such action as determined.&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance&amp;diff=177295</id>
		<title>Governance</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance&amp;diff=177295"/>
				<updated>2014-06-19T09:13:40Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: added link to Transparency Policy&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Purpose =&lt;br /&gt;
Describe high level governance and process at OWASP&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
= OWASP Foundation=&lt;br /&gt;
== OWASP Global Board==&lt;br /&gt;
* [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#2013_Global_Board_Members Current OWASP Board]&lt;br /&gt;
* OWASP Elections&lt;br /&gt;
** [https://www.owasp.org/index.php/2013_Board_Elections 2013]&lt;br /&gt;
** [https://www.owasp.org/index.php/Membership/2012_Election 2012]&lt;br /&gt;
** [https://www.owasp.org/index.php/Membership/2011Election 2011]&lt;br /&gt;
* [https://www.owasp.org/index.php/Governance/Board_Orientation Global Board Orientation and On-boarding Process]&lt;br /&gt;
* [https://www.owasp.org/index.php/Governance/Board_Commitment_Agreement Board Orientation Agreement] and [https://www.owasp.org/index.php/Governance/Board_Code_of_Conduct Board Code of Conduct] &lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Board_Meetings Global Board Meetings]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Board_Votes Board Voting Record]&lt;br /&gt;
== OWASP Operations Team==&lt;br /&gt;
* [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Employees_of_the_OWASP_Foundation Current Operations Staff]&lt;br /&gt;
* [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Budgets Foundation Budget]&lt;br /&gt;
* [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project#Tax_Filings OWASP Tax Filings]&lt;br /&gt;
== Policies ==&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Foundation_ByLaws OWASP Foundation By-laws]&lt;br /&gt;
* [https://www.owasp.org/index.php/Governance/Conflict_of_Interest_Policy Conflict of Interest Policy and Annual Conflict Questionnaire]&lt;br /&gt;
* [https://www.owasp.org/index.php/Governance/Whistleblower_Policy Whistleblower and Anti-Retaliation Policy]&lt;br /&gt;
* [https://www.owasp.org/index.php/Governance/Conference_Policies Conference Policies: Anti-Harrassment, Privacy Policy, OWASP Code of Ethics]&lt;br /&gt;
* [https://www.owasp.org/index.php/Governance/ConflictHandling Handling a Conflict]&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_brand_usage_rules Brand Usage Rules]&lt;br /&gt;
*[https://www.owasp.org/index.php/Governance/Social_Media_Policy Social Media Policy]&lt;br /&gt;
* [https://www.owasp.org/index.php/Governance/Signatory_Policy Foundation Signatory Policy]&lt;br /&gt;
* [https://owasp.org/index.php/Governance/CorporateSponsorship Corporate Membership Model]&lt;br /&gt;
* [https://docs.google.com/document/d/1ADEy8NhgIqi5vyV0JSvOfeIqfIRQSzlOCLCmhEuPAWA/edit?usp=sharing Project Sponsorship Operational Guidelines]&lt;br /&gt;
* [https://www.owasp.org/index.php/Transparency_Policy Transparency Policy: &amp;quot;O&amp;quot; is for Open]&lt;br /&gt;
&lt;br /&gt;
* Funding and Spending Guidelines:&lt;br /&gt;
** [https://docs.google.com/a/owasp.org/document/d/1yX68nS20qj7QNTcDkKCD3hSfFEbJaBKjoWjc2wF_aLA/edit OWASP Grant Funding and Spending Policy]&lt;br /&gt;
** [https://www.owasp.org/index.php/Funding - Community, Initiative, and Outreach Funding (replaces and expands OWASP on the Move)]&lt;br /&gt;
** [https://docs.google.com/document/d/15XuKIezpBpNH4BQYwSJ8i9125ga8IBE0IpvkO14RukI/edit?usp=sharing Project Spending Guidelines]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Request for Comments &amp;amp; Policies under Review==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Discussing Governance at OWASP =&lt;br /&gt;
We have an open mailing list for discussing the overall topic of governance at OWASP.&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/governance https://lists.owasp.org/mailman/listinfo/governance]&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Habla&amp;diff=173154</id>
		<title>Habla</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Habla&amp;diff=173154"/>
				<updated>2014-04-21T23:54:02Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: PoC&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP Top Ten is important, especially A8.&lt;br /&gt;
&lt;br /&gt;
Read more about [https://www.owasp.org/index.php?title=Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF)&amp;amp;setlang=es A8 aka CSRF]&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Board&amp;diff=162915</id>
		<title>Board</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Board&amp;diff=162915"/>
				<updated>2013-11-09T11:48:13Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: added link to historical board members&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
= About the OWASP Board =&lt;br /&gt;
&lt;br /&gt;
== Current OWASP Global Board ==&lt;br /&gt;
&lt;br /&gt;
[[User:MichaelCoates|Michael Coates]] - OWASP Chair - San Fransisco, CA USA&lt;br /&gt;
&amp;lt;br/&amp;gt;michael.coates(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
[[User:Sdeleersnyder|Sebastien Deleersnyder]] - Vice Chair - Belgium&lt;br /&gt;
&amp;lt;br/&amp;gt;seba(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
[[User:Wichers|Dave Wichers]] - Treasurer - Maryland, USA&lt;br /&gt;
&amp;lt;br/&amp;gt;dave.wichers(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
[[User:EoinKeary|Eoin Keary]] - Secretary - Dublin, Ireland&lt;br /&gt;
&amp;lt;br/&amp;gt;eoin(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
[[User:Brennan|Tom Brennan]] - Special Projects: New Jersey, USA&lt;br /&gt;
&amp;lt;br/&amp;gt;tom.brennan(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
[[User:Jmanico|Jim Manico]] - Special Projects: Hawaii, USA&lt;br /&gt;
&amp;lt;br/&amp;gt;jim.manico(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
== OWASP Board Elections ==&lt;br /&gt;
=== 2013 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2013_Board_Elections 2013 Board Election]&lt;br /&gt;
=== 2012 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2012_Election 2012 Board Election]&lt;br /&gt;
=== 2011 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2011Election 2011 Board Election]&lt;br /&gt;
=== 2009 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Board_Election_2009 2009 Board Election]&lt;br /&gt;
&lt;br /&gt;
= Agenda for 2013 Meetings =&lt;br /&gt;
&lt;br /&gt;
* Teleconference Information: https://www3.gotomeeting.com/join/942894438&lt;br /&gt;
* 12:00pm - 1:30pm EST&lt;br /&gt;
* [https://www.owasp.org/index.php/International_Toll_Free_Calling_Information International Toll Free Calling Info]&lt;br /&gt;
* [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
* '''Note''' - Beginning with the March 2013 meeting, all board meetings are recorded.&lt;br /&gt;
&lt;br /&gt;
* Meeting Template found [https://www.owasp.org/index.php/Board-Meeting-template here]&lt;br /&gt;
&lt;br /&gt;
== Upcoming 2013 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[November 11, 2013]] - cancelled due to in person meeting on Nov. 22&lt;br /&gt;
&lt;br /&gt;
*[[November 22, 2013]] - In person meeting at AppSec USA - New York, NY&lt;br /&gt;
&lt;br /&gt;
*[[December 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
== Past 2013 Meetings ==&lt;br /&gt;
*[[October 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[September 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[August 12, 2013]] - canceled due to in person meeting on Aug 19&lt;br /&gt;
&lt;br /&gt;
*[[In person meeting at AppSec EU - Hamburg, Germany; August 19-24]]&lt;br /&gt;
&lt;br /&gt;
*[[July 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[June 10, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 31, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 13, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[April 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[March 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[January 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[February 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
= Board Communication and Documentation =&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/0/05/OWASP_Foundation_ByLaws.pdf ByLaws]&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://docs.google.com/a/owasp.org/folder/d/0BxI4iTO_QojvNW9jaXFyWGZwR28/edit Weekly Board/Staff Communication Documents]&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://www.google.com/calendar/embed?src=owasp.org_d1dcflbc5oul9nji1ftc3pjji8@group.calendar.google.com&amp;amp;ctz=Pacific/Honolulu OWASP Board Calendar]&lt;br /&gt;
&lt;br /&gt;
= Archive and Voting History =&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_History Historical Board Members by Year]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_Votes Historical Board Votes]&lt;br /&gt;
&lt;br /&gt;
== Agenda for 2012 Meetings ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation [https://www.owasp.org/images/a/ae/2012ByLawsFINAL.pdf ByLaws]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Global_Committee_Pages Global Committees] &lt;br /&gt;
&lt;br /&gt;
*[[January 9, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 6, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 15, 2012]] &lt;br /&gt;
&lt;br /&gt;
*[[March 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[April 5, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[May 14,2012]]&lt;br /&gt;
&lt;br /&gt;
*[[June 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Aug 13, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Sept 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 8, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 24, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 26, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
*[[Dec 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Dec 27, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
== Agendas for 2011 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[March 7, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[April_4_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[May_2_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[June 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[August 8, 2011]] &lt;br /&gt;
&lt;br /&gt;
*[[September 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 20, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 22, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[October 10, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[November 14, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[December 5, 2011]]&lt;br /&gt;
&lt;br /&gt;
== Minutes for 2011 Meetings ==  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Board_Votes Board Votes Historical]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[[Minutes January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes March 8, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 4, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 2, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VD9ZHEwht9tmM8FKEQ6DBrtmL_gTAhSSnQhiFXYkJ7I/edit?hl=en_US&amp;amp;authkey=CIavkP4B June 6 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VMwYrP6owtZ-SchBxUcWTIF-ITvzUX8PjUkLPwr2ipg/edit?hl=en_US&amp;amp;authkey=CIGTx5sD July 11 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1CLu9aQpS7LdeX87rJ5N9cuJ-RGGVzDWf34l6gdMml7M/edit?hl=en_US&amp;amp;authkey=CI-U5qEP August 8, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1HM32VcvWb0hizD5_mhWMULLaouzuRgA3ZYjODRZwyAs/edit?hl=en_US September 6, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1Y-8tZisUZM5ZKP8AxJqvkiNtFanVFM0m--bMG2PZ3ww/edit October 10, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/13-aHX2pSUXjCP8ivsbls6u1VX1BVSYewyMUH8LI7zpQ/edit November 14, 2011]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agendas for 2010 Meetings ==&lt;br /&gt;
*[[January 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[February 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]] &amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;Postponed until March 9, 2010&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[[April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[May 4, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[August 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[September 8, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[December_6_2010]]&lt;br /&gt;
&lt;br /&gt;
== Minutes of 2010 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[Jan 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Feb 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes_December_6,_2010]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[OWASP Board Meetings January Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings February Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June 09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting July 7, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting August 4, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting September 1, 2009 Agenda]] &lt;br /&gt;
*[[OWASP Board Meeting October 6, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting November 10, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting December 1, 2009 Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Details of 2009 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 01-06-09]]&lt;br /&gt;
* [[OWASP Board Meetings 02-03-09]]&lt;br /&gt;
* [[OWASP Board Meetings 03-10-09]]&lt;br /&gt;
* [[OWASP Board Meetings April 09]]&lt;br /&gt;
* [[OWASP Board Meetings May 09]]&lt;br /&gt;
* [[OWASP Board Meetings June 09]]&lt;br /&gt;
* [[OWASP Board Meeting July 09]]&lt;br /&gt;
* [[OWASP Board Meeting August 09]]&lt;br /&gt;
* [[OWASP Board Meeting September 09]]&lt;br /&gt;
* [[OWASP Board Meeting October 09]]&lt;br /&gt;
* [[OWASP Board Meeting December 09]]&lt;br /&gt;
&lt;br /&gt;
== Agendas for 2008 Meetings ==&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings July Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings August Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings September Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings October Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings December Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Details of 2008 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 2-7-08]]&lt;br /&gt;
* [[OWASP Board Meetings 3-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 5-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 6-3-08]]&lt;br /&gt;
* [[OWASP Board Meetings 8-14-08]]&lt;br /&gt;
* [[OWASP Board Meetings 9-2-08]] &lt;br /&gt;
* [[Owasp Board Meetings 10-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 11-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 12-02-08]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=162912</id>
		<title>OWASP Board History</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Board_History&amp;diff=162912"/>
