<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bzhao</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bzhao"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Bzhao"/>
		<updated>2026-05-06T10:10:14Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=254838</id>
		<title>OWASP Portland 2019 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=254838"/>
				<updated>2019-09-21T01:29:38Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Updated Summit Security logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the fourth year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for the local Portland security community to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with other local infosec and appsec enthusiasts and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
The 4th annual OWASP Portland 2019 Training Day date will be on September 25, 2019. See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;General Registration will open at 9am PST on August 15th.  Tickets cost $25.00 per session.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2019 Training Day? Subscribe to the [https://groups.google.com/a/owasp.org/forum/#!forum/portland-chapter] Portland OWASP mailing list or follow [https://twitter.com/portlandowasp @PortlandOWASP] on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session. Each participant can register for one morning course, one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== AWS API Threat Modeling and Automated Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Cambia ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kendra Ash''&lt;br /&gt;
&lt;br /&gt;
Abstract: If you are a software, DevOps, QA or security engineer and want to learn how to threat model API's in AWS this course is for you. This course will cover the what, why, when, and how of threat modeling applications in your organization. The bulk of this course will be based on the book Threat Modeling by Adam Shostack and will leverage a variant of the Escalation of Privileges card game. Also, I will dive into the approach I have used to gain adoption from engineering teams as a security engineer.&lt;br /&gt;
After gaining an understanding of threat modeling, we will dive into how we can automate security checks for an AWS environment — leveraging the AWS CLI tool to provide quick engineering feedback on ways to improve the security of their infrastructure.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
* Learn the basics of threat modeling&lt;br /&gt;
* Learn ways to gain adoption by your peers&lt;br /&gt;
* How to automate security checks for AWS&lt;br /&gt;
&lt;br /&gt;
Bio: Kendra Ash (@securelykash) is an information security engineer at Vacasa, actively building a security team and program by leveraging guidance from her network and industry standards. Co presenting is Ryan Nixon (@taiidani) an experienced DevOps engineer who deeply cares about the security of all applications. Constantly looking for ways to keep all server and application configurations in order with proper auditing &amp;amp; pipelines.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: no previous knowledge is required, this course is for all levels and jobs (QA, DevOps, Security and Software Engineer)&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by New Relic ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Security Tools and Jenkins Pipeline ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by WebMD ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Sneha Kokil''&lt;br /&gt;
&lt;br /&gt;
Abstract: Modern application development embeds security activities in SDLC, while adopting DevSecOps culture. Security tools are being viewed in the context of continuous integration and automation, which are the key factors in achieving a successful DevSecOps implementation. Integrating security tools in the CI/CD pipelines has become a primary focus of most of the organizations, who are striving to build application security from within. This workshop focuses on getting a good understanding of how some of the open source security tools can be integrated in Jenkins CI/CD pipeline for languages such as Go and Java, along with application container scanning solutions. The workshop will be a hands-on experience, where the participants will write their own pipeline code for integrating security tools. The key takeaways from this workshop will help participants experience how security tooling fits into CI/CD pipelines. It will also help them appreciate the real-world challenges and possible solutions, when integrating security in existing SDLC.&lt;br /&gt;
&lt;br /&gt;
Bio: Sneha Kokil is a senior security consultant at Synopsys. With a master's degree in information security from Northeastern University, along with several years of development and security experience, she specializes in integrating software security toolchains within SDLC processes. She is immensely passionate about DevSecOps and how it helps building security in. Outside of work, she is an avid biography and science fiction reader, a swimmer, and a mother to a wonderful daughter.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Top 10 / Juice Shop Hack Session ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Kraken ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: David Quisenberry''&lt;br /&gt;
&lt;br /&gt;
Abstract: This session is meant for those new to OWASP Top Ten. We will go over the OWASP Top Ten - where it came from, what it’s good for, what are the top ten, etc. And illustrate the concepts in the OWASP Top Ten through another OWASP Flagship Project - The OWASP Juice Shop. This will be a hands on class so everyone can follow along in the Juice Shop to explore the concepts. There will be time at the end for everyone to continue on their vulnerability hunting and a friendly Juice Shop CTF.&lt;br /&gt;
&lt;br /&gt;
Bio: David Quisenberry (@QuizSec) is a backend developer and security champion with Daylight Studio, a local Portland boutique web agency. He serves on the Portland OWASP board as Outreach/Events coordinator and does what he can to up the involvement of established and emerging software developers in security conversations. &lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running docker and burpsuite.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Web Applications and Filesystem Security / Deserialization Attacks ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by ForgeRock ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course starts by exploring the security ramifications of filesystem semantics, security capabilities, and little known-features as they relate to web application development.  Students will practice file upload attacks against a intentionally-vulnerable web application.  Next, the course transitions to deserialization attacks, a recently added OWASP Top 10 item, using multiple practical examples to explain this tricky technical issue. Students will have an opportunity to try deserialization attacks in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
Learning Objectives:&lt;br /&gt;
* To better appreciate the ways modern filesystems work on different platforms and what security impacts may result from certain unintuitive behaviors&lt;br /&gt;
* Explore the many challenges involved in safely processing file uploads&lt;br /&gt;
* Learn about deserialization attacks and how to identify when an application might be at risk&lt;br /&gt;
&lt;br /&gt;
Prerequisites:&lt;br /&gt;
* A basic understanding of web application development is strongly recommended&lt;br /&gt;
* A laptop or workstation for each student (or pair of students)&lt;br /&gt;
* Ability to change proxy settings, install software and run executables on this system&lt;br /&gt;
* Please install VirtualBox 6 in order to run a small virtual machine&lt;br /&gt;
* If using a Mac, consider bringing a real mouse with 2 buttons. VirtualBox doesn't always play well with other pointing devices on Macs&lt;br /&gt;
&lt;br /&gt;
=== Container Security ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Alex Ivkin''&lt;br /&gt;
&lt;br /&gt;
Abstract: &amp;quot;When it comes to container security there are two prevailing schools of thought - either containers are secure by default, so you should not care much, or containers can not be secure in principle, so you should avoid them at all costs. In this training you will go through the real world examples of configuring and running containers in a secure manner. You will get insights into the security of both Windows and Linux containers, container infrastructure, such as container registries and orchestration platforms - docker swarm and kubernetes. We will examine real world vulnerabilities unique to different architectures of containers and how to address them.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
# Building and running docker containers securely&lt;br /&gt;
# Avoiding common pitfalls in docker infrastructure setup (dockerd, docker registry)&lt;br /&gt;
# Navigating security in the container orchestration platforms (docker swarm, kubernetes)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Bio: Alex Ivkin (@alexivkinx) is a director of solutions at Eclypsium, a local Portland security company. Alex specializes in security solution architecture, advisory and implementation of firmware and application security, container orchestration and IAM. Alex presented at numerous &lt;br /&gt;
&lt;br /&gt;
security industry conferences, co-authored the ISACA CSX Professional certification and is an alpine climber.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: &lt;br /&gt;
* Mid to advanced level technical experience&lt;br /&gt;
* Basic experience with running docker containers&lt;br /&gt;
* Laptop with docker for windows setup and tested&lt;br /&gt;
&lt;br /&gt;
=== Intro to Chrome Exploitation ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Security Innovation ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Justin Angra''&lt;br /&gt;
&lt;br /&gt;
Abstract: Over 3 billion browser devices are actively loading arbitrary data served by someone else. What happens if one of those pages contains maliciously crafted JavaScript? Could they capture your passwords, perform UXSS, or worse - execute local code on your machine? In this session, you will get the opportunity to explore the anatomy and play with common vulnerability patterns in the renderer process of Chrome. This will be an interactive class; please bring a laptop with Docker installed.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Amass: Discovering Your Exposure on the Internet ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Daylight Studio ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Jeff Foley ''&lt;br /&gt;
&lt;br /&gt;
Abstract: Today, large organizations deal with the challenge of running their infrastructure across many networks and namespaces due to the use of cloud and hosting services, legacy environments and acquisitions. This can make it difficult to maintain visibility of Internet-facing assets and to track down systems that pose a risk to security. The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery. During this talk, the founder of the project will discuss how OWASP Amass uses OSINT, network reconnaissance, graph databases and information sharing to provide both attackers and defenders better visibility of target organizations.&lt;br /&gt;
&lt;br /&gt;
Bio: Jeff Foley is the Founder and Project Leader of the OWASP Amass project. Mr. Foley has nearly 20 years of experience as an innovator for research &amp;amp; development, software engineering and red team activities in information security. He is a results-driven technical leader known for delivering game-changing research findings to overcome real-world challenges. Jeff serves as the Manager for Vulnerability Engineering at National Grid and is the CTO &amp;amp; Co-founder of ClaritySec, an Upstate New York based information security startup. Prior to this, he was the Director of Research for the Cyber Systems, Weapon Systems &amp;amp; Sensors Operation at Alion Science &amp;amp; Technology. While serving at Northrop Grumman, Jeff built and led the internal penetration testing team and was the program manager for offensive security research &amp;amp; development. Mr. Foley also shares his expertise and experience by supporting several local university information security programs and participating in information security competitions, such as the SUNY Polytechnic Institute Cybersecurity Advisory Board, Mohawk Valley Community College Computer Science Advisory Board and the CNY Hackathon Competition.&lt;br /&gt;
&lt;br /&gt;
=2019 Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Here is a document outlining the opportunities: [https://drive.google.com/file/d/0BydPdSuBlQ4scm1DRmlwMVNyUE11TzdxV1VoZ1lNRTdueTBv/view?usp=sharing Sponsorship-Doc]. Reach out to david.quisenberry@owasp.org to let us know.'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Dasher Technologies logo.png|link=https://www.dasher.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Cambia logo.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Daylight logo.png|link=https://thedaylightstudio.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Kraken logo.png|link=https://www.kraken.com/en-us/features/security]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Summit Security logo 2019.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:WebMD logo.jpg|link=https://www.webmd.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:NetSPI 2019 logo.png|link=https://www.netspi.com/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:Vacasa Logo .png|frameless|375x375px]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2019 Training Day will be on September 25, 2019. &lt;br /&gt;
&lt;br /&gt;
This year for the 2nd time, we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AWS API Threat Modeling and Automated Testing &amp;lt;br&amp;gt;(Kendra Ash)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Security Tools and Jenkins Pipeline &amp;lt;br&amp;gt;(Sneha Kokil)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Top 10 / Juice Shop Hack Session &amp;lt;br&amp;gt;(David Quisenberry)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Web Applications and Filesystem Security / Deserialization Attacks &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Container Security &amp;lt;br&amp;gt;(Alex Ivkin)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Chrome Exploitation &amp;lt;br&amp;gt;(Justin Angra)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Amass: Discovering Your Exposure on the Internet &amp;lt;br&amp;gt;(Jeff Foley)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Interested in teaching a training at Training Day 2019? Contact Portland OWASP via the mailing list or Twitter!&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration will again be via [https://www.eventbrite.com/e/owasp-portland-2019-training-day-tickets-67270573095 EventBrite]&lt;br /&gt;
&lt;br /&gt;
Thank you to the OWASP Foundation and the many sponsors, trainers, volunteers and trainers that have helped make Training Day a success and allow us to continue!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Summit_Security_logo_2019.png&amp;diff=254837</id>
		<title>File:Summit Security logo 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Summit_Security_logo_2019.png&amp;diff=254837"/>
				<updated>2019-09-21T01:29:05Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Summit Security logo 2019&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Summit_2019.png&amp;diff=254836</id>
		<title>File:Summit 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Summit_2019.png&amp;diff=254836"/>
				<updated>2019-09-21T01:28:26Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Bzhao uploaded a new version of File:Summit 2019.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Summit Security Group logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Summit_2019.png&amp;diff=254835</id>
		<title>File:Summit 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Summit_2019.png&amp;diff=254835"/>
				<updated>2019-09-21T01:25:20Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Bzhao uploaded a new version of File:Summit 2019.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Summit Security Group logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Summit_2019.png&amp;diff=254834</id>
		<title>File:Summit 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Summit_2019.png&amp;diff=254834"/>
				<updated>2019-09-21T01:25:04Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Bzhao uploaded a new version of File:Summit 2019.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Summit Security Group logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Summit_2019.png&amp;diff=254833</id>
		<title>File:Summit 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Summit_2019.png&amp;diff=254833"/>
				<updated>2019-09-21T01:22:49Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Bzhao uploaded a new version of File:Summit 2019.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Summit Security Group logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Summit_Icon_2019.png&amp;diff=254832</id>
		<title>File:Summit Icon 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Summit_Icon_2019.png&amp;diff=254832"/>
				<updated>2019-09-20T23:27:59Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Bzhao uploaded a new version of File:Summit Icon 2019.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Summit Logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Summit_Icon_2019.png&amp;diff=254831</id>
		<title>File:Summit Icon 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Summit_Icon_2019.png&amp;diff=254831"/>
				<updated>2019-09-20T23:26:42Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Summit Logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=254828</id>
		<title>OWASP Portland 2019 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=254828"/>
				<updated>2019-09-20T20:18:22Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Summit logo change&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the fourth year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for the local Portland security community to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with other local infosec and appsec enthusiasts and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
The 4th annual OWASP Portland 2019 Training Day date will be on September 25, 2019. See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;General Registration will open at 9am PST on August 15th.  Tickets cost $25.00 per session.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2019 Training Day? Subscribe to the [https://groups.google.com/a/owasp.org/forum/#!forum/portland-chapter] Portland OWASP mailing list or follow [https://twitter.com/portlandowasp @PortlandOWASP] on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session. Each participant can register for one morning course, one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== AWS API Threat Modeling and Automated Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Cambia ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kendra Ash''&lt;br /&gt;
&lt;br /&gt;
Abstract: If you are a software, DevOps, QA or security engineer and want to learn how to threat model API's in AWS this course is for you. This course will cover the what, why, when, and how of threat modeling applications in your organization. The bulk of this course will be based on the book Threat Modeling by Adam Shostack and will leverage a variant of the Escalation of Privileges card game. Also, I will dive into the approach I have used to gain adoption from engineering teams as a security engineer.&lt;br /&gt;
After gaining an understanding of threat modeling, we will dive into how we can automate security checks for an AWS environment — leveraging the AWS CLI tool to provide quick engineering feedback on ways to improve the security of their infrastructure.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
* Learn the basics of threat modeling&lt;br /&gt;
* Learn ways to gain adoption by your peers&lt;br /&gt;
* How to automate security checks for AWS&lt;br /&gt;
&lt;br /&gt;
Bio: Kendra Ash (@securelykash) is an information security engineer at Vacasa, actively building a security team and program by leveraging guidance from her network and industry standards. Co presenting is Ryan Nixon (@taiidani) an experienced DevOps engineer who deeply cares about the security of all applications. Constantly looking for ways to keep all server and application configurations in order with proper auditing &amp;amp; pipelines.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: no previous knowledge is required, this course is for all levels and jobs (QA, DevOps, Security and Software Engineer)&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by New Relic ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Security Tools and Jenkins Pipeline ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by WebMD ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Sneha Kokil''&lt;br /&gt;
&lt;br /&gt;
Abstract: Modern application development embeds security activities in SDLC, while adopting DevSecOps culture. Security tools are being viewed in the context of continuous integration and automation, which are the key factors in achieving a successful DevSecOps implementation. Integrating security tools in the CI/CD pipelines has become a primary focus of most of the organizations, who are striving to build application security from within. This workshop focuses on getting a good understanding of how some of the open source security tools can be integrated in Jenkins CI/CD pipeline for languages such as Go and Java, along with application container scanning solutions. The workshop will be a hands-on experience, where the participants will write their own pipeline code for integrating security tools. The key takeaways from this workshop will help participants experience how security tooling fits into CI/CD pipelines. It will also help them appreciate the real-world challenges and possible solutions, when integrating security in existing SDLC.&lt;br /&gt;
&lt;br /&gt;
Bio: Sneha Kokil is a senior security consultant at Synopsys. With a master's degree in information security from Northeastern University, along with several years of development and security experience, she specializes in integrating software security toolchains within SDLC processes. She is immensely passionate about DevSecOps and how it helps building security in. Outside of work, she is an avid biography and science fiction reader, a swimmer, and a mother to a wonderful daughter.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Top 10 / Juice Shop Hack Session ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Kraken ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: David Quisenberry''&lt;br /&gt;
&lt;br /&gt;
Abstract: This session is meant for those new to OWASP Top Ten. We will go over the OWASP Top Ten - where it came from, what it’s good for, what are the top ten, etc. And illustrate the concepts in the OWASP Top Ten through another OWASP Flagship Project - The OWASP Juice Shop. This will be a hands on class so everyone can follow along in the Juice Shop to explore the concepts. There will be time at the end for everyone to continue on their vulnerability hunting and a friendly Juice Shop CTF.&lt;br /&gt;
&lt;br /&gt;
Bio: David Quisenberry (@QuizSec) is a backend developer and security champion with Daylight Studio, a local Portland boutique web agency. He serves on the Portland OWASP board as Outreach/Events coordinator and does what he can to up the involvement of established and emerging software developers in security conversations. &lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running docker and burpsuite.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Web Applications and Filesystem Security / Deserialization Attacks ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by ForgeRock ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course starts by exploring the security ramifications of filesystem semantics, security capabilities, and little known-features as they relate to web application development.  Students will practice file upload attacks against a intentionally-vulnerable web application.  Next, the course transitions to deserialization attacks, a recently added OWASP Top 10 item, using multiple practical examples to explain this tricky technical issue. Students will have an opportunity to try deserialization attacks in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
Learning Objectives:&lt;br /&gt;
* To better appreciate the ways modern filesystems work on different platforms and what security impacts may result from certain unintuitive behaviors&lt;br /&gt;
* Explore the many challenges involved in safely processing file uploads&lt;br /&gt;
* Learn about deserialization attacks and how to identify when an application might be at risk&lt;br /&gt;
&lt;br /&gt;
Prerequisites:&lt;br /&gt;
* A basic understanding of web application development is strongly recommended&lt;br /&gt;
* A laptop or workstation for each student (or pair of students)&lt;br /&gt;
* Ability to change proxy settings, install software and run executables on this system&lt;br /&gt;
* Please install VirtualBox 6 in order to run a small virtual machine&lt;br /&gt;
* If using a Mac, consider bringing a real mouse with 2 buttons. VirtualBox doesn't always play well with other pointing devices on Macs&lt;br /&gt;
&lt;br /&gt;
=== Container Security ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Alex Ivkin''&lt;br /&gt;
&lt;br /&gt;
Abstract: &amp;quot;When it comes to container security there are two prevailing schools of thought - either containers are secure by default, so you should not care much, or containers can not be secure in principle, so you should avoid them at all costs. In this training you will go through the real world examples of configuring and running containers in a secure manner. You will get insights into the security of both Windows and Linux containers, container infrastructure, such as container registries and orchestration platforms - docker swarm and kubernetes. We will examine real world vulnerabilities unique to different architectures of containers and how to address them.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
# Building and running docker containers securely&lt;br /&gt;
# Avoiding common pitfalls in docker infrastructure setup (dockerd, docker registry)&lt;br /&gt;
# Navigating security in the container orchestration platforms (docker swarm, kubernetes)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Bio: Alex Ivkin (@alexivkinx) is a director of solutions at Eclypsium, a local Portland security company. Alex specializes in security solution architecture, advisory and implementation of firmware and application security, container orchestration and IAM. Alex presented at numerous &lt;br /&gt;
&lt;br /&gt;
security industry conferences, co-authored the ISACA CSX Professional certification and is an alpine climber.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: &lt;br /&gt;
* Mid to advanced level technical experience&lt;br /&gt;
* Basic experience with running docker containers&lt;br /&gt;
* Laptop with docker for windows setup and tested&lt;br /&gt;
&lt;br /&gt;
=== Intro to Chrome Exploitation ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Security Innovation ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Justin Angra''&lt;br /&gt;
&lt;br /&gt;
Abstract: Over 3 billion browser devices are actively loading arbitrary data served by someone else. What happens if one of those pages contains maliciously crafted JavaScript? Could they capture your passwords, perform UXSS, or worse - execute local code on your machine? In this session, you will get the opportunity to explore the anatomy and play with common vulnerability patterns in the renderer process of Chrome. This will be an interactive class; please bring a laptop with Docker installed.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Amass: Discovering Your Exposure on the Internet ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Daylight Studio ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Jeff Foley ''&lt;br /&gt;
&lt;br /&gt;