				<updated>2013-11-09T11:44:01Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: added 2014 election results&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The data here was compiled from the OWASP Foundation Tax Returns and official election results.  Asterisked years were taken from other sources and may be incomplete.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2004 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2005 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2006 BoD*&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2007 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2008 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2009 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2010 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2011 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2012 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2013 BoD&lt;br /&gt;
! style=&amp;quot;background: #0A2A29; color: white&amp;quot; | 2014 BoD&lt;br /&gt;
|- style=&amp;quot;background: #64FE2E; color: black&amp;quot;&lt;br /&gt;
| Jeff Williams &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #2ECCFA; color: black&amp;quot;&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| Dave Wichers&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #CC2EFA; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| David Anderson&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #00FF80; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FA5858; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #FE9A2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|- style=&amp;quot;background: #01DF01; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
|- style=&amp;quot;background: #8181F7; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
|- style=&amp;quot;background: #F7FE2E; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
| Michael Coates&lt;br /&gt;
|- style=&amp;quot;background: #A4A4A4; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Jim Manico&lt;br /&gt;
| Jim Manico&lt;br /&gt;
|- style=&amp;quot;background: #FFCC00; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Fabio Cerullo&lt;br /&gt;
|- style=&amp;quot;background: #339933; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Tobias Gondrom&lt;br /&gt;
|- style=&amp;quot;background: #CC6600; color: black&amp;quot;&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| style=&amp;quot;background: #0A2A29; color: black&amp;quot; |&lt;br /&gt;
| Josh Sokol&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Foundation_ByLaws&amp;diff=153221</id>
		<title>OWASP Foundation ByLaws</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Foundation_ByLaws&amp;diff=153221"/>
				<updated>2013-06-08T10:32:06Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: Added original bylaws from 2004&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Current =&lt;br /&gt;
&lt;br /&gt;
== March 3, 2013 ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/0/05/OWASP_Foundation_ByLaws.pdf&lt;br /&gt;
&lt;br /&gt;
= Historical =&lt;br /&gt;
&lt;br /&gt;
== June 23, 2011 ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/d/d6/2011-06-OWASP-BYLAWS.pdf&lt;br /&gt;
&lt;br /&gt;
Unofficial wiki version - [[OWASP Foundation ByLaws Wiki 2011-JUN-23]]&lt;br /&gt;
&lt;br /&gt;
== March 15, 2004 ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/0/0d/OWASP_ByLaws.pdf&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Periodic_Table_of_Vulnerabilities&amp;diff=152689</id>
		<title>OWASP Periodic Table of Vulnerabilities</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Periodic_Table_of_Vulnerabilities&amp;diff=152689"/>
				<updated>2013-06-02T12:05:41Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: fixed minor formatting issue&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
After 25 years of software engineering since the first Internet worm was written to exploit a buffer overflow vulnerability, web developers are still building insecure software. It is time for a new approach. The vast majority of software bug classes can be eliminated by building protections into perimeter technologies, platform infrastructures, and application frameworks before a developer even writes a single line of custom code. By allowing developers to focus on just a small subset of bug classes, training and standards programs can be more targeted and effective so developers can write secure code much more efficiently.&lt;br /&gt;
&lt;br /&gt;
Vulnerabilities and weaknesses from industry-recognized indexes including OWASP Top 10, WASC TCv2, and CWE-25 are analyzed to determine which of the protection options are ideal for solving the software security problem. Where changes to internet standards and protocols are required, alternatives in perimeter, framework, or custom code solutions are also provided until the internet-scale solutions are in place. If a solution can be completely implemented in perimeter or infrastructure technologies, only that solution is provided. Similarly, if any part of the solution can be provided in standard or custom frameworks, that solution is not recommended to be implemented in custom code. The guiding principle is essentially: &amp;quot;implement security controls as far from custom code as possible.&amp;quot; Only if there is no other way to solve a particular security problem is a custom code solution recommended.&lt;br /&gt;
&lt;br /&gt;
== Browsers, Standards, and Protocols ==&lt;br /&gt;
&lt;br /&gt;
The most scalable and effective approach to addressing vulnerability classes is to fix the browsers, standards, and protocols that enable web applications. This approach can sometimes increase security for every application on the internet without changing a single custom application. The amount of industry collaboration required to implement a protocol/standard change can be enormous, but some classes of vulnerabilities simply cannot be addressed without this kind of change (e.g. Clickjacking). A solution at this level is also incredibly powerful: a CSP-based solution to Cross-Site Scripting might allow most application owners to write a simple policy file instead of implementing a costly framework or custom code solution to protect their existing application assets.&lt;br /&gt;
&lt;br /&gt;
== Perimeter Technologies ==&lt;br /&gt;
&lt;br /&gt;
Less scalable, but almost as effective, is to address vulnerabilities in perimeter technologies such as application firewalls, load balancers, geocaching services (e.g. Akamai), and proxies. These technologies can shield vulnerable applications without requiring changes to the applications themselves. While most classes of vulnerability depend heavily on the application code and aren't easily solved by a generic perimeter solution, some are generalizable to the point where a perimeter solution could protect any application behind it before an attack even has a chance to do damage. Anti-automation and protocol validation are especially good solutions for perimeter technologies to address.&lt;br /&gt;
&lt;br /&gt;
== Generic Application Frameworks ==&lt;br /&gt;
&lt;br /&gt;
The next most scalable approach requires upgrading popular application frameworks so they are robust against common attack classes. Common web application platforms such as Java Struts/J2EE, Ruby on Rails, and PHP can theoretically prevent developers from introducing most classes of vulnerability in the first place. However, the current state of the framework industry is more driven by features than by security; any conflict between the two is usually decided in favor of adding features and ease of use, as opposed to difficult-to-use security enhancements. Some frameworks even have built-in vulnerabilities out of the box!&lt;br /&gt;
&lt;br /&gt;
Improvements to application frameworks won't immediately help protect existing applications (though they would make any new applications built on the platform much safer). Many applications currently rely on insecure features of their frameworks that would be eliminated or refactored when the framework is secured. Existing applications would need to follow an upgrade path provided by a &amp;quot;secure&amp;quot; branch of existing frameworks before these solutions could take effect. Many applications don't even use popular frameworks at all, and so could never be helped by improvements to common development platforms.&lt;br /&gt;
&lt;br /&gt;
Generic Framework solution guidelines would, however, help application owners prioritize refactoring efforts for their existing applications in order to make their application code more robust against future development mistakes. This is true whether their applications use popular frameworks or not. Implementing a robust solution to a vulnerability class is much more cost-effective in the long run than training every developer to understand every vulnerability and continuously patching new instances of the vulnerability each time they appear. Cross-Site Scripting is a classic example of the &amp;quot;whac-a-mole vulnerability&amp;quot; that recurrently wastes developer time and attention and could be solved more holistically with a framework wrapper.&lt;br /&gt;
&lt;br /&gt;
== Custom Application Frameworks ==&lt;br /&gt;
&lt;br /&gt;
Some solutions are unique to a specific application and can't be defended by a generic framework solution. For example, a generic framework might ship with a Social Security Number (SSN) validator, but a custom framework solution would be needed for a CustomWidgetItem validator. The SSN data type is well-defined and not unique to a specific application or business, but the CustomWidgetItem is unique to that application and has its own validation rules.&lt;br /&gt;
&lt;br /&gt;
Organizations should still customize application frameworks to support their own application-specific APIs and security controls. Developers can leverage these controls during development instead of having to build the controls in during their daily coding efforts. If developers use a CustomWidgetItem object that has already been validated by framework code, it is much more likely that they will use it safely than if they have to remember to do their own validation each time they use the object.&lt;br /&gt;
&lt;br /&gt;
== Custom Code ==&lt;br /&gt;
If none of the other solution options are possible for a given vulnerability class, developers will be required to protect against that class in every line of code that they write, which does not scale effectively at all. Some classes of attacks, such as Abuse of Functionality, depend completely on the custom code and cannot be abstracted at all into other solution models. &lt;br /&gt;
&lt;br /&gt;
The set of vulnerabilities which must be eliminated in custom code is only a small fraction of the total vulnerability space. By focusing training and testing efforts on just this set of issues, after addressing all other problems in a more scalable manner, developers have a much better chance of building secure applications in the future.&lt;br /&gt;
&lt;br /&gt;
= Periodic Table of Vulnerabilities =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:3px 1px 3px 3px;&amp;quot;| '''VULNERABILITY'''&lt;br /&gt;
! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:3px 3px 1px 1px;&amp;quot;|'''LOCATION OF SECURITY CONTROL'''&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 1px 3px 1px;&amp;quot;|'''Standards'''&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 1px 3px 1px;&amp;quot;|'''Infrastructure/Perimeter'''&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 1px 3px 1px;&amp;quot;|'''Generic Framework'''&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 1px 3px 1px;&amp;quot;|'''Custom Framework'''&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 3px 3px 1px;&amp;quot;|'''Custom Code'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;11%&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Abuse of Functionality|Abuse of Functionality]]'''|| width=&amp;quot;4%&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:3px 1px 2px 1px;&amp;quot; | AF || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 1px 2px 1px;&amp;quot; | || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 1px 2px 1px;&amp;quot; | || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 1px 2px 1px;&amp;quot; | || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 1px 2px 1px;&amp;quot; | || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 3px 2px 1px;&amp;quot; | All features should have defined abuse cases and implemented protections against these abuses.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Application Misconfiguration|Application Misconfiguration]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | AM || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Ensure proper application settings are deployed in configuration file/s. Varies by platform and technology stack.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | ||style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Brute Force (Generic) / Insufficient Anti-automation|Brute Force (Generic) / Insufficient Anti-automation]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Perimeter technologies including geocaching/proxy services must support automatic and/or manual &amp;quot;panic button&amp;quot; anti-automation, enforcing progressive CAPTCHA for unvalidated requests, triggering on excessive 5XX responses, or direct signal from application.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configurable per-user/session request rate limits.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide a common configurable anti-automation framework available to any feature.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Any feature sensitive to high transaction rates should expose configurable rate limits per user or globally per feature.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Brute Force Login|Brute Force Login]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BL || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide capabilities to detect brute force attacks and help enforce lockout or CAPTCHA based on signals from the application.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configurable progressive lockout/delay for failed authentication requests to a single account and detection/alerting for fixed-password variable-username attacks. Provide configurable CAPTCHA enforcement.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Brute Force Session Identifier|Brute Force Session Identifier]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new standard for transmitting session information.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Detect and alert on a configurable rate of session ID cache misses. Provide configurable session lockout if source IP for a session changes during an event. Ensure that token generation is secure, random, and from a sufficiently large key space.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Brute Force Predictable Resource Location/Insecure Indexing|Brute Force Predictable Resource Location/Insecure Indexing]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BP || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Generic anti-automation response should trigger during spikes in 4XX responses.