Abstract: Today, large organizations deal with the challenge of running their infrastructure across many networks and namespaces due to the use of cloud and hosting services, legacy environments and acquisitions. This can make it difficult to maintain visibility of Internet-facing assets and to track down systems that pose a risk to security. The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery. During this talk, the founder of the project will discuss how OWASP Amass uses OSINT, network reconnaissance, graph databases and information sharing to provide both attackers and defenders better visibility of target organizations.&lt;br /&gt;
&lt;br /&gt;
Bio: Jeff Foley is the Founder and Project Leader of the OWASP Amass project. Mr. Foley has nearly 20 years of experience as an innovator for research &amp;amp; development, software engineering and red team activities in information security. He is a results-driven technical leader known for delivering game-changing research findings to overcome real-world challenges. Jeff serves as the Manager for Vulnerability Engineering at National Grid and is the CTO &amp;amp; Co-founder of ClaritySec, an Upstate New York based information security startup. Prior to this, he was the Director of Research for the Cyber Systems, Weapon Systems &amp;amp; Sensors Operation at Alion Science &amp;amp; Technology. While serving at Northrop Grumman, Jeff built and led the internal penetration testing team and was the program manager for offensive security research &amp;amp; development. Mr. Foley also shares his expertise and experience by supporting several local university information security programs and participating in information security competitions, such as the SUNY Polytechnic Institute Cybersecurity Advisory Board, Mohawk Valley Community College Computer Science Advisory Board and the CNY Hackathon Competition.&lt;br /&gt;
&lt;br /&gt;
=2019 Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Here is a document outlining the opportunities: [https://drive.google.com/file/d/0BydPdSuBlQ4scm1DRmlwMVNyUE11TzdxV1VoZ1lNRTdueTBv/view?usp=sharing Sponsorship-Doc]. Reach out to david.quisenberry@owasp.org to let us know.'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Dasher Technologies logo.png|link=https://www.dasher.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Cambia logo.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Daylight logo.png|link=https://thedaylightstudio.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Kraken logo.png|link=https://www.kraken.com/en-us/features/security]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Summit 2019.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:WebMD logo.jpg|link=https://www.webmd.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:NetSPI 2019 logo.png|link=https://www.netspi.com/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:Vacasa Logo .png|frameless|375x375px]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2019 Training Day will be on September 25, 2019. &lt;br /&gt;
&lt;br /&gt;
This year for the 2nd time, we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AWS API Threat Modeling and Automated Testing &amp;lt;br&amp;gt;(Kendra Ash)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Security Tools and Jenkins Pipeline &amp;lt;br&amp;gt;(Sneha Kokil)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Top 10 / Juice Shop Hack Session &amp;lt;br&amp;gt;(David Quisenberry)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Web Applications and Filesystem Security / Deserialization Attacks &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Container Security &amp;lt;br&amp;gt;(Alex Ivkin)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Chrome Exploitation &amp;lt;br&amp;gt;(Justin Angra)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Amass: Discovering Your Exposure on the Internet &amp;lt;br&amp;gt;(Jeff Foley)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Interested in teaching a training at Training Day 2019? Contact Portland OWASP via the mailing list or Twitter!&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration will again be via [https://www.eventbrite.com/e/owasp-portland-2019-training-day-tickets-67270573095 EventBrite]&lt;br /&gt;
&lt;br /&gt;
Thank you to the OWASP Foundation and the many sponsors, trainers, volunteers and trainers that have helped make Training Day a success and allow us to continue!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Summit_2019.png&amp;diff=254827</id>
		<title>File:Summit 2019.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Summit_2019.png&amp;diff=254827"/>
				<updated>2019-09-20T20:17:21Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Summit Security Group logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253751</id>
		<title>OWASP Portland 2019 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253751"/>
				<updated>2019-08-15T18:19:41Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the fourth year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for the local Portland security community to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with other local infosec and appsec enthusiasts and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
The 4th annual OWASP Portland 2019 Training Day date will be on September 25, 2019. See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;General Registration will open at 9am PST on August 15th.  Tickets cost $25.00 per session.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2019 Training Day? Subscribe to the [https://groups.google.com/a/owasp.org/forum/#!forum/portland-chapter] Portland OWASP mailing list or follow [https://twitter.com/portlandowasp @PortlandOWASP] on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session. Each participant can register for one morning course, one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== AWS API Threat Modeling and Automated Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Cambia ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kendra Ash''&lt;br /&gt;
&lt;br /&gt;
Abstract: If you are a software, DevOps, QA or security engineer and want to learn how to threat model API's in AWS this course is for you. This course will cover the what, why, when, and how of threat modeling applications in your organization. The bulk of this course will be based on the book Threat Modeling by Adam Shostack and will leverage a variant of the Escalation of Privileges card game. Also, I will dive into the approach I have used to gain adoption from engineering teams as a security engineer.&lt;br /&gt;
After gaining an understanding of threat modeling, we will dive into how we can automate security checks for an AWS environment — leveraging the AWS CLI tool to provide quick engineering feedback on ways to improve the security of their infrastructure.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
* Learn the basics of threat modeling&lt;br /&gt;
* Learn ways to gain adoption by your peers&lt;br /&gt;
* How to automate security checks for AWS&lt;br /&gt;
&lt;br /&gt;
Bio: Kendra Ash (@securelykash) is an information security engineer at Vacasa, actively building a security team and program by leveraging guidance from her network and industry standards. Co presenting is Ryan Nixon (@taiidani) an experienced DevOps engineer who deeply cares about the security of all applications. Constantly looking for ways to keep all server and application configurations in order with proper auditing &amp;amp; pipelines.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: no previous knowledge is required, this course is for all levels and jobs (QA, DevOps, Security and Software Engineer)&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by New Relic ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Security Tools and Jenkins Pipeline ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by WebMD ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Sneha Kokil''&lt;br /&gt;
&lt;br /&gt;
Abstract: Modern application development embeds security activities in SDLC, while adopting DevSecOps culture. Security tools are being viewed in the context of continuous integration and automation, which are the key factors in achieving a successful DevSecOps implementation. Integrating security tools in the CI/CD pipelines has become a primary focus of most of the organizations, who are striving to build application security from within. This workshop focuses on getting a good understanding of how some of the open source security tools can be integrated in Jenkins CI/CD pipeline for languages such as Go and Java, along with application container scanning solutions. The workshop will be a hands-on experience, where the participants will write their own pipeline code for integrating security tools. The key takeaways from this workshop will help participants experience how security tooling fits into CI/CD pipelines. It will also help them appreciate the real-world challenges and possible solutions, when integrating security in existing SDLC.&lt;br /&gt;
&lt;br /&gt;
Bio: Sneha Kokil is a senior security consultant at Synopsys. With a master's degree in information security from Northeastern University, along with several years of development and security experience, she specializes in integrating software security toolchains within SDLC processes. She is immensely passionate about DevSecOps and how it helps building security in. Outside of work, she is an avid biography and science fiction reader, a swimmer, and a mother to a wonderful daughter.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Top 10 / Juice Shop Hack Session ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Kraken ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: David Quisenberry''&lt;br /&gt;
&lt;br /&gt;
Abstract: This session is meant for those new to OWASP Top Ten. We will go over the OWASP Top Ten - where it came from, what it’s good for, what are the top ten, etc. And illustrate the concepts in the OWASP Top Ten through another OWASP Flagship Project - The OWASP Juice Shop. This will be a hands on class so everyone can follow along in the Juice Shop to explore the concepts. There will be time at the end for everyone to continue on their vulnerability hunting and a friendly Juice Shop CTF.&lt;br /&gt;
&lt;br /&gt;
Bio: David Quisenberry (@dmqpdx16) is a backend developer and security champion with Daylight Studio, a local Portland boutique web agency. He serves on the Portland OWASP board as Outreach/Events coordinator and does what he can to up the involvement of established and emerging software developers in security conversations. &lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running docker and burpsuite.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Web Applications and Filesystem Security / Deserialization Attacks ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by ForgeRock ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course starts by exploring the security ramifications of filesystem semantics, security capabilities, and little known-features as they relate to web application development.  Students will practice file upload attacks against a intentionally-vulnerable web application.  Next, the course transitions to deserialization attacks, a recently added OWASP Top 10 item, using multiple practical examples to explain this tricky technical issue. Students will have an opportunity to try deserialization attacks in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
Learning Objectives:&lt;br /&gt;
* To better appreciate the ways modern filesystems work on different platforms and what security impacts may result from certain unintuitive behaviors&lt;br /&gt;
* Explore the many challenges involved in safely processing file uploads&lt;br /&gt;
* Learn about deserialization attacks and how to identify when an application might be at risk&lt;br /&gt;
&lt;br /&gt;
Prerequisites:&lt;br /&gt;
* A basic understanding of web application development is strongly recommended&lt;br /&gt;
* A laptop or workstation for each student (or pair of students)&lt;br /&gt;
* Ability to change proxy settings, install software and run executables on this system&lt;br /&gt;
* Please install VirtualBox 6 in order to run a small virtual machine&lt;br /&gt;
* If using a Mac, consider bringing a real mouse with 2 buttons. VirtualBox doesn't always play well with other pointing devices on Macs&lt;br /&gt;
&lt;br /&gt;
=== Container Security ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Alex Ivkin''&lt;br /&gt;
&lt;br /&gt;
Abstract: &amp;quot;When it comes to container security there are two prevailing schools of thought - either containers are secure by default, so you should not care much, or containers can not be secure in principle, so you should avoid them at all costs. In this training you will go through the real world examples of configuring and running containers in a secure manner. You will get insights into the security of both Windows and Linux containers, container infrastructure, such as container registries and orchestration platforms - docker swarm and kubernetes. We will examine real world vulnerabilities unique to different architectures of containers and how to address them.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
# Building and running docker containers securely&lt;br /&gt;
# Avoiding common pitfalls in docker infrastructure setup (dockerd, docker registry)&lt;br /&gt;
# Navigating security in the container orchestration platforms (docker swarm, kubernetes)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Bio: Alex Ivkin (@alerxes) is a Director of Solutions at Eclypsium, a local Portland company, specializing in firmware, hardware and supply chain security. Alex has deep implementation experience in a long list of security domains, including cloud, application security and IAM. He co-authored the ISACA CSX Professional certification and is an alpine climber.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: &lt;br /&gt;
* Mid to advanced level technical experience&lt;br /&gt;
* Basic experience with running docker containers&lt;br /&gt;
* Laptop with docker for windows setup and tested&lt;br /&gt;
&lt;br /&gt;
=== Intro to Chrome Exploitation ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Security Innovation ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Justin Angra''&lt;br /&gt;
&lt;br /&gt;
Abstract: Over 3 billion browser devices are actively loading arbitrary data served by someone else. What happens if one of those pages contains maliciously crafted JavaScript? Could they capture your passwords, perform UXSS, or worse - execute local code on your machine? In this session, you will get the opportunity to explore the anatomy and play with common vulnerability patterns in the renderer process of Chrome. This will be an interactive class; please bring a laptop with Docker installed.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Amass: Discovering Your Exposure on the Internet ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Daylight Studio ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Jeff Foley ''&lt;br /&gt;
&lt;br /&gt;
Abstract: Today, large organizations deal with the challenge of running their infrastructure across many networks and namespaces due to the use of cloud and hosting services, legacy environments and acquisitions. This can make it difficult to maintain visibility of Internet-facing assets and to track down systems that pose a risk to security. The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery. During this talk, the founder of the project will discuss how OWASP Amass uses OSINT, network reconnaissance, graph databases and information sharing to provide both attackers and defenders better visibility of target organizations.&lt;br /&gt;
&lt;br /&gt;
Bio: Jeff Foley is the Founder and Project Leader of the OWASP Amass project. Mr. Foley has nearly 20 years of experience as an innovator for research &amp;amp; development, software engineering and red team activities in information security. He is a results-driven technical leader known for delivering game-changing research findings to overcome real-world challenges. Jeff serves as the Manager for Vulnerability Engineering at National Grid and is the CTO &amp;amp; Co-founder of ClaritySec, an Upstate New York based information security startup. Prior to this, he was the Director of Research for the Cyber Systems, Weapon Systems &amp;amp; Sensors Operation at Alion Science &amp;amp; Technology. While serving at Northrop Grumman, Jeff built and led the internal penetration testing team and was the program manager for offensive security research &amp;amp; development. Mr. Foley also shares his expertise and experience by supporting several local university information security programs and participating in information security competitions, such as the SUNY Polytechnic Institute Cybersecurity Advisory Board, Mohawk Valley Community College Computer Science Advisory Board and the CNY Hackathon Competition.&lt;br /&gt;
&lt;br /&gt;
=2019 Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Here is a document outlining the opportunities: [https://drive.google.com/file/d/0BydPdSuBlQ4scm1DRmlwMVNyUE11TzdxV1VoZ1lNRTdueTBv/view?usp=sharing Sponsorship-Doc]. Reach out to david.quisenberry@owasp.org to let us know.'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Dasher Technologies logo.png|link=https://www.dasher.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Cambia logo.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Daylight logo.png|link=https://thedaylightstudio.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Kraken logo.png|link=https://www.kraken.com/en-us/features/security]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:WebMD logo.jpg|link=https://www.webmd.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:NetSPI 2019 logo.png|link=https://www.netspi.com/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:Vacasa Logo .png|frameless|375x375px]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2019 Training Day will be on September 25, 2019. &lt;br /&gt;
&lt;br /&gt;
This year for the 2nd time, we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AWS API Threat Modeling and Automated Testing &amp;lt;br&amp;gt;(Kendra Ash)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Security Tools and Jenkins Pipeline &amp;lt;br&amp;gt;(Sneha Kokil)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Top 10 / Juice Shop Hack Session &amp;lt;br&amp;gt;(David Quisenberry)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Web Applications and Filesystem Security / Deserialization Attacks &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Container Security &amp;lt;br&amp;gt;(Alex Ivkin)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Chrome Exploitation &amp;lt;br&amp;gt;(Justin Angra)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Amass: Discovering Your Exposure on the Internet &amp;lt;br&amp;gt;(Jeff Foley)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Interested in teaching a training at Training Day 2019? Contact Portland OWASP via the mailing list or Twitter!&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration will again be via [https://www.eventbrite.com/e/owasp-portland-2019-training-day-tickets-67270573095 EventBrite]&lt;br /&gt;
&lt;br /&gt;
Thank you to the OWASP Foundation and the many sponsors, trainers, volunteers and trainers that have helped make Training Day a success and allow us to continue!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253750</id>
		<title>OWASP Portland 2019 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253750"/>
				<updated>2019-08-15T17:22:38Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the fourth year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for the local Portland security community to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with other local infosec and appsec enthusiasts and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
The 4th annual OWASP Portland 2019 Training Day date will be on September 25, 2019. See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;General Registration will open at 9am PST on August 15th.  Tickets cost $25.00 per session.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2019 Training Day? Subscribe to the [https://groups.google.com/a/owasp.org/forum/#!forum/portland-chapter] Portland OWASP mailing list or follow [https://twitter.com/portlandowasp @PortlandOWASP] on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session. Each participant can register for one morning course, one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== AWS API Threat Modeling and Automated Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Cambia ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kendra Ash''&lt;br /&gt;
&lt;br /&gt;
Abstract: If you are a software, DevOps, QA or security engineer and want to learn how to threat model API's in AWS this course is for you. This course will cover the what, why, when, and how of threat modeling applications in your organization. The bulk of this course will be based on the book Threat Modeling by Adam Shostack and will leverage a variant of the Escalation of Privileges card game. Also, I will dive into the approach I have used to gain adoption from engineering teams as a security engineer.&lt;br /&gt;
After gaining an understanding of threat modeling, we will dive into how we can automate security checks for an AWS environment — leveraging the AWS CLI tool to provide quick engineering feedback on ways to improve the security of their infrastructure.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
* Learn the basics of threat modeling&lt;br /&gt;
* Learn ways to gain adoption by your peers&lt;br /&gt;
* How to automate security checks for AWS&lt;br /&gt;
&lt;br /&gt;
Bio: Kendra Ash (@securelykash) is an information security engineer at Vacasa, actively building a security team and program by leveraging guidance from her network and industry standards. Co presenting is Ryan Nixon (@taiidani) an experienced DevOps engineer who deeply cares about the security of all applications. Constantly looking for ways to keep all server and application configurations in order with proper auditing &amp;amp; pipelines.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: no previous knowledge is required, this course is for all levels and jobs (QA, DevOps, Security and Software Engineer)&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Security Tools and Jenkins Pipeline ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by WebMD ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Sneha Kokil''&lt;br /&gt;
&lt;br /&gt;
Abstract: Modern application development embeds security activities in SDLC, while adopting DevSecOps culture. Security tools are being viewed in the context of continuous integration and automation, which are the key factors in achieving a successful DevSecOps implementation. Integrating security tools in the CI/CD pipelines has become a primary focus of most of the organizations, who are striving to build application security from within. This workshop focuses on getting a good understanding of how some of the open source security tools can be integrated in Jenkins CI/CD pipeline for languages such as Go and Java, along with application container scanning solutions. The workshop will be a hands-on experience, where the participants will write their own pipeline code for integrating security tools. The key takeaways from this workshop will help participants experience how security tooling fits into CI/CD pipelines. It will also help them appreciate the real-world challenges and possible solutions, when integrating security in existing SDLC.&lt;br /&gt;
&lt;br /&gt;
Bio: Sneha Kokil is a senior security consultant at Synopsys. With a master's degree in information security from Northeastern University, along with several years of development and security experience, she specializes in integrating software security toolchains within SDLC processes. She is immensely passionate about DevSecOps and how it helps building security in. Outside of work, she is an avid biography and science fiction reader, a swimmer, and a mother to a wonderful daughter.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Top 10 / Juice Shop Hack Session ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Kraken ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: David Quisenberry''&lt;br /&gt;
&lt;br /&gt;
Abstract: This session is meant for those new to OWASP Top Ten. We will go over the OWASP Top Ten - where it came from, what it’s good for, what are the top ten, etc. And illustrate the concepts in the OWASP Top Ten through another OWASP Flagship Project - The OWASP Juice Shop. This will be a hands on class so everyone can follow along in the Juice Shop to explore the concepts. There will be time at the end for everyone to continue on their vulnerability hunting and a friendly Juice Shop CTF.&lt;br /&gt;
&lt;br /&gt;
Bio: David Quisenberry (@dmqpdx16) is a backend developer and security champion with Daylight Studio, a local Portland boutique web agency. He serves on the Portland OWASP board as Outreach/Events coordinator and does what he can to up the involvement of established and emerging software developers in security conversations. &lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running docker and burpsuite.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Web Applications and Filesystem Security / Deserialization Attacks ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by ForgeRock ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course starts by exploring the security ramifications of filesystem semantics, security capabilities, and little known-features as they relate to web application development.  Students will practice file upload attacks against a intentionally-vulnerable web application.  Next, the course transitions to deserialization attacks, a recently added OWASP Top 10 item, using multiple practical examples to explain this tricky technical issue. Students will have an opportunity to try deserialization attacks in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
Learning Objectives:&lt;br /&gt;
* To better appreciate the ways modern filesystems work on different platforms and what security impacts may result from certain unintuitive behaviors&lt;br /&gt;
* Explore the many challenges involved in safely processing file uploads&lt;br /&gt;
* Learn about deserialization attacks and how to identify when an application might be at risk&lt;br /&gt;
&lt;br /&gt;
Prerequisites:&lt;br /&gt;
* A basic understanding of web application development is strongly recommended&lt;br /&gt;
* A laptop or workstation for each student (or pair of students)&lt;br /&gt;
* Ability to change proxy settings, install software and run executables on this system&lt;br /&gt;
* Please install VirtualBox 6 in order to run a small virtual machine&lt;br /&gt;
* If using a Mac, consider bringing a real mouse with 2 buttons. VirtualBox doesn't always play well with other pointing devices on Macs&lt;br /&gt;
&lt;br /&gt;
=== Container Security ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Alex Ivkin''&lt;br /&gt;
&lt;br /&gt;
Abstract: &amp;quot;When it comes to container security there are two prevailing schools of thought - either containers are secure by default, so you should not care much, or containers can not be secure in principle, so you should avoid them at all costs. In this training you will go through the real world examples of configuring and running containers in a secure manner. You will get insights into the security of both Windows and Linux containers, container infrastructure, such as container registries and orchestration platforms - docker swarm and kubernetes. We will examine real world vulnerabilities unique to different architectures of containers and how to address them.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
# Building and running docker containers securely&lt;br /&gt;
# Avoiding common pitfalls in docker infrastructure setup (dockerd, docker registry)&lt;br /&gt;
# Navigating security in the container orchestration platforms (docker swarm, kubernetes)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Bio: Alex Ivkin (@alerxes) is a Director of Solutions at Eclypsium, a local Portland company, specializing in firmware, hardware and supply chain security. Alex has deep implementation experience in a long list of security domains, including cloud, application security and IAM. He co-authored the ISACA CSX Professional certification and is an alpine climber.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: &lt;br /&gt;
* Mid to advanced level technical experience&lt;br /&gt;
* Basic experience with running docker containers&lt;br /&gt;
* Laptop with docker for windows setup and tested&lt;br /&gt;
&lt;br /&gt;