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide a configurable GUID-based obfuscator for sensitive parameter values. Do not expose administrative interfaces on the same path as user interfaces.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Require authentication wherever possible. Create independent interfaces for administrative access and enforce stricter authentication rules.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Buffer Overflow|Buffer Overflow]]'''|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BO || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Defend infrastructure from known exploit signatures (e.g. CodeRed) and alert/block parameter anomalies.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Build on a memory-managed code platform or otherwise prohibit direct memory management.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Clickjacking|Clickjacking]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | CJ || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Browser vendors should standardize on CSP directives to support safe framing options for framed sites.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Support configurable options for setting X-Frame-Options header and automatically embedding framebusting code in HTML/Script/CSS for older user agents that do not support XFO.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Content Spoofing|Content Spoofing]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | CS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide a new response status code for &amp;quot;File not found, but show custom 404 content body AND replace the URL displayed in the title bar because the current requested URL will confuse users&amp;quot;.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | If the framework supports user-supplied content, such content must be clearly marked as such in the display context.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Cookie Theft/Session Hijacking|Cookie Theft/Session Hijacking]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | CT || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new standard for transmitting session information to replace cookies.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Terminate/regenerate session if the session token is transmitted insecurely. Help enforce cookie/session management rules.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Enforce Secure and HttpOnly flags for all cookies. Alert user and deauthorize oldest session when multiple simultaneous login is detected. Terminate session if User-Agent string or other client fingerprinting changes. Terminate session if user acceses login page.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Cross-Site Scripting (XSS)|Cross-Site Scripting (XSS)]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Browser vendors and standards bodies should agree on markup for elements to contain dynamic content (e.g. Flash, JavaScript, HTML, etc.) inline without allowing the dynamic content to perform malicious actions such as navigating the parent window, reading or writing data across trust boundaries, or other undesirable behaviors as determined by the owner of the containing page.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Automatically sanitize any dynamic content before writing it into HTML, XML, or other documents that might be rendered by user agents that execute active content. If dynamic content must include dangerous elements, provide APIs which filter and sanitize potentially dangerous attributes of these elements. Exceptions and attribute configurations should be described by a policy file instead of hard-coded into the framework itself or into function calls. || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Cross-Site Scripting (XSS) - DOM-Based|Cross-Site Scripting (XSS) - DOM-Based]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XD || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | &amp;quot;Web 2.0&amp;quot; frameworks must expose an API for page creation/modification that does not use document.write/ln or allow dynamic data to be injected into innerHTML or similar DOM element attributes.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Cross-Site Request Forgery|Cross-Site Request Forgery]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Change default browser behavior to look for policy file for cross-domain writes instead of &amp;quot;default allow&amp;quot;, transitioning through CSP framework.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Automatically generate and check tokens for all POST requests by default, with configuration-based exclusion list. Disallow state changes via GET requests, enforcing RFC.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Denial of Service (Application Based)|Denial of Service (Application Based)]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | DA || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | See Brute Force (Generic)|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Profile resource-dependent transactions and build transaction queues and alerting when queues reach thresholds. Enforce transaction-based rate limits.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Denial of Service (Connection Based)|Denial of Service (Connection Based)]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | DS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Recognize and dynamically adapt to deliberately slowed connection attempts by dropping slower connections during a detected event. The perimeter should protect itself and the Web server from saturation by slow connections.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Directory Indexing|Directory Indexing]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | DI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Disable directory listings in the web- or application-server configuration by default.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Fingerprinting|Fingerprinting]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | FP || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Infrastructure should not leak any information which can be used to identify the platform or infrastructure technology. Perimeter technologies should strip all such information from outgoing responses.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | URL structure should not reveal the underlying technology. Default content should be removed when possible. Tools that assist development or debugging should not be hosted or accessible.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Format String|Format String]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | FS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Alert and/or block on known format string signatures.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Prohibit access to vulnerable APIs and provide safe wrappers of those APIs instead.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - HTTP Request/Response Smuggling|HTTP Request/Response Smuggling]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | HS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Tighten RFC standards to describe precise behavior for malformed request/response data. Shame non-conforming implementations into compliance. Increase SSL adoption to prevent proxy tampering.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Enforce strict parity match between requests and responses, discarding extraneous Content-Length headers and canonicalizing requests/responses.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - HTTP Response Splitting|HTTP Response Splitting]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | HR || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Automatically URL-encode CRLF characters in dynamic data before writing to HTTP response headers.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - HTTP Request Splitting|HTTP Request Splitting]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | HQ || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Tighten RFC standards to describe precise behavior for malformed requests. Shame non-conforming implementations into compliance. Increase SSL adoption to prevent proxy poisoning.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Enforce strict canonicalization on all incoming HTTP requests.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Implicit Logout|Implicit Logout]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IG || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new standard for handling sessions. Define CSP or other standard for triggering a logout flow when user browses away from a site. At least destroy session cookies.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Detect when a user browses away from the site and automatically log the user out of the application.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Improper Filesystem Permissions|Improper Filesystem Permissions]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Ensure that proper file and directory permissions are applied. Enforce stricter default permissions.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Improper Input Handling|Improper Input Handling]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | II || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide canonicalization and positive validation APIs for common data types, with configurable rules to reject or sanitize bad data.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide canonicalization and positive validation APIs for custom data types, strictly enforcing business rules, with configurable rules to reject or sanitize bad data.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Never use primitives in custom code.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Improper Output Handling|Improper Output Handling]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IH || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide context-sensitive encoders for all common data types in all output contexts, ensuring no custom code can write directly to output.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide context-sensitive encoders for all custom data types in all output contexts, ensuring no custom code can write directly to output.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Information Leakage|Information Leakage]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IL || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Alert, block, or sanitize classified data in responses. Automatically scrub HTML, JavaScript, CSS, and other data formats of comment data and stack traces. Configure platform to return generic error codes by default and log locally. || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide common error-handling framework and APIs which take two error messages as parameters: one to be displayed to the user and one to be written to logs. Provide configurable content expiration/caching interface; default to no-cache, no-store.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Don't leak information via error parity mismatches.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Authentication/Authorization|Insufficient Authentication/Authorization]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IA || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configuration-based authentication and authorization platform.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Apply least-privilege principle to all transactions, requiring authentication and authorization where applicable.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Data Protection|Insufficient Data Protection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | ID || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide a configuration-based suite of encryption utilities for all data security needs including HMAC, symmetric, password hash, and asymmetric encryption requirements.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Password Recovery|Insufficient Password Recovery]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IR || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide generic credential recovery with configurable &amp;quot;secret question&amp;quot; and multi-factor side-channel authentication functionality (e.g. SMS, email, etc.).|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Process Validation|Insufficient Process Validation]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IP || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Require state validation rules to be specified for multi-step flows.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Enforce state validation for asynchronous transactions.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Session Expiration|Insufficient Session Expiration]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new standard for instructing the browser about session timeouts and how to handle them.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide and enforce configurable absolute and inactivity-based session timeouts.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Transport Layer Protection|Insufficient Transport Layer Protection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IT || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Fix DNS and browser technologies so that the intent of domain owners can be more strictly followed.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Enforce Strict Transport Security and redirect any HTTP request to HTTPS.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Integer Overflow/Underflow|Integer Overflow/Underflow]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IO || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe wrappers for primitive numeric types.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Never use primitives without strict checking for underflow/overflow conditions.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - LDAP Injection|LDAP Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | LI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for LDAP communication which properly encode dynamic data.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Mail Command Injection|Mail Command Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | MI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for SMTP and IMAP interaction that properly encode dynamic data.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Null Byte Injection|Null Byte Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | NB || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Alert and/or block on known null byte attacks.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries that automatically encode dynamic data in any context which uses null bytes as control characters.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - OS Commanding|OS Commanding]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | OC || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Build safe wrappers for system calls which prevent dynamic data from changing the intended meaning of the call.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Path Traversal|Path Traversal]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | PT || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Canonicalize URLs and prevent directory access outside the web root.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for accessing the file system which canonicalize path references and enforce proper access control.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Race Conditions|Race Conditions]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | RC || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Prevent singletons from instantiating class-scope objects. Provide transaction integrity for task queues.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Remote File Inclusion|Remote File Inclusion]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | RF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a standard for safe inclusion of 3rd-party code and content which enforces namespace separation and mediates namespace/DOM access.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide proxy library to sanitize/sandbox third-party code and content for safe inclusion (e.g. Caja).|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Routing Detour|Routing Detour]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | RD || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configuration-based whitelist for WS Routing destinations.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Server Misconfiguration|Server Misconfiguration]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SM || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Ensure proper application settings are deployed in configuration file/s. Provide secure default settings.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Session Fixation|Session Fixation]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Do not start sessions with user-provided tokens and rotate session IDs periodically during longer sessions. Reissue new tokens automatically whenever the privilege level of the user changes.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - SOAP Array Abuse, XML Attribute Blowup, XML Entity Expansion|SOAP Array Abuse, XML Attribute Blowup, XML Entity Expansion]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SA || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Perform schema validation of XML structure on incoming requests.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - SSI Injection|SSI Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Do not support SSI with dynamic file names.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - SQL Injection|SQL Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for communicating with SQL servers which enforce parameterized query patterns.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Do not create queries with dynamic data in stored procedures.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - URL Redirector Abuse|URL Redirector Abuse]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | UR || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configurable white list for redirection URLs in 3XX responses, Refresh headers, and JavaScript redirects.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Weak Authentication Methods|Weak HTTP Authentication Methods]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | WA || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new, safe standard for HTTP-based authentication. || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Reject HTTP Basic Auth, NTLM, and Digest Authentication requests. Block or proxy inline 3rd-party content.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Block or proxy inline 3rd-party content.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - XML External Entities|XML External Entities]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XE || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Disable External Entities within the XML parser. Enforce strict, static, internal DTDs.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - XML Injection|XML Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for constructing XML documents which automatically encode dynamic data.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 3px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - XPath/XQuery Injection|XPath/XQuery Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 3px 1px;&amp;quot; | XP || style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | Provide safe libraries for constructing XPath queries with dynamic data. Provide safe libraries for XQuery construction which parameterize query values.|| style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 3px 1px;&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Release Formats =&lt;br /&gt;
&lt;br /&gt;
* [[Media:Periodic Table Infographic.pdf|Compressed view]] - One-pager that highlights the vulnerability classes that developers will still have to worry about at the top, with &amp;quot;solved&amp;quot; vulnerabilities ordered toward the bottom.&lt;br /&gt;
* Infographic - Cartoony, visually-appealing storyboard introduction of the project, its goals, and high-level approach.&lt;br /&gt;
* [[OWASP Periodic Table of Vulnerabilities#Periodic Table of Vulnerabilities|Working View/Summary]] - Working view summarizes solutions in respective columns for quick reference but doesn't provide details. May link to detailed sections.&lt;br /&gt;
* Solution Detail (see linked issues on summary view) - Detailed view combines references, detailed solution designs, discussion/controversy detail, and other relevant information for each solution recommendation. The detail view does NOT explain what each vulnerability/weakness is - it only references existing vulnerability descriptions from other projects (e.g. OWASP Top 10, WASC TCv2, CWE, etc.). A short summary of root cause(s) is included, but only to the level of depth required to suggest all of the solution design elements that need to be addressed.&lt;br /&gt;
* Solution Checklist - Summary of solutions grouped by target (e.g. perimeter or framework) so that maintainers of standards, frameworks, and perimeter technologies can view the solutions required for their areas ONLY. May require templating to generate list automatically, or short summaries in place of detailed descriptions.&lt;br /&gt;
* Periodic Table View - Vulns/Weaknesses laid out like the table of chemical elements, with solution target along the top and some measure of severity progressing down through the &amp;quot;periods&amp;quot;. Top 10 could be highlighted in some way. Issues may show up in multiple periods. Poster-size so we can get all the relevant information in each &amp;quot;element&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_Periodic_Table_of_Vulnerabilities}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{OWASP Builders}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Periodic_Table_of_Vulnerabilities&amp;diff=152688</id>
		<title>OWASP Periodic Table of Vulnerabilities</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Periodic_Table_of_Vulnerabilities&amp;diff=152688"/>
				<updated>2013-06-02T11:52:53Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: slight edit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
After 25 years of software engineering since the first Internet worm was written to exploit a buffer overflow vulnerability, web developers are still building insecure software. It is time for a new approach. The vast majority of software bug classes can be eliminated by building protections into perimeter technologies, platform infrastructures, and application frameworks before a developer even writes a single line of custom code. By allowing developers to focus on just a small subset of bug classes, training and standards programs can be more targeted and effective so developers can write secure code much more efficiently.&lt;br /&gt;
&lt;br /&gt;
Vulnerabilities and weaknesses from industry-recognized indexes including OWASP Top 10, WASC TCv2, and CWE-25 are analyzed to determine which of the protection options are ideal for solving the software security problem. Where changes to internet standards and protocols are required, alternatives in perimeter, framework, or custom code solutions are also provided until the internet-scale solutions are in place. If a solution can be completely implemented in perimeter or infrastructure technologies, only that solution is provided. Similarly, if any part of the solution can be provided in standard or custom frameworks, that solution is not recommended to be implemented in custom code. The guiding principle is essentially: &amp;quot;implement security controls as far from custom code as possible.&amp;quot; Only if there is no other way to solve a particular security problem is a custom code solution recommended.&lt;br /&gt;
&lt;br /&gt;
== Browsers, Standards, and Protocols ==&lt;br /&gt;
&lt;br /&gt;
The most scalable and effective approach to addressing vulnerability classes is to fix the browsers, standards, and protocols that enable web applications. This approach can sometimes increase security for every application on the internet without changing a single custom application. The amount of industry collaboration required to implement a protocol/standard change can be enormous, but some classes of vulnerabilities simply cannot be addressed without this kind of change (e.g. Clickjacking). A solution at this level is also incredibly powerful: a CSP-based solution to Cross-Site Scripting might allow most application owners to write a simple policy file instead of implementing a costly framework or custom code solution to protect their existing application assets.&lt;br /&gt;
&lt;br /&gt;
== Perimeter Technologies ==&lt;br /&gt;
&lt;br /&gt;
Less scalable, but almost as effective, is to address vulnerabilities in perimeter technologies such as application firewalls, load balancers, geocaching services (e.g. Akamai), and proxies. These technologies can shield vulnerable applications without requiring changes to the applications themselves. While most classes of vulnerability depend heavily on the application code and aren't easily solved by a generic perimeter solution, some are generalizable to the point where a perimeter solution could protect any application behind it before an attack even has a chance to do damage. Anti-automation and protocol validation are especially good solutions for perimeter technologies to address.&lt;br /&gt;
&lt;br /&gt;
== Generic Application Frameworks ==&lt;br /&gt;
&lt;br /&gt;
The next most scalable approach requires upgrading popular application frameworks so they are robust against common attack classes. Common web application platforms such as Java Struts/J2EE, Ruby on Rails, and PHP can theoretically prevent developers from introducing most classes of vulnerability in the first place. However, the current state of the framework industry is more driven by features than by security; any conflict between the two is usually decided in favor of adding features and ease of use, as opposed to difficult-to-use security enhancements. Some frameworks even have built-in vulnerabilities out of the box!&lt;br /&gt;
&lt;br /&gt;
Improvements to application frameworks won't immediately help protect existing applications (though they would make any new applications built on the platform much safer). Many applications currently rely on insecure features of their frameworks that would be eliminated or refactored when the framework is secured. Existing applications would need to follow an upgrade path provided by a &amp;quot;secure&amp;quot; branch of existing frameworks before these solutions could take effect. Many applications don't even use popular frameworks at all, and so could never be helped by improvements to common development platforms.&lt;br /&gt;
&lt;br /&gt;
Generic Framework solution guidelines would, however, help application owners prioritize refactoring efforts for their existing applications in order to make their application code more robust against future development mistakes. This is true whether their applications use popular frameworks or not. Implementing a robust solution to a vulnerability class is much more cost-effective in the long run than training every developer to understand every vulnerability and continuously patching new instances of the vulnerability each time they appear. Cross-Site Scripting is a classic example of the &amp;quot;whac-a-mole vulnerability&amp;quot; that recurrently wastes developer time and attention and could be solved more holistically with a framework wrapper.&lt;br /&gt;
&lt;br /&gt;
== Custom Application Frameworks ==&lt;br /&gt;
&lt;br /&gt;
Some solutions are unique to a specific application and can't be defended by a generic framework solution. For example, a generic framework might ship with a Social Security Number (SSN) validator, but a custom framework solution would be needed for a CustomWidgetItem validator. The SSN data type is well-defined and not unique to a specific application or business, but the CustomWidgetItem is unique to that application and has its own validation rules.&lt;br /&gt;
&lt;br /&gt;
Organizations should still customize application frameworks to support their own application-specific APIs and security controls. Developers can leverage these controls during development instead of having to build the controls in during their daily coding efforts. If developers use a CustomWidgetItem object that has already been validated by framework code, it is much more likely that they will use it safely than if they have to remember to do their own validation each time they use the object.&lt;br /&gt;
&lt;br /&gt;
== Custom Code ==&lt;br /&gt;
If none of the other solution options are possible for a given vulnerability class, developers will be required to protect against that class in every line of code that they write, which does not scale effectively at all. Some classes of attacks, such as Abuse of Functionality, depend completely on the custom code and cannot be abstracted at all into other solution models. &lt;br /&gt;
&lt;br /&gt;
The set of vulnerabilities which must be eliminated in custom code is only a small fraction of the total vulnerability space. By focusing training and testing efforts on just this set of issues, after addressing all other problems in a more scalable manner, developers have a much better chance of building secure applications in the future.&lt;br /&gt;
&lt;br /&gt;
= Periodic Table of Vulnerabilities =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:3px 1px 3px 3px;&amp;quot;| '''VULNERABILITY'''&lt;br /&gt;
! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:3px 3px 1px 1px;&amp;quot;|'''LOCATION OF SECURITY CONTROL'''&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 1px 3px 1px;&amp;quot;|'''Standards'''&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 1px 3px 1px;&amp;quot;|'''Infrastructure/Perimeter'''&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 1px 3px 1px;&amp;quot;|'''Generic Framework'''&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 1px 3px 1px;&amp;quot;|'''Custom Framework'''&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 3px 3px 1px;&amp;quot;|'''Custom Code'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;11%&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Abuse of Functionality|Abuse of Functionality]]'''|| width=&amp;quot;4%&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:3px 1px 2px 1px;&amp;quot; | AF || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 1px 2px 1px;&amp;quot; | || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 1px 2px 1px;&amp;quot; | || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 1px 2px 1px;&amp;quot; | || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 1px 2px 1px;&amp;quot; | || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 3px 2px 1px;&amp;quot; | All features should have defined abuse cases and implemented protections against these abuses.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Application Misconfiguration|Application Misconfiguration]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | AM || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Ensure proper application settings are deployed in configuration file/s. Varies by platform and technology stack.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | ||style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Brute Force (Generic) / Insufficient Anti-automation|Brute Force (Generic) / Insufficient Anti-automation]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Perimeter technologies including geocaching/proxy services must support automatic and/or manual &amp;quot;panic button&amp;quot; anti-automation, enforcing progressive CAPTCHA for unvalidated requests, triggering on excessive 5XX responses, or direct signal from application.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configurable per-user/session request rate limits.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide a common configurable anti-automation framework available to any feature.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Any feature sensitive to high transaction rates should expose configurable rate limits per user or globally per feature.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Brute Force Login|Brute Force Login]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BL || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide capabilities to detect brute force attacks and help enforce lockout or CAPTCHA based on signals from the application.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configurable progressive lockout/delay for failed authentication requests to a single account and detection/alerting for fixed-password variable-username attacks. Provide configurable CAPTCHA enforcement.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Brute Force Session Identifier|Brute Force Session Identifier]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new standard for transmitting session information.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Detect and alert on a configurable rate of session ID cache misses. Provide configurable session lockout if source IP for a session changes during an event. Ensure that token generation is secure, random, and from a sufficiently large key space.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Brute Force Predictable Resource Location/Insecure Indexing|Brute Force Predictable Resource Location/Insecure Indexing]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BP || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Generic anti-automation response should trigger during spikes in 4XX responses.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide a configurable GUID-based obfuscator for sensitive parameter values. Do not expose administrative interfaces on the same path as user interfaces.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Require authentication wherever possible. Create independent interfaces for administrative access and enforce stricter authentication rules.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Buffer Overflow|Buffer Overflow]]'''|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BO || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Defend infrastructure from known exploit signatures (e.g. CodeRed) and alert/block parameter anomalies.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Build on a memory-managed code platform or otherwise prohibit direct memory management.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Clickjacking|Clickjacking]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | CJ || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Browser vendors should standardize on CSP directives to support safe framing options for framed sites.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Support configurable options for setting X-Frame-Options header and automatically embedding framebusting code in HTML/Script/CSS for older user agents that do not support XFO.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Content Spoofing|Content Spoofing]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | CS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide a new response status code for &amp;quot;File not found, but show custom 404 content body AND replace the URL displayed in the title bar because the current requested URL will confuse users&amp;quot;.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | If the framework supports user-supplied content, such content must be clearly marked as such in the display context.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Cookie Theft/Session Hijacking|Cookie Theft/Session Hijacking]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | CT || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new standard for transmitting session information to replace cookies.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Terminate/regenerate session if the session token is transmitted insecurely. Help enforce cookie/session management rules.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Enforce Secure and HttpOnly flags for all cookies. Alert user and deauthorize oldest session when multiple simultaneous login is detected. Terminate session if User-Agent string or other client fingerprinting changes. Terminate session if user acceses login page.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Cross-Site Scripting (XSS)|Cross-Site Scripting (XSS)]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Browser vendors and standards bodies should agree on markup for elements to contain dynamic content (e.g. Flash, JavaScript, HTML, etc.) inline without allowing the dynamic content to perform malicious actions such as navigating the parent window, reading or writing data across trust boundaries, or other undesirable behaviors as determined by the owner of the containing page.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Automatically sanitize any dynamic content before writing it into HTML, XML, or other documents that might be rendered by user agents that execute active content. If dynamic content must include dangerous elements, provide APIs which filter and sanitize potentially dangerous attributes of these elements. Exceptions and attribute configurations should be described by a policy file instead of hard-coded into the framework itself or into function calls. || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Cross-Site Scripting (XSS) - DOM-Based|Cross-Site Scripting (XSS) - DOM-Based]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XD || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | &amp;quot;Web 2.0&amp;quot; frameworks must expose an API for page creation/modification that does not use document.write/ln or allow dynamic data to be injected into innerHTML or similar DOM element attributes.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Cross-Site Request Forgery|Cross-Site Request Forgery]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Change default browser behavior to look for policy file for cross-domain writes instead of &amp;quot;default allow&amp;quot;, transitioning through CSP framework.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Automatically generate and check tokens for all POST requests by default, with configuration-based exclusion list. Disallow state changes via GET requests, enforcing RFC.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Denial of Service (Application Based)|Denial of Service (Application Based)]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | DA || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | See Brute Force (Generic)|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Profile resource-dependent transactions and build transaction queues and alerting when queues reach thresholds. Enforce transaction-based rate limits.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Denial of Service (Connection Based)|Denial of Service (Connection Based)]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | DS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Recognize and dynamically adapt to deliberately slowed connection attempts by dropping slower connections during a detected event. The perimeter should protect itself and the Web server from saturation by slow connections.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Directory Indexing|Directory Indexing]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | DI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Disable directory listings in the web- or application-server configuration by default.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Fingerprinting|Fingerprinting]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | FP || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Infrastructure should not leak any information which can be used to identify the platform or infrastructure technology. Perimeter technologies should strip all such information from outgoing responses.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | URL structure should not reveal the underlying technology. Default content should be removed when possible. Tools that assist development or debugging should not be hosted or accessible.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Format String|Format String]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | FS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Alert and/or block on known format string signatures.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Prohibit access to vulnerable APIs and provide safe wrappers of those APIs instead.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - HTTP Request/Response Smuggling|HTTP Request/Response Smuggling]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | HS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Tighten RFC standards to describe precise behavior for malformed request/response data. Shame non-conforming implementations into compliance. Increase SSL adoption to prevent proxy tampering.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Enforce strict parity match between requests and responses, discarding extraneous Content-Length headers and canonicalizing requests/responses.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - HTTP Response Splitting|HTTP Response Splitting]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | HR || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Automatically URL-encode CRLF characters in dynamic data before writing to HTTP response headers.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - HTTP Request Splitting|HTTP Request Splitting]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | HQ || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Tighten RFC standards to describe precise behavior for malformed requests. Shame non-conforming implementations into compliance. Increase SSL adoption to prevent proxy poisoning.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Enforce strict canonicalization on all incoming HTTP requests.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Implicit Logout|Implicit Logout]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IG || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new standard for handling sessions. Define CSP or other standard for triggering a logout flow when user browses away from a site. At least destroy session cookies.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Detect when a user browses away from the site and automatically log the user out of the application.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Improper Filesystem Permissions|Improper Filesystem Permissions]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Ensure that proper file and directory permissions are applied. Enforce stricter default permissions.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Improper Input Handling|Improper Input Handling]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | II || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide canonicalization and positive validation APIs for common data types, with configurable rules to reject or sanitize bad data.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide canonicalization and positive validation APIs for custom data types, strictly enforcing business rules, with configurable rules to reject or sanitize bad data.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Never use primitives in custom code.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Improper Output Handling|Improper Output Handling]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IH || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide context-sensitive encoders for all common data types in all output contexts, ensuring no custom code can write directly to output.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide context-sensitive encoders for all custom data types in all output contexts, ensuring no custom code can write directly to output.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Information Leakage|Information Leakage]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IL || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Alert, block, or sanitize classified data in responses. Automatically scrub HTML, JavaScript, CSS, and other data formats of comment data and stack traces. Configure platform to return generic error codes by default and log locally. || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide common error-handling framework and APIs which take two error messages as parameters: one to be displayed to the user and one to be written to logs. Provide configurable content expiration/caching interface; default to no-cache, no-store.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Don't leak information via error parity mismatches.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Authentication/Authorization|Insufficient Authentication/Authorization]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IA || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configuration-based authentication and authorization platform.