=== Intro to Chrome Exploitation ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Security Innovation ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Justin Angra''&lt;br /&gt;
&lt;br /&gt;
Abstract: Over 3 billion browser devices are actively loading arbitrary data served by someone else. What happens if one of those pages contains maliciously crafted JavaScript? Could they capture your passwords, perform UXSS, or worse - execute local code on your machine? In this session, you will get the opportunity to explore the anatomy and play with common vulnerability patterns in the renderer process of Chrome. This will be an interactive class; please bring a laptop with Docker installed.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Amass: Discovering Your Exposure on the Internet ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Daylight Studio ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Jeff Foley ''&lt;br /&gt;
&lt;br /&gt;
Abstract: Today, large organizations deal with the challenge of running their infrastructure across many networks and namespaces due to the use of cloud and hosting services, legacy environments and acquisitions. This can make it difficult to maintain visibility of Internet-facing assets and to track down systems that pose a risk to security. The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery. During this talk, the founder of the project will discuss how OWASP Amass uses OSINT, network reconnaissance, graph databases and information sharing to provide both attackers and defenders better visibility of target organizations.&lt;br /&gt;
&lt;br /&gt;
Bio: Jeff Foley is the Founder and Project Leader of the OWASP Amass project. Mr. Foley has nearly 20 years of experience as an innovator for research &amp;amp; development, software engineering and red team activities in information security. He is a results-driven technical leader known for delivering game-changing research findings to overcome real-world challenges. Jeff serves as the Manager for Vulnerability Engineering at National Grid and is the CTO &amp;amp; Co-founder of ClaritySec, an Upstate New York based information security startup. Prior to this, he was the Director of Research for the Cyber Systems, Weapon Systems &amp;amp; Sensors Operation at Alion Science &amp;amp; Technology. While serving at Northrop Grumman, Jeff built and led the internal penetration testing team and was the program manager for offensive security research &amp;amp; development. Mr. Foley also shares his expertise and experience by supporting several local university information security programs and participating in information security competitions, such as the SUNY Polytechnic Institute Cybersecurity Advisory Board, Mohawk Valley Community College Computer Science Advisory Board and the CNY Hackathon Competition.&lt;br /&gt;
&lt;br /&gt;
=2019 Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Here is a document outlining the opportunities: [https://drive.google.com/file/d/0BydPdSuBlQ4scm1DRmlwMVNyUE11TzdxV1VoZ1lNRTdueTBv/view?usp=sharing Sponsorship-Doc]. Reach out to david.quisenberry@owasp.org to let us know.'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Dasher Technologies logo.png|link=https://www.dasher.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:Cambia logo.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Daylight logo.png|link=https://thedaylightstudio.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Kraken logo.png|link=https://www.kraken.com/en-us/features/security]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:WebMD logo.jpg|link=https://www.webmd.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:NetSPI 2019 logo.png|link=https://www.netspi.com/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:Vacasa Logo .png|frameless|375x375px]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2019 Training Day will be on September 25, 2019. &lt;br /&gt;
&lt;br /&gt;
This year for the 2nd time, we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AWS API Threat Modeling and Automated Testing &amp;lt;br&amp;gt;(Kendra Ash)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Security Tools and Jenkins Pipeline &amp;lt;br&amp;gt;(Sneha Kokil)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Top 10 / Juice Shop Hack Session &amp;lt;br&amp;gt;(David Quisenberry)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Web Applications and Filesystem Security / Deserialization Attacks &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Container Security &amp;lt;br&amp;gt;(Alex Ivkin)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Chrome Exploitation &amp;lt;br&amp;gt;(Justin Angra)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Amass: Discovering Your Exposure on the Internet &amp;lt;br&amp;gt;(Jeff Foley)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Interested in teaching a training at Training Day 2019? Contact Portland OWASP via the mailing list or Twitter!&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration will again be via [https://www.eventbrite.com/e/owasp-portland-2019-training-day-tickets-67270573095 EventBrite]&lt;br /&gt;
&lt;br /&gt;
Thank you to the OWASP Foundation and the many sponsors, trainers, volunteers and trainers that have helped make Training Day a success and allow us to continue!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Bzhao&amp;diff=253749</id>
		<title>User:Bzhao</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Bzhao&amp;diff=253749"/>
				<updated>2019-08-15T17:01:56Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Benny works as an Application Security Engineer and has since grown an interest in cyber security when he took his first computer security course from his undergraduate studies. As for goals, he would like to learn more about application security, offensive security, and container security.&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253653</id>
		<title>OWASP Portland 2019 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253653"/>
				<updated>2019-08-13T06:03:38Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Minor change to Tim's session&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the fourth year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for the local Portland security community to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with other local infosec and appsec enthusiasts and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
The 4th annual OWASP Portland 2019 Training Day date will be on September 25, 2019. See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;General Registration will open at 9am PST on August 15th.  Tickets cost $25.00 per session.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2019 Training Day? Subscribe to the [https://groups.google.com/a/owasp.org/forum/#!forum/portland-chapter] Portland OWASP mailing list or follow [https://twitter.com/portlandowasp @PortlandOWASP] on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session. Each participant can register for one morning course, one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== AWS API Threat Modeling and Automated Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Cambia ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kendra Ash''&lt;br /&gt;
&lt;br /&gt;
Abstract: If you are a software, DevOps, QA or security engineer and want to learn how to threat model API's in AWS this course is for you. This course will cover the what, why, when, and how of threat modeling applications in your organization. The bulk of this course will be based on the book Threat Modeling by Adam Shostack and will leverage a variant of the Escalation of Privileges card game. Also, I will dive into the approach I have used to gain adoption from engineering teams as a security engineer.&lt;br /&gt;
After gaining an understanding of threat modeling, we will dive into how we can automate security checks for an AWS environment — leveraging the AWS CLI tool to provide quick engineering feedback on ways to improve the security of their infrastructure.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
* Learn the basics of threat modeling&lt;br /&gt;
* Learn ways to gain adoption by your peers&lt;br /&gt;
* How to automate security checks for AWS&lt;br /&gt;
&lt;br /&gt;
Bio: Kendra Ash (@securelykash) is an information security engineer at Vacasa, actively building a security team and program by leveraging guidance from her network and industry standards. Co presenting is Ryan Nixon (@taiidani) an experienced DevOps engineer who deeply cares about the security of all applications. Constantly looking for ways to keep all server and application configurations in order with proper auditing &amp;amp; pipelines.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: no previous knowledge is required, this course is for all levels and jobs (QA, DevOps, Security and Software Engineer)&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Security Tools and Jenkins Pipeline ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by WebMD ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Sneha Kokil''&lt;br /&gt;
&lt;br /&gt;
Abstract: Modern application development embeds security activities in SDLC, while adopting DevSecOps culture. Security tools are being viewed in the context of continuous integration and automation, which are the key factors in achieving a successful DevSecOps implementation. Integrating security tools in the CI/CD pipelines has become a primary focus of most of the organizations, who are striving to build application security from within. This workshop focuses on getting a good understanding of how some of the open source security tools can be integrated in Jenkins CI/CD pipeline for languages such as Go and Java, along with application container scanning solutions. The workshop will be a hands-on experience, where the participants will write their own pipeline code for integrating security tools. The key takeaways from this workshop will help participants experience how security tooling fits into CI/CD pipelines. It will also help them appreciate the real-world challenges and possible solutions, when integrating security in existing SDLC.&lt;br /&gt;
&lt;br /&gt;
Bio: Sneha Kokil is a senior security consultant at Synopsys. With a master's degree in information security from Northeastern University, along with several years of development and security experience, she specializes in integrating software security toolchains within SDLC processes. She is immensely passionate about DevSecOps and how it helps building security in. Outside of work, she is an avid biography and science fiction reader, a swimmer, and a mother to a wonderful daughter.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Top 10 / Juice Shop Hack Session ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Kraken ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: David Quisenberry''&lt;br /&gt;
&lt;br /&gt;
Abstract: This session is meant for those new to OWASP Top Ten. We will go over the OWASP Top Ten - where it came from, what it’s good for, what are the top ten, etc. And illustrate the concepts in the OWASP Top Ten through another OWASP Flagship Project - The OWASP Juice Shop. This will be a hands on class so everyone can follow along in the Juice Shop to explore the concepts. There will be time at the end for everyone to continue on their vulnerability hunting and a friendly Juice Shop CTF.&lt;br /&gt;
&lt;br /&gt;
Bio: David Quisenberry (@dmqpdx16) is a backend developer and security champion with Daylight Studio, a local Portland boutique web agency. He serves on the Portland OWASP board as Outreach/Events coordinator and does what he can to up the involvement of established and emerging software developers in security conversations. &lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running docker and burpsuite.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Web Applications and Filesystem Security / Deserialization Attacks ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by ForgeRock ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course starts by exploring the security ramifications of filesystem semantics, security capabilities, and little known-features as they relate to web application development.  Students will practice file upload attacks against a intentionally-vulnerable web application.  Next, the course transitions to deserialization attacks, a recently added OWASP Top 10 item, using multiple practical examples to explain this tricky technical issue. Students will have an opportunity to try deserialization attacks in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
Learning Objectives:&lt;br /&gt;
* To better appreciate the ways modern filesystems work on different platforms and what security impacts may result from certain unintuitive behaviors&lt;br /&gt;
* Explore the many challenges involved in safely processing file uploads&lt;br /&gt;
* Learn about deserialization attacks and how to identify when an application might be at risk&lt;br /&gt;
&lt;br /&gt;
Prerequisites:&lt;br /&gt;
* A basic understanding of web application development is strongly recommended&lt;br /&gt;
* A laptop or workstation for each student (or pair of students)&lt;br /&gt;
* Ability to change proxy settings, install software and run executables on this system&lt;br /&gt;
* Please install VirtualBox 6 in order to run a small virtual machine&lt;br /&gt;
* If using a Mac, consider bringing a real mouse with 2 buttons. VirtualBox doesn't always play well with other pointing devices on Macs&lt;br /&gt;
&lt;br /&gt;
=== Container Security ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Alex Ivkin''&lt;br /&gt;
&lt;br /&gt;
Abstract: &amp;quot;When it comes to container security there are two prevailing schools of thought - either containers are secure by default, so you should not care much, or containers can not be secure in principle, so you should avoid them at all costs. In this training you will go through the real world examples of configuring and running containers in a secure manner. You will get insights into the security of both Windows and Linux containers, container infrastructure, such as container registries and orchestration platforms - docker swarm and kubernetes. We will examine real world vulnerabilities unique to different architectures of containers and how to address them.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