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Apply least-privilege principle to all transactions, requiring authentication and authorization where applicable.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Data Protection|Insufficient Data Protection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | ID || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide a configuration-based suite of encryption utilities for all data security needs including HMAC, symmetric, password hash, and asymmetric encryption requirements.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Password Recovery|Insufficient Password Recovery]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IR || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide generic credential recovery with configurable &amp;quot;secret question&amp;quot; and multi-factor side-channel authentication functionality (e.g. SMS, email, etc.).|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Process Validation|Insufficient Process Validation]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IP || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Require state validation rules to be specified for multi-step flows.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Enforce state validation for asynchronous transactions.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Session Expiration|Insufficient Session Expiration]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new standard for instructing the browser about session timeouts and how to handle them.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide and enforce configurable absolute and inactivity-based session timeouts.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Transport Layer Protection|Insufficient Transport Layer Protection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IT || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Fix DNS and browser technologies so that the intent of domain owners can be more strictly followed.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Enforce Strict Transport Security and redirect any HTTP request to HTTPS.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Integer Overflow/Underflow|Integer Overflow/Underflow]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IO || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe wrappers for primitive numeric types.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Never use primitives without strict checking for underflow/overflow conditions.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - LDAP Injection|LDAP Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | LI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for LDAP communication which properly encode dynamic data.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Mail Command Injection|Mail Command Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | MI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for SMTP and IMAP interaction that properly encode dynamic data.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Null Byte Injection|Null Byte Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | NB || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Alert and/or block on known null byte attacks.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries that automatically encode dynamic data in any context which uses null bytes as control characters.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - OS Commanding|OS Commanding]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | OC || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Build safe wrappers for system calls which prevent dynamic data from changing the intended meaning of the call.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Path Traversal|Path Traversal]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | PT || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Canonicalize URLs and prevent directory access outside the web root.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for accessing the file system which canonicalize path references and enforce proper access control.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Race Conditions|Race Conditions]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | RC || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Prevent singletons from instantiating class-scope objects. Provide transaction integrity for task queues.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Remote File Inclusion|Remote File Inclusion]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | RF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a standard for safe inclusion of 3rd-party code and content which enforces namespace separation and mediates namespace/DOM access.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide proxy library to sanitize/sandbox third-party code and content for safe inclusion (e.g. Caja).|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Routing Detour|Routing Detour]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | RD || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configuration-based whitelist for WS Routing destinations.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Server Misconfiguration|Server Misconfiguration]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SM || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Ensure proper application settings are deployed in configuration file/s. Provide secure default settings.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Session Fixation|Session Fixation]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Do not start sessions with user-provided tokens and rotate session IDs periodically during longer sessions. Reissue new tokens automatically whenever the privilege level of the user changes.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - SOAP Array Abuse, XML Attribute Blowup, XML Entity Expansion|SOAP Array Abuse, XML Attribute Blowup, XML Entity Expansion]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SA || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Perform schema validation of XML structure on incoming requests.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - SSI Injection|SSI Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Do not support SSI with dynamic file names.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - SQL Injection|SQL Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for communicating with SQL servers which enforce parameterized query patterns.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Do not create queries with dynamic data in stored procedures.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - URL Redirector Abuse|URL Redirector Abuse]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | UR || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configurable white list for redirection URLs in 3XX responses, Refresh headers, and JavaScript redirects.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Weak Authentication Methods|Weak HTTP Authentication Methods]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | WA || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new, safe standard for HTTP-based authentication. || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Reject HTTP Basic Auth, NTLM, and Digest Authentication requests. Block or proxy inline 3rd-party content.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Block or proxy inline 3rd-party content.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - XML External Entities|XML External Entities]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XE || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Disable External Entities within the XML parser. Enforce strict, static, internal DTDs.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - XML Injection|XML Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for constructing XML documents which automatically encode dynamic data.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 3px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - XPath/XQuery Injection|XPath/XQuery Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 3px 1px;&amp;quot; | XP || style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | Provide safe libraries for constructing XPath queries with dynamic data. Provide safe libraries for XQuery construction which parameterize query values.|| style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 3px 1px;&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Release Formats =&lt;br /&gt;
&lt;br /&gt;
* [[Media:Periodic Table Infographic.pdf|Compressed view]] - One-pager that highlights the vulnerability classes that developers will still have to worry about at the top, with &amp;quot;solved&amp;quot; vulnerabilities ordered toward the bottom.&lt;br /&gt;
* Infographic - Cartoony, visually-appealing storyboard introduction of the project, its goals, and high-level approach.&lt;br /&gt;
* [[OWASP Periodic Table of Vulnerabilities#Periodic Table of Vulnerabilities|Working View/Summary]] - Working view summarizes solutions in respective columns for quick reference but doesn't provide details. May link to detailed sections.&lt;br /&gt;
* Solution Detail (see linked issues on summary view) - Detailed view combines references, detailed solution designs, discussion/controversy detail, and other relevant information for each solution recommendation. The detail view does NOT explain what each vulnerability/weakness is - it only references existing vulnerability descriptions from other projects (e.g. OWASP Top 10, WASC TCv2, CWE, etc.). A short summary of root cause(s) is included, but only to the level of depth required to suggest all of the solution design elements that need to be addressed.&lt;br /&gt;
* Solution Checklist - Summary of solutions grouped by target (e.g. perimeter or framework) so that maintainers of standards, frameworks, and perimeter technologies can view the solutions required for their areas ONLY. May require templating to generate list automatically, or short summaries in place of detailed descriptions.&lt;br /&gt;
* Periodic Table View - Vulns/Weaknesses laid out like the table of chemical elements, with solution target along the top and some measure of severity progressing down through the &amp;quot;periods&amp;quot;. Top 10 could be highlighted in some way. Issues may show up in multiple periods. Poster-size so we can get all the relevant information in each &amp;quot;element&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_Periodic_Table_of_Vulnerabilities}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{OWASP Builders}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Periodic_Table_of_Vulnerabilities&amp;diff=152687</id>
		<title>OWASP Periodic Table of Vulnerabilities</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Periodic_Table_of_Vulnerabilities&amp;diff=152687"/>
				<updated>2013-06-02T11:50:21Z</updated>
		
		<summary type="html">&lt;p&gt;Bil Corry: adjusted formatting of periodic table&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
After 25 years of software engineering since the first Internet worm was written to exploit a buffer overflow vulnerability, web developers are still building insecure software. It is time for a new approach. The vast majority of software bug classes can be eliminated by building protections into perimeter technologies, platform infrastructures, and application frameworks before a developer even writes a single line of custom code. By allowing developers to focus on just a small subset of bug classes, training and standards programs can be more targeted and effective so developers can write secure code much more efficiently.&lt;br /&gt;
&lt;br /&gt;
Vulnerabilities and weaknesses from industry-recognized indexes including OWASP Top 10, WASC TCv2, and CWE-25 are analyzed to determine which of the protection options are ideal for solving the software security problem. Where changes to internet standards and protocols are required, alternatives in perimeter, framework, or custom code solutions are also provided until the internet-scale solutions are in place. If a solution can be completely implemented in perimeter or infrastructure technologies, only that solution is provided. Similarly, if any part of the solution can be provided in standard or custom frameworks, that solution is not recommended to be implemented in custom code. The guiding principle is essentially: &amp;quot;implement security controls as far from custom code as possible.&amp;quot; Only if there is no other way to solve a particular security problem is a custom code solution recommended.&lt;br /&gt;
&lt;br /&gt;
== Browsers, Standards, and Protocols ==&lt;br /&gt;
&lt;br /&gt;
The most scalable and effective approach to addressing vulnerability classes is to fix the browsers, standards, and protocols that enable web applications. This approach can sometimes increase security for every application on the internet without changing a single custom application. The amount of industry collaboration required to implement a protocol/standard change can be enormous, but some classes of vulnerabilities simply cannot be addressed without this kind of change (e.g. Clickjacking). A solution at this level is also incredibly powerful: a CSP-based solution to Cross-Site Scripting might allow most application owners to write a simple policy file instead of implementing a costly framework or custom code solution to protect their existing application assets.&lt;br /&gt;
&lt;br /&gt;
== Perimeter Technologies ==&lt;br /&gt;
&lt;br /&gt;
Less scalable, but almost as effective, is to address vulnerabilities in perimeter technologies such as application firewalls, load balancers, geocaching services (e.g. Akamai), and proxies. These technologies can shield vulnerable applications without requiring changes to the applications themselves. While most classes of vulnerability depend heavily on the application code and aren't easily solved by a generic perimeter solution, some are generalizable to the point where a perimeter solution could protect any application behind it before an attack even has a chance to do damage. Anti-automation and protocol validation are especially good solutions for perimeter technologies to address.&lt;br /&gt;
&lt;br /&gt;
== Generic Application Frameworks ==&lt;br /&gt;
&lt;br /&gt;
The next most scalable approach requires upgrading popular application frameworks so they are robust against common attack classes. Common web application platforms such as Java Struts/J2EE, Ruby on Rails, and PHP can theoretically prevent developers from introducing most classes of vulnerability in the first place. However, the current state of the framework industry is more driven by features than by security; any conflict between the two is usually decided in favor of adding features and ease of use, as opposed to difficult-to-use security enhancements. Some frameworks even have built-in vulnerabilities out of the box!&lt;br /&gt;
&lt;br /&gt;
Improvements to application frameworks won't immediately help protect existing applications (though they would make any new applications built on the platform much safer). Many applications currently rely on insecure features of their frameworks that would be eliminated or refactored when the framework is secured. Existing applications would need to follow an upgrade path provided by a &amp;quot;secure&amp;quot; branch of existing frameworks before these solutions could take effect. Many applications don't even use popular frameworks at all, and so could never be helped by improvements to common development platforms.&lt;br /&gt;
&lt;br /&gt;
Generic Framework solution guidelines would, however, help application owners prioritize refactoring efforts for their existing applications in order to make their application code more robust against future development mistakes. This is true whether their applications use popular frameworks or not. Implementing a robust solution to a vulnerability class is much more cost-effective in the long run than training every developer to understand every vulnerability and continuously patching new instances of the vulnerability each time they appear. Cross-Site Scripting is a classic example of the &amp;quot;whac-a-mole vulnerability&amp;quot; that recurrently wastes developer time and attention and could be solved more holistically with a framework wrapper.&lt;br /&gt;
&lt;br /&gt;
== Custom Application Frameworks ==&lt;br /&gt;
&lt;br /&gt;
Some solutions are unique to a specific application and can't be defended by a generic framework solution. For example, a generic framework might ship with a Social Security Number (SSN) validator, but a custom framework solution would be needed for a CustomWidgetItem validator. The SSN data type is well-defined and not unique to a specific application or business, but the CustomWidgetItem is unique to that application and has its own validation rules.&lt;br /&gt;
&lt;br /&gt;
Organizations should still customize application frameworks to support their own application-specific APIs and security controls. Developers can leverage these controls during development instead of having to build the controls in during their daily coding efforts. If developers use a CustomWidgetItem object that has already been validated by framework code, it is much more likely that they will use it safely than if they have to remember to do their own validation each time they use the object.&lt;br /&gt;
&lt;br /&gt;
== Custom Code ==&lt;br /&gt;
If none of the other solution options are possible for a given vulnerability class, developers will be required to protect against that class in every line of code that they write, which does not scale effectively at all. Some classes of attacks, such as Abuse of Functionality, depend completely on the custom code and cannot be abstracted at all into other solution models. &lt;br /&gt;
&lt;br /&gt;
The set of vulnerabilities which must be eliminated in custom code is only a small fraction of the total vulnerability space. By focusing training and testing efforts on just this set of issues, after addressing all other problems in a more scalable manner, developers have a much better chance of building secure applications in the future.&lt;br /&gt;
&lt;br /&gt;
= Periodic Table of Vulnerabilities =&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:3px 1px 3px 3px;&amp;quot;| '''VULNERABILITY'''&lt;br /&gt;
! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:3px 3px 1px 1px;&amp;quot;|'''LOCATION OF SECURITY CONTROL (most to least ideal)'''&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 1px 3px 1px;&amp;quot;|'''Standards'''&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 1px 3px 1px;&amp;quot;|'''Infrastructure/Perimeter'''&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 1px 3px 1px;&amp;quot;|'''Generic Framework'''&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 1px 3px 1px;&amp;quot;|'''Custom Framework'''&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#D8D8D8; border-width:1px 3px 3px 1px;&amp;quot;|'''Custom Code'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;11%&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Abuse of Functionality|Abuse of Functionality]]'''|| width=&amp;quot;4%&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:3px 1px 2px 1px;&amp;quot; | AF || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 1px 2px 1px;&amp;quot; | || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 1px 2px 1px;&amp;quot; | || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 1px 2px 1px;&amp;quot; | || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 1px 2px 1px;&amp;quot; | || width=&amp;quot;17%&amp;quot; style=&amp;quot;border-width:3px 3px 2px 1px;&amp;quot; | All features should have defined abuse cases and implemented protections against these abuses.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Application Misconfiguration|Application Misconfiguration]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | AM || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Ensure proper application settings are deployed in configuration file/s. Varies by platform and technology stack.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | ||style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Brute Force (Generic) / Insufficient Anti-automation|Brute Force (Generic) / Insufficient Anti-automation]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Perimeter technologies including geocaching/proxy services must support automatic and/or manual &amp;quot;panic button&amp;quot; anti-automation, enforcing progressive CAPTCHA for unvalidated requests, triggering on excessive 5XX responses, or direct signal from application.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configurable per-user/session request rate limits.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide a common configurable anti-automation framework available to any feature.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Any feature sensitive to high transaction rates should expose configurable rate limits per user or globally per feature.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Brute Force Login|Brute Force Login]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BL || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide capabilities to detect brute force attacks and help enforce lockout or CAPTCHA based on signals from the application.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configurable progressive lockout/delay for failed authentication requests to a single account and detection/alerting for fixed-password variable-username attacks. Provide configurable CAPTCHA enforcement.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Brute Force Session Identifier|Brute Force Session Identifier]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new standard for transmitting session information.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Detect and alert on a configurable rate of session ID cache misses. Provide configurable session lockout if source IP for a session changes during an event. Ensure that token generation is secure, random, and from a sufficiently large key space.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Brute Force Predictable Resource Location/Insecure Indexing|Brute Force Predictable Resource Location/Insecure Indexing]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BP || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Generic anti-automation response should trigger during spikes in 4XX responses.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide a configurable GUID-based obfuscator for sensitive parameter values. Do not expose administrative interfaces on the same path as user interfaces.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Require authentication wherever possible. Create independent interfaces for administrative access and enforce stricter authentication rules.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Buffer Overflow|Buffer Overflow]]'''|| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | BO || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Defend infrastructure from known exploit signatures (e.g. CodeRed) and alert/block parameter anomalies.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Build on a memory-managed code platform or otherwise prohibit direct memory management.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Clickjacking|Clickjacking]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | CJ || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Browser vendors should standardize on CSP directives to support safe framing options for framed sites.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Support configurable options for setting X-Frame-Options header and automatically embedding framebusting code in HTML/Script/CSS for older user agents that do not support XFO.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Content Spoofing|Content Spoofing]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | CS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide a new response status code for &amp;quot;File not found, but show custom 404 content body AND replace the URL displayed in the title bar because the current requested URL will confuse users&amp;quot;.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | If the framework supports user-supplied content, such content must be clearly marked as such in the display context.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Cookie Theft/Session Hijacking|Cookie Theft/Session Hijacking]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | CT || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new standard for transmitting session information to replace cookies.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Terminate/regenerate session if the session token is transmitted insecurely. Help enforce cookie/session management rules.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Enforce Secure and HttpOnly flags for all cookies. Alert user and deauthorize oldest session when multiple simultaneous login is detected. Terminate session if User-Agent string or other client fingerprinting changes. Terminate session if user acceses login page.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Cross-Site Scripting (XSS)|Cross-Site Scripting (XSS)]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Browser vendors and standards bodies should agree on markup for elements to contain dynamic content (e.g. Flash, JavaScript, HTML, etc.) inline without allowing the dynamic content to perform malicious actions such as navigating the parent window, reading or writing data across trust boundaries, or other undesirable behaviors as determined by the owner of the containing page.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Automatically sanitize any dynamic content before writing it into HTML, XML, or other documents that might be rendered by user agents that execute active content. If dynamic content must include dangerous elements, provide APIs which filter and sanitize potentially dangerous attributes of these elements. Exceptions and attribute configurations should be described by a policy file instead of hard-coded into the framework itself or into function calls. || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Cross-Site Scripting (XSS) - DOM-Based|Cross-Site Scripting (XSS) - DOM-Based]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XD || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | &amp;quot;Web 2.0&amp;quot; frameworks must expose an API for page creation/modification that does not use document.write/ln or allow dynamic data to be injected into innerHTML or similar DOM element attributes.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Cross-Site Request Forgery|Cross-Site Request Forgery]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Change default browser behavior to look for policy file for cross-domain writes instead of &amp;quot;default allow&amp;quot;, transitioning through CSP framework.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Automatically generate and check tokens for all POST requests by default, with configuration-based exclusion list. Disallow state changes via GET requests, enforcing RFC.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Denial of Service (Application Based)|Denial of Service (Application Based)]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | DA || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | See Brute Force (Generic)|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Profile resource-dependent transactions and build transaction queues and alerting when queues reach thresholds. Enforce transaction-based rate limits.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Denial of Service (Connection Based)|Denial of Service (Connection Based)]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | DS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Recognize and dynamically adapt to deliberately slowed connection attempts by dropping slower connections during a detected event. The perimeter should protect itself and the Web server from saturation by slow connections.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Directory Indexing|Directory Indexing]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | DI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Disable directory listings in the web- or application-server configuration by default.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Fingerprinting|Fingerprinting]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | FP || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Infrastructure should not leak any information which can be used to identify the platform or infrastructure technology. Perimeter technologies should strip all such information from outgoing responses.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | URL structure should not reveal the underlying technology. Default content should be removed when possible. Tools that assist development or debugging should not be hosted or accessible.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Format String|Format String]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | FS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Alert and/or block on known format string signatures.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Prohibit access to vulnerable APIs and provide safe wrappers of those APIs instead.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - HTTP Request/Response Smuggling|HTTP Request/Response Smuggling]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | HS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Tighten RFC standards to describe precise behavior for malformed request/response data. Shame non-conforming implementations into compliance. Increase SSL adoption to prevent proxy tampering.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Enforce strict parity match between requests and responses, discarding extraneous Content-Length headers and canonicalizing requests/responses.