# Building and running docker containers securely&lt;br /&gt;
# Avoiding common pitfalls in docker infrastructure setup (dockerd, docker registry)&lt;br /&gt;
# Navigating security in the container orchestration platforms (docker swarm, kubernetes)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Bio: Alex Ivkin (@alerxes) is a Director of Solutions at Eclypsium, a local Portland company, specializing in firmware, hardware and supply chain security. Alex has deep implementation experience in a long list of security domains, including cloud, application security and IAM. He co-authored the ISACA CSX Professional certification and is an alpine climber.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: &lt;br /&gt;
* Mid to advanced level technical experience&lt;br /&gt;
* Basic experience with running docker containers&lt;br /&gt;
* Laptop with docker for windows setup and tested&lt;br /&gt;
&lt;br /&gt;
=== Intro to Chrome Exploitation ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Security Innovation ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Justin Angra''&lt;br /&gt;
&lt;br /&gt;
Abstract: Over 3 billion browser devices are actively loading arbitrary data served by someone else. What happens if one of those pages contains maliciously crafted JavaScript? Could they capture your passwords, perform UXSS, or worse - execute local code on your machine? In this session, you will get the opportunity to explore the anatomy and play with common vulnerability patterns in the renderer process of Chrome. This will be an interactive class; please bring a laptop with Docker installed.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Amass: Discovering Your Exposure on the Internet ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Daylight Studio ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Jeff Foley ''&lt;br /&gt;
&lt;br /&gt;
Abstract: Today, large organizations deal with the challenge of running their infrastructure across many networks and namespaces due to the use of cloud and hosting services, legacy environments and acquisitions. This can make it difficult to maintain visibility of Internet-facing assets and to track down systems that pose a risk to security. The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery. During this talk, the founder of the project will discuss how OWASP Amass uses OSINT, network reconnaissance, graph databases and information sharing to provide both attackers and defenders better visibility of target organizations.&lt;br /&gt;
&lt;br /&gt;
Bio: Jeff Foley is the Founder and Project Leader of the OWASP Amass project. Mr. Foley has nearly 20 years of experience as an innovator for research &amp;amp; development, software engineering and red team activities in information security. He is a results-driven technical leader known for delivering game-changing research findings to overcome real-world challenges. Jeff serves as the Manager for Vulnerability Engineering at National Grid and is the CTO &amp;amp; Co-founder of ClaritySec, an Upstate New York based information security startup. Prior to this, he was the Director of Research for the Cyber Systems, Weapon Systems &amp;amp; Sensors Operation at Alion Science &amp;amp; Technology. While serving at Northrop Grumman, Jeff built and led the internal penetration testing team and was the program manager for offensive security research &amp;amp; development. Mr. Foley also shares his expertise and experience by supporting several local university information security programs and participating in information security competitions, such as the SUNY Polytechnic Institute Cybersecurity Advisory Board, Mohawk Valley Community College Computer Science Advisory Board and the CNY Hackathon Competition.&lt;br /&gt;
&lt;br /&gt;
=2019 Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Here is a document outlining the opportunities: [https://drive.google.com/file/d/0BydPdSuBlQ4scm1DRmlwMVNyUE11TzdxV1VoZ1lNRTdueTBv/view?usp=sharing Sponsorship-Doc]. Reach out to david.quisenberry@owasp.org to let us know.'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Dasher Technologies logo.png|link=https://www.dasher.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:Cambia logo.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Daylight logo.png|link=https://thedaylightstudio.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Kraken logo.png|link=https://www.kraken.com/en-us/features/security]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:WebMD logo.jpg|link=https://www.webmd.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:NetSPI 2019 logo.png|link=https://www.netspi.com/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:Vacasa Logo .png|frameless|375x375px]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2019 Training Day will be on September 25, 2019. &lt;br /&gt;
&lt;br /&gt;
This year for the 2nd time, we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AWS API Threat Modeling and Automated Testing &amp;lt;br&amp;gt;(Kendra Ash)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Security Tools and Jenkins Pipeline &amp;lt;br&amp;gt;(Sneha Kokil)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Top 10 / Juice Shop Hack Session &amp;lt;br&amp;gt;(David Quisenberry)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Web Applications and Filesystem Security / Deserialization Attacks &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Container Security &amp;lt;br&amp;gt;(Alex Ivkin)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Chrome Exploitation &amp;lt;br&amp;gt;(Justin Angra)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Amass: Discovering Your Exposure on the Internet &amp;lt;br&amp;gt;(Jeff Foley)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Interested in teaching a training at Training Day 2019? Contact Portland OWASP via the mailing list or Twitter!&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration will again be via EventBrite&lt;br /&gt;
&lt;br /&gt;
Thank you to the OWASP Foundation and the many sponsors, trainers, volunteers and trainers that have helped make Training Day a success and allow us to continue!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253652</id>
		<title>OWASP Portland 2019 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253652"/>
				<updated>2019-08-13T06:01:49Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Minor sponsorship logo add&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the fourth year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for the local Portland security community to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with other local infosec and appsec enthusiasts and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
The 4th annual OWASP Portland 2019 Training Day date will be on September 25, 2019. See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;General Registration will open at 9am PST on August 15th.  Tickets cost $25.00 per session.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2019 Training Day? Subscribe to the [https://groups.google.com/a/owasp.org/forum/#!forum/portland-chapter] Portland OWASP mailing list or follow [https://twitter.com/portlandowasp @PortlandOWASP] on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session. Each participant can register for one morning course, one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== AWS API Threat Modeling and Automated Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Cambia ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kendra Ash''&lt;br /&gt;
&lt;br /&gt;
Abstract: If you are a software, DevOps, QA or security engineer and want to learn how to threat model API's in AWS this course is for you. This course will cover the what, why, when, and how of threat modeling applications in your organization. The bulk of this course will be based on the book Threat Modeling by Adam Shostack and will leverage a variant of the Escalation of Privileges card game. Also, I will dive into the approach I have used to gain adoption from engineering teams as a security engineer.&lt;br /&gt;
After gaining an understanding of threat modeling, we will dive into how we can automate security checks for an AWS environment — leveraging the AWS CLI tool to provide quick engineering feedback on ways to improve the security of their infrastructure.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
* Learn the basics of threat modeling&lt;br /&gt;
* Learn ways to gain adoption by your peers&lt;br /&gt;
* How to automate security checks for AWS&lt;br /&gt;
&lt;br /&gt;
Bio: Kendra Ash (@securelykash) is an information security engineer at Vacasa, actively building a security team and program by leveraging guidance from her network and industry standards. Co presenting is Ryan Nixon (@taiidani) an experienced DevOps engineer who deeply cares about the security of all applications. Constantly looking for ways to keep all server and application configurations in order with proper auditing &amp;amp; pipelines.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: no previous knowledge is required, this course is for all levels and jobs (QA, DevOps, Security and Software Engineer)&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Security Tools and Jenkins Pipeline ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by WebMD ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Sneha Kokil''&lt;br /&gt;
&lt;br /&gt;
Abstract: Modern application development embeds security activities in SDLC, while adopting DevSecOps culture. Security tools are being viewed in the context of continuous integration and automation, which are the key factors in achieving a successful DevSecOps implementation. Integrating security tools in the CI/CD pipelines has become a primary focus of most of the organizations, who are striving to build application security from within. This workshop focuses on getting a good understanding of how some of the open source security tools can be integrated in Jenkins CI/CD pipeline for languages such as Go and Java, along with application container scanning solutions. The workshop will be a hands-on experience, where the participants will write their own pipeline code for integrating security tools. The key takeaways from this workshop will help participants experience how security tooling fits into CI/CD pipelines. It will also help them appreciate the real-world challenges and possible solutions, when integrating security in existing SDLC.&lt;br /&gt;
&lt;br /&gt;
Bio: Sneha Kokil is a senior security consultant at Synopsys. With a master's degree in information security from Northeastern University, along with several years of development and security experience, she specializes in integrating software security toolchains within SDLC processes. She is immensely passionate about DevSecOps and how it helps building security in. Outside of work, she is an avid biography and science fiction reader, a swimmer, and a mother to a wonderful daughter.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Top 10 / Juice Shop Hack Session ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Kraken ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: David Quisenberry''&lt;br /&gt;
&lt;br /&gt;
Abstract: This session is meant for those new to OWASP Top Ten. We will go over the OWASP Top Ten - where it came from, what it’s good for, what are the top ten, etc. And illustrate the concepts in the OWASP Top Ten through another OWASP Flagship Project - The OWASP Juice Shop. This will be a hands on class so everyone can follow along in the Juice Shop to explore the concepts. There will be time at the end for everyone to continue on their vulnerability hunting and a friendly Juice Shop CTF.&lt;br /&gt;
&lt;br /&gt;
Bio: David Quisenberry (@dmqpdx16) is a backend developer and security champion with Daylight Studio, a local Portland boutique web agency. He serves on the Portland OWASP board as Outreach/Events coordinator and does what he can to up the involvement of established and emerging software developers in security conversations. &lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running docker and burpsuite.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Web Applications and Filesystem Security / Deserialization Attacks ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by ForgeRock ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course starts by exploring the security ramifications of filesystem semantics, security capabilities, and little known-features as they relate to web application development.  Students will practice file upload attacks against a intentionally-vulnerable web application.  Next, the course transitions to deserialization attacks, a recently added OWASP Top 10 item, using multiple practical examples to explain this tricky technical issue. Students will have an opportunity to try deserialization attacks in a realistic scenario.&lt;br /&gt;
&lt;br /&gt;
Learning Objectives:&lt;br /&gt;
* To better appreciate the ways modern filesystems work on different platforms and what security impacts may result from certain unintuitive behaviors&lt;br /&gt;
* Explore the many challenges involved in safely processing file uploads&lt;br /&gt;
* Learn about deserialization attacks and how to identify when an application might be at risk&lt;br /&gt;
&lt;br /&gt;
Prerequisites:&lt;br /&gt;
* A basic understanding of web application development is strongly recommended&lt;br /&gt;
* A laptop or workstation for each student (or pair of students)&lt;br /&gt;
* Ability to change proxy settings, install software and run executables on this system&lt;br /&gt;
* Please install VirtualBox 6 in order to run a small virtual machine&lt;br /&gt;
* If using a Mac, consider bringing a real mouse with 2 buttons. VirtualBox doesn't always play well with other pointing devices on Macs&lt;br /&gt;
&lt;br /&gt;
=== Container Security ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Alex Ivkin''&lt;br /&gt;
&lt;br /&gt;
Abstract: &amp;quot;When it comes to container security there are two prevailing schools of thought - either containers are secure by default, so you should not care much, or containers can not be secure in principle, so you should avoid them at all costs. In this training you will go through the real world examples of configuring and running containers in a secure manner. You will get insights into the security of both Windows and Linux containers, container infrastructure, such as container registries and orchestration platforms - docker swarm and kubernetes. We will examine real world vulnerabilities unique to different architectures of containers and how to address them.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
# Building and running docker containers securely&lt;br /&gt;
# Avoiding common pitfalls in docker infrastructure setup (dockerd, docker registry)&lt;br /&gt;
# Navigating security in the container orchestration platforms (docker swarm, kubernetes)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Bio: Alex Ivkin (@alerxes) is a Director of Solutions at Eclypsium, a local Portland company, specializing in firmware, hardware and supply chain security. Alex has deep implementation experience in a long list of security domains, including cloud, application security and IAM. He co-authored the ISACA CSX Professional certification and is an alpine climber.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: &lt;br /&gt;
* Mid to advanced level technical experience&lt;br /&gt;
* Basic experience with running docker containers&lt;br /&gt;
* Laptop with docker for windows setup and tested&lt;br /&gt;
&lt;br /&gt;
=== Intro to Chrome Exploitation ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Security Innovation ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Justin Angra''&lt;br /&gt;
&lt;br /&gt;
Abstract: Over 3 billion browser devices are actively loading arbitrary data served by someone else. What happens if one of those pages contains maliciously crafted JavaScript? Could they capture your passwords, perform UXSS, or worse - execute local code on your machine? In this session, you will get the opportunity to explore the anatomy and play with common vulnerability patterns in the renderer process of Chrome. This will be an interactive class; please bring a laptop with Docker installed.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Amass: Discovering Your Exposure on the Internet ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Daylight Studio ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Jeff Foley ''&lt;br /&gt;
&lt;br /&gt;
Abstract: Today, large organizations deal with the challenge of running their infrastructure across many networks and namespaces due to the use of cloud and hosting services, legacy environments and acquisitions. This can make it difficult to maintain visibility of Internet-facing assets and to track down systems that pose a risk to security. The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery. During this talk, the founder of the project will discuss how OWASP Amass uses OSINT, network reconnaissance, graph databases and information sharing to provide both attackers and defenders better visibility of target organizations.&lt;br /&gt;
&lt;br /&gt;
Bio: Jeff Foley is the Founder and Project Leader of the OWASP Amass project. Mr. Foley has nearly 20 years of experience as an innovator for research &amp;amp; development, software engineering and red team activities in information security. He is a results-driven technical leader known for delivering game-changing research findings to overcome real-world challenges. Jeff serves as the Manager for Vulnerability Engineering at National Grid and is the CTO &amp;amp; Co-founder of ClaritySec, an Upstate New York based information security startup. Prior to this, he was the Director of Research for the Cyber Systems, Weapon Systems &amp;amp; Sensors Operation at Alion Science &amp;amp; Technology. While serving at Northrop Grumman, Jeff built and led the internal penetration testing team and was the program manager for offensive security research &amp;amp; development. Mr. Foley also shares his expertise and experience by supporting several local university information security programs and participating in information security competitions, such as the SUNY Polytechnic Institute Cybersecurity Advisory Board, Mohawk Valley Community College Computer Science Advisory Board and the CNY Hackathon Competition.&lt;br /&gt;
&lt;br /&gt;
=2019 Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Here is a document outlining the opportunities: [https://drive.google.com/file/d/0BydPdSuBlQ4scm1DRmlwMVNyUE11TzdxV1VoZ1lNRTdueTBv/view?usp=sharing Sponsorship-Doc]. Reach out to david.quisenberry@owasp.org to let us know.'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Dasher Technologies logo.png|link=https://www.dasher.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:Cambia logo.png]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Daylight logo.png|link=https://thedaylightstudio.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Kraken logo.png|link=https://www.kraken.com/en-us/features/security]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:WebMD logo.jpg|link=https://www.webmd.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:NetSPI 2019 logo.png|link=https://www.netspi.com/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:Vacasa Logo .png|frameless|375x375px]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2019 Training Day will be on September 25, 2019. &lt;br /&gt;
&lt;br /&gt;
This year for the 2nd time, we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AWS API Threat Modeling and Automated Testing &amp;lt;br&amp;gt;(Kendra Ash)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Security Tools and Jenkins Pipeline &amp;lt;br&amp;gt;(Sneha Kokil)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Top 10 / Juice Shop Hack Session &amp;lt;br&amp;gt;(David Quisenberry)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Container Security &amp;lt;br&amp;gt;(Alex Ivkin)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Chrome Exploitation &amp;lt;br&amp;gt;(Justin Angra)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Amass: Discovering Your Exposure on the Internet &amp;lt;br&amp;gt;(Jeff Foley)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Interested in teaching a training at Training Day 2019? Contact Portland OWASP via the mailing list or Twitter!&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration will again be via EventBrite&lt;br /&gt;
&lt;br /&gt;
Thank you to the OWASP Foundation and the many sponsors, trainers, volunteers and trainers that have helped make Training Day a success and allow us to continue!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Cambia_logo.png&amp;diff=253651</id>
		<title>File:Cambia logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Cambia_logo.png&amp;diff=253651"/>
				<updated>2019-08-13T05:56:04Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cambia logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253625</id>
		<title>OWASP Portland 2019 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253625"/>
				<updated>2019-08-09T18:07:48Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Added session sponsors to sessions&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the fourth year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for the local Portland security community to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with other local infosec and appsec enthusiasts and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
The 4th annual OWASP Portland 2019 Training Day date will be on September 25, 2019. See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;General Registration will open at 9am PST on August 15th.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2019 Training Day? Subscribe to the [https://groups.google.com/a/owasp.org/forum/#!forum/portland-chapter] Portland OWASP mailing list or follow [https://twitter.com/portlandowasp @PortlandOWASP] on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session. Each participant can register for one morning course, one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== AWS API Threat Modeling and Automated Testing ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kendra Ash''&lt;br /&gt;
&lt;br /&gt;
Abstract: If you are a software, DevOps, QA or security engineer and want to learn how to threat model API's in AWS this course is for you. This course will cover the what, why, when, and how of threat modeling applications in your organization. The bulk of this course will be based on the book Threat Modeling by Adam Shostack and will leverage a variant of the Escalation of Privileges card game. Also, I will dive into the approach I have used to gain adoption from engineering teams as a security engineer.&lt;br /&gt;
After gaining an understanding of threat modeling, we will dive into how we can automate security checks for an AWS environment — leveraging the AWS CLI tool to provide quick engineering feedback on ways to improve the security of their infrastructure.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
&lt;br /&gt;
- Learn the basics of threat modeling&lt;br /&gt;
&lt;br /&gt;
- Learn ways to gain adoption by your peers&lt;br /&gt;
&lt;br /&gt;
- How to automate security checks for AWS&lt;br /&gt;
&lt;br /&gt;
Bio: Kendra Ash (@securelykash) is an information security engineer at Vacasa, actively building a security team and program by leveraging guidance from her network and industry standards. Co presenting is Ryan Nixon (@&amp;lt;code&amp;gt;taiidani)&amp;lt;/code&amp;gt; an experienced DevOps engineer who deeply cares about the security of all applications. Constantly looking for ways to keep all server and application configurations in order with proper auditing &amp;amp; pipelines.&lt;br /&gt;
&lt;br /&gt;
Prerequisites:- no previous knowledge is required- this course is  for all levels and jobs (QA,  DevOps, Security and Software Engineer)&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Security Tools and Jenkins Pipeline ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by WebMD ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Sneha Kokil''&lt;br /&gt;
&lt;br /&gt;
Abstract: Modern application development embeds security activities in SDLC, while adopting DevSecOps culture. Security tools are being viewed in the context of continuous integration and automation, which are the key factors in achieving a successful DevSecOps implementation. Integrating security tools in the CI/CD pipelines has become a primary focus of most of the organizations, who are striving to build application security from within. This workshop focuses on getting a good understanding of how some of the open source security tools can be integrated in Jenkins CI/CD pipeline for languages such as Go and Java, along with application container scanning solutions. The workshop will be a hands-on experience, where the participants will write their own pipeline code for integrating security tools. The key takeaways from this workshop will help participants experience how security tooling fits into CI/CD pipelines. It will also help them appreciate the real-world challenges and possible solutions, when integrating security in existing SDLC.&lt;br /&gt;
&lt;br /&gt;
Bio: Sneha Kokil is a senior security consultant at Synopsys. With a master's degree in information security from Northeastern University, along with several years of development and security experience, she specializes in integrating software security toolchains within SDLC processes. She is immensely passionate about DevSecOps and how it helps building security in. Outside of work, she is an avid biography and science fiction reader, a swimmer, and a mother to a wonderful daughter.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Top 10 / Juice Shop Hack Session ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Kraken ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: David Quisenberry''&lt;br /&gt;
&lt;br /&gt;
Abstract: This session is meant for those new to OWASP Top Ten. We will go over the OWASP Top Ten - where it came from, what it’s good for, what are the top ten, etc. And illustrate the concepts in the OWASP Top Ten through another OWASP Flagship Project - The OWASP Juice Shop. This will be a hands on class so everyone can follow along in the Juice Shop to explore the concepts. There will be time at the end for everyone to continue on their vulnerability hunting and a friendly Juice Shop CTF.&lt;br /&gt;
&lt;br /&gt;
Bio: David Quisenberry (@dmqpdx16) is a backend developer and security champion with Daylight Studio, a local Portland boutique web agency. He serves on the Portland OWASP board as Outreach/Events coordinator and does what he can to up the involvement of established and emerging software developers in security conversations. &lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running docker and burpsuite.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by ForgeRock ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Students should be familiar with popular web application testing proxies such as Burp Proxy or OWASP ZAP. Some experience with basic SQL injection attacks is recommended.&lt;br /&gt;
&lt;br /&gt;
=== Container Security ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Alex Ivkin''&lt;br /&gt;
&lt;br /&gt;
Abstract: &amp;quot;When it comes to container security there are two prevailing schools of thought - either containers are secure by default, so you should not care much, or containers can not be secure in principle, so you should avoid them at all costs. In this training you will go through the real world examples of configuring and running containers in a secure manner. You will get insights into the security of both Windows and Linux containers, container infrastructure, such as container registries and orchestration platforms - docker swarm and kubernetes. We will examine real world vulnerabilities unique to different architectures of containers and how to address them.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
# Building and running docker containers securely&lt;br /&gt;
# Avoiding common pitfalls in docker infrastructure setup (dockerd, docker registry)&lt;br /&gt;
# Navigating security in the container orchestration platforms (docker swarm, kubernetes)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Bio: Alex Ivkin (@alerxes) is a Director of Solutions at Eclypsium, a local Portland company, specializing in firmware, hardware and supply chain security. Alex has deep implementation experience in a long list of security domains, including cloud, application security and IAM. He co-authored the ISACA CSX Professional certification and is an alpine climber.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: &lt;br /&gt;
* Mid to advanced level technical experience&lt;br /&gt;
* Basic experience with running docker containers&lt;br /&gt;
* Laptop with docker for windows setup and tested&lt;br /&gt;
&lt;br /&gt;
=== Intro to Chrome Exploitation ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Security Innovation ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Justin Angra''&lt;br /&gt;
&lt;br /&gt;
Abstract: Over 3 billion browser devices are actively loading arbitrary data served by someone else. What happens if one of those pages contains maliciously crafted JavaScript? Could they capture your passwords, perform UXSS, or worse - execute local code on your machine? In this session, you will get the opportunity to explore the anatomy and play with common vulnerability patterns in the renderer process of Chrome. This will be an interactive class; please bring a laptop with Docker installed.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Amass: Discovering Your Exposure on the Internet ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Daylight Studio ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Jeff Foley ''&lt;br /&gt;
&lt;br /&gt;
Abstract: Today, large organizations deal with the challenge of running their infrastructure across many networks and namespaces due to the use of cloud and hosting services, legacy environments and acquisitions. This can make it difficult to maintain visibility of Internet-facing assets and to track down systems that pose a risk to security. The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery. During this talk, the founder of the project will discuss how OWASP Amass uses OSINT, network reconnaissance, graph databases and information sharing to provide both attackers and defenders better visibility of target organizations.&lt;br /&gt;
&lt;br /&gt;
Bio: Jeff Foley is the Founder and Project Leader of the OWASP Amass project. Mr. Foley has nearly 20 years of experience as an innovator for research &amp;amp; development, software engineering and red team activities in information security. He is a results-driven technical leader known for delivering game-changing research findings to overcome real-world challenges. Jeff serves as the Manager for Vulnerability Engineering at National Grid and is the CTO &amp;amp; Co-founder of ClaritySec, an Upstate New York based information security startup. Prior to this, he was the Director of Research for the Cyber Systems, Weapon Systems &amp;amp; Sensors Operation at Alion Science &amp;amp; Technology. While serving at Northrop Grumman, Jeff built and led the internal penetration testing team and was the program manager for offensive security research &amp;amp; development. Mr. Foley also shares his expertise and experience by supporting several local university information security programs and participating in information security competitions, such as the SUNY Polytechnic Institute Cybersecurity Advisory Board, Mohawk Valley Community College Computer Science Advisory Board and the CNY Hackathon Competition.&lt;br /&gt;
&lt;br /&gt;
=2019 Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Here is a document outlining the opportunities: [https://drive.google.com/file/d/0BydPdSuBlQ4scm1DRmlwMVNyUE11TzdxV1VoZ1lNRTdueTBv/view?usp=sharing Sponsorship-Doc]. Reach out to david.quisenberry@owasp.org to let us know.'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Dasher Technologies logo.png|link=https://www.dasher.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Daylight logo.png|link=https://thedaylightstudio.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Kraken logo.png|link=https://www.kraken.com/en-us/features/security]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:WebMD logo.jpg|link=https://www.webmd.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:NetSPI 2019 logo.png|link=https://www.netspi.com/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:Vacasa Logo .png|frameless|375x375px]]&lt;br /&gt;
&lt;br /&gt;
== 2018 Sponsors == &lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]] &lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2019 Training Day will be on September 25, 2019. &lt;br /&gt;
&lt;br /&gt;
This year for the 2nd time, we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AWS API Threat Modeling and Automated Testing &amp;lt;br&amp;gt;(Kendra Ash)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Security Tools and Jenkins Pipeline &amp;lt;br&amp;gt;(Sneha Kokil)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Top 10 / Juice Shop Hack Session &amp;lt;br&amp;gt;(David Quisenberry)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Container Security &amp;lt;br&amp;gt;(Alex Ivkin)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Chrome Exploitation &amp;lt;br&amp;gt;(Justin Angra)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Amass: Discovering Your Exposure on the Internet &amp;lt;br&amp;gt;(Jeff Foley)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Interested in teaching a training at Training Day 2019? Contact Portland OWASP via the mailing list or Twitter!&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration will again be via EventBrite&lt;br /&gt;
&lt;br /&gt;
Thank you to the OWASP Foundation and the many sponsors, trainers, volunteers and trainers that have helped make Training Day a success and allow us to continue!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253624</id>
		<title>OWASP Portland 2019 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253624"/>
				<updated>2019-08-09T17:56:08Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: /* 2019 Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the fourth year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for the local Portland security community to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with other local infosec and appsec enthusiasts and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
The 4th annual OWASP Portland 2019 Training Day date will be on September 25, 2019. See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;General Registration will open at 9am PST on August 15th.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2019 Training Day? Subscribe to the [https://groups.google.com/a/owasp.org/forum/#!forum/portland-chapter] Portland OWASP mailing list or follow [https://twitter.com/portlandowasp @PortlandOWASP] on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session. Each participant can register for one morning course, one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== AWS API Threat Modeling and Automated Testing ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kendra Ash''&lt;br /&gt;
&lt;br /&gt;
Abstract: If you are a software, DevOps, QA or security engineer and want to learn how to threat model API's in AWS this course is for you. This course will cover the what, why, when, and how of threat modeling applications in your organization. The bulk of this course will be based on the book Threat Modeling by Adam Shostack and will leverage a variant of the Escalation of Privileges card game. Also, I will dive into the approach I have used to gain adoption from engineering teams as a security engineer.&lt;br /&gt;
After gaining an understanding of threat modeling, we will dive into how we can automate security checks for an AWS environment — leveraging the AWS CLI tool to provide quick engineering feedback on ways to improve the security of their infrastructure.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
&lt;br /&gt;
- Learn the basics of threat modeling&lt;br /&gt;
&lt;br /&gt;
- Learn ways to gain adoption by your peers&lt;br /&gt;
&lt;br /&gt;
- How to automate security checks for AWS&lt;br /&gt;
&lt;br /&gt;
Bio: Kendra Ash (@securelykash) is an information security engineer at Vacasa, actively building a security team and program by leveraging guidance from her network and industry standards. Co presenting is Ryan Nixon (@&amp;lt;code&amp;gt;taiidani)&amp;lt;/code&amp;gt; an experienced DevOps engineer who deeply cares about the security of all applications. Constantly looking for ways to keep all server and application configurations in order with proper auditing &amp;amp; pipelines.&lt;br /&gt;
&lt;br /&gt;
Prerequisites:- no previous knowledge is required- this course is  for all levels and jobs (QA,  DevOps, Security and Software Engineer)&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Security Tools and Jenkins Pipeline ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Sneha Kokil''&lt;br /&gt;
&lt;br /&gt;
Abstract: Modern application development embeds security activities in SDLC, while adopting DevSecOps culture. Security tools are being viewed in the context of continuous integration and automation, which are the key factors in achieving a successful DevSecOps implementation. Integrating security tools in the CI/CD pipelines has become a primary focus of most of the organizations, who are striving to build application security from within. This workshop focuses on getting a good understanding of how some of the open source security tools can be integrated in Jenkins CI/CD pipeline for languages such as Go and Java, along with application container scanning solutions. The workshop will be a hands-on experience, where the participants will write their own pipeline code for integrating security tools. The key takeaways from this workshop will help participants experience how security tooling fits into CI/CD pipelines. It will also help them appreciate the real-world challenges and possible solutions, when integrating security in existing SDLC.&lt;br /&gt;
&lt;br /&gt;
Bio: Sneha Kokil is a senior security consultant at Synopsys. With a master's degree in information security from Northeastern University, along with several years of development and security experience, she specializes in integrating software security toolchains within SDLC processes. She is immensely passionate about DevSecOps and how it helps building security in. Outside of work, she is an avid biography and science fiction reader, a swimmer, and a mother to a wonderful daughter.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Top 10 / Juice Shop Hack Session ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: David Quisenberry''&lt;br /&gt;
&lt;br /&gt;
Abstract: This session is meant for those new to OWASP Top Ten. We will go over the OWASP Top Ten - where it came from, what it’s good for, what are the top ten, etc. And illustrate the concepts in the OWASP Top Ten through another OWASP Flagship Project - The OWASP Juice Shop. This will be a hands on class so everyone can follow along in the Juice Shop to explore the concepts. There will be time at the end for everyone to continue on their vulnerability hunting and a friendly Juice Shop CTF.&lt;br /&gt;
&lt;br /&gt;
Bio: David Quisenberry (@dmqpdx16) is a backend developer and security champion with Daylight Studio, a local Portland boutique web agency. He serves on the Portland OWASP board as Outreach/Events coordinator and does what he can to up the involvement of established and emerging software developers in security conversations. &lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running docker and burpsuite.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Students should be familiar with popular web application testing proxies such as Burp Proxy or OWASP ZAP. Some experience with basic SQL injection attacks is recommended.&lt;br /&gt;
&lt;br /&gt;
=== Container Security ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Alex Ivkin''&lt;br /&gt;
&lt;br /&gt;
Abstract: &amp;quot;When it comes to container security there are two prevailing schools of thought - either containers are secure by default, so you should not care much, or containers can not be secure in principle, so you should avoid them at all costs. In this training you will go through the real world examples of configuring and running containers in a secure manner. You will get insights into the security of both Windows and Linux containers, container infrastructure, such as container registries and orchestration platforms - docker swarm and kubernetes. We will examine real world vulnerabilities unique to different architectures of containers and how to address them.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
# Building and running docker containers securely&lt;br /&gt;
# Avoiding common pitfalls in docker infrastructure setup (dockerd, docker registry)&lt;br /&gt;
# Navigating security in the container orchestration platforms (docker swarm, kubernetes)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Bio: Alex Ivkin (@alerxes) is a Director of Solutions at Eclypsium, a local Portland company, specializing in firmware, hardware and supply chain security. Alex has deep implementation experience in a long list of security domains, including cloud, application security and IAM. He co-authored the ISACA CSX Professional certification and is an alpine climber.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: &lt;br /&gt;
* Mid to advanced level technical experience&lt;br /&gt;
* Basic experience with running docker containers&lt;br /&gt;
* Laptop with docker for windows setup and tested&lt;br /&gt;
&lt;br /&gt;
=== Intro to Chrome Exploitation ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Justin Angra''&lt;br /&gt;
&lt;br /&gt;
Abstract: Over 3 billion browser devices are actively loading arbitrary data served by someone else. What happens if one of those pages contains maliciously crafted JavaScript? Could they capture your passwords, perform UXSS, or worse - execute local code on your machine? In this session, you will get the opportunity to explore the anatomy and play with common vulnerability patterns in the renderer process of Chrome. This will be an interactive class; please bring a laptop with Docker installed.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Amass: Discovering Your Exposure on the Internet ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Jeff Foley ''&lt;br /&gt;
&lt;br /&gt;
Abstract: Today, large organizations