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - HTTP Response Splitting|HTTP Response Splitting]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | HR || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Automatically URL-encode CRLF characters in dynamic data before writing to HTTP response headers.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - HTTP Request Splitting|HTTP Request Splitting]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | HQ || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Tighten RFC standards to describe precise behavior for malformed requests. Shame non-conforming implementations into compliance. Increase SSL adoption to prevent proxy poisoning.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Enforce strict canonicalization on all incoming HTTP requests.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Implicit Logout|Implicit Logout]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IG || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new standard for handling sessions. Define CSP or other standard for triggering a logout flow when user browses away from a site. At least destroy session cookies.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Detect when a user browses away from the site and automatically log the user out of the application.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Improper Filesystem Permissions|Improper Filesystem Permissions]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Ensure that proper file and directory permissions are applied. Enforce stricter default permissions.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Improper Input Handling|Improper Input Handling]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | II || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide canonicalization and positive validation APIs for common data types, with configurable rules to reject or sanitize bad data.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide canonicalization and positive validation APIs for custom data types, strictly enforcing business rules, with configurable rules to reject or sanitize bad data.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Never use primitives in custom code.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Improper Output Handling|Improper Output Handling]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IH || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide context-sensitive encoders for all common data types in all output contexts, ensuring no custom code can write directly to output.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide context-sensitive encoders for all custom data types in all output contexts, ensuring no custom code can write directly to output.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Information Leakage|Information Leakage]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IL || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Alert, block, or sanitize classified data in responses. Automatically scrub HTML, JavaScript, CSS, and other data formats of comment data and stack traces. Configure platform to return generic error codes by default and log locally. || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide common error-handling framework and APIs which take two error messages as parameters: one to be displayed to the user and one to be written to logs. Provide configurable content expiration/caching interface; default to no-cache, no-store.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Don't leak information via error parity mismatches.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Authentication/Authorization|Insufficient Authentication/Authorization]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IA || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configuration-based authentication and authorization platform.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Apply least-privilege principle to all transactions, requiring authentication and authorization where applicable.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Data Protection|Insufficient Data Protection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | ID || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide a configuration-based suite of encryption utilities for all data security needs including HMAC, symmetric, password hash, and asymmetric encryption requirements.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Password Recovery|Insufficient Password Recovery]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IR || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide generic credential recovery with configurable &amp;quot;secret question&amp;quot; and multi-factor side-channel authentication functionality (e.g. SMS, email, etc.).|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Process Validation|Insufficient Process Validation]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IP || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Require state validation rules to be specified for multi-step flows.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Enforce state validation for asynchronous transactions.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Session Expiration|Insufficient Session Expiration]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new standard for instructing the browser about session timeouts and how to handle them.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide and enforce configurable absolute and inactivity-based session timeouts.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Insufficient Transport Layer Protection|Insufficient Transport Layer Protection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IT || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Fix DNS and browser technologies so that the intent of domain owners can be more strictly followed.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Enforce Strict Transport Security and redirect any HTTP request to HTTPS.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Integer Overflow/Underflow|Integer Overflow/Underflow]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | IO || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe wrappers for primitive numeric types.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Never use primitives without strict checking for underflow/overflow conditions.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - LDAP Injection|LDAP Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | LI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for LDAP communication which properly encode dynamic data.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Mail Command Injection|Mail Command Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | MI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for SMTP and IMAP interaction that properly encode dynamic data.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Null Byte Injection|Null Byte Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | NB || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Alert and/or block on known null byte attacks.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries that automatically encode dynamic data in any context which uses null bytes as control characters.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - OS Commanding|OS Commanding]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | OC || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Build safe wrappers for system calls which prevent dynamic data from changing the intended meaning of the call.|| style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Path Traversal|Path Traversal]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | PT || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Canonicalize URLs and prevent directory access outside the web root.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for accessing the file system which canonicalize path references and enforce proper access control.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Race Conditions|Race Conditions]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | RC || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Prevent singletons from instantiating class-scope objects. Provide transaction integrity for task queues.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Remote File Inclusion|Remote File Inclusion]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | RF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a standard for safe inclusion of 3rd-party code and content which enforces namespace separation and mediates namespace/DOM access.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide proxy library to sanitize/sandbox third-party code and content for safe inclusion (e.g. Caja).|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Routing Detour|Routing Detour]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | RD || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configuration-based whitelist for WS Routing destinations.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Server Misconfiguration|Server Misconfiguration]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SM || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Ensure proper application settings are deployed in configuration file/s. Provide secure default settings.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Session Fixation|Session Fixation]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SF || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Do not start sessions with user-provided tokens and rotate session IDs periodically during longer sessions. Reissue new tokens automatically whenever the privilege level of the user changes.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - SOAP Array Abuse, XML Attribute Blowup, XML Entity Expansion|SOAP Array Abuse, XML Attribute Blowup, XML Entity Expansion]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SA || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Perform schema validation of XML structure on incoming requests.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - SSI Injection|SSI Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SS || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Do not support SSI with dynamic file names.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - SQL Injection|SQL Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | SI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for communicating with SQL servers which enforce parameterized query patterns.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | Do not create queries with dynamic data in stored procedures.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - URL Redirector Abuse|URL Redirector Abuse]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | UR || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide configurable white list for redirection URLs in 3XX responses, Refresh headers, and JavaScript redirects.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - Weak Authentication Methods|Weak HTTP Authentication Methods]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | WA || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Define a new, safe standard for HTTP-based authentication. || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Reject HTTP Basic Auth, NTLM, and Digest Authentication requests. Block or proxy inline 3rd-party content.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Block or proxy inline 3rd-party content.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - XML External Entities|XML External Entities]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XE || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Disable External Entities within the XML parser. Enforce strict, static, internal DTDs.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - XML Injection|XML Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 2px 1px;&amp;quot; | XI || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | Provide safe libraries for constructing XML documents which automatically encode dynamic data.|| style=&amp;quot;border-width:2px 1px 2px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 2px 1px;&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#f0f0f0; border-width:2px 1px 3px 3px;&amp;quot; | '''[[OWASP Periodic Table of Vulnerabilities - XPath/XQuery Injection|XPath/XQuery Injection]]''' || align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0; border-width:2px 1px 3px 1px;&amp;quot; | XP || style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | Provide safe libraries for constructing XPath queries with dynamic data. Provide safe libraries for XQuery construction which parameterize query values.|| style=&amp;quot;border-width:2px 1px 3px 1px;&amp;quot; | || style=&amp;quot;border-width:2px 3px 3px 1px;&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Release Formats =&lt;br /&gt;
&lt;br /&gt;
* [[Media:Periodic Table Infographic.pdf|Compressed view]] - One-pager that highlights the vulnerability classes that developers will still have to worry about at the top, with &amp;quot;solved&amp;quot; vulnerabilities ordered toward the bottom.&lt;br /&gt;
* Infographic - Cartoony, visually-appealing storyboard introduction of the project, its goals, and high-level approach.&lt;br /&gt;
* [[OWASP Periodic Table of Vulnerabilities#Periodic Table of Vulnerabilities|Working View/Summary]] - Working view summarizes solutions in respective columns for quick reference but doesn't provide details. May link to detailed sections.&lt;br /&gt;
* Solution Detail (see linked issues on summary view) - Detailed view combines references, detailed solution designs, discussion/controversy detail, and other relevant information for each solution recommendation. The detail view does NOT explain what each vulnerability/weakness is - it only references existing vulnerability descriptions from other projects (e.g. OWASP Top 10, WASC TCv2, CWE, etc.). A short summary of root cause(s) is included, but only to the level of depth required to suggest all of the solution design elements that need to be addressed.&lt;br /&gt;
* Solution Checklist - Summary of solutions grouped by target (e.g. perimeter or framework) so that maintainers of standards, frameworks, and perimeter technologies can view the solutions required for their areas ONLY. May require templating to generate list automatically, or short summaries in place of detailed descriptions.&lt;br /&gt;
* Periodic Table View - Vulns/Weaknesses laid out like the table of chemical elements, with solution target along the top and some measure of severity progressing down through the &amp;quot;periods&amp;quot;. Top 10 could be highlighted in some way. Issues may show up in multiple periods. Poster-size so we can get all the relevant information in each &amp;quot;element&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP_Periodic_Table_of_Vulnerabilities}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{OWASP Builders}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Bil Corry</name></author>	</entry>

	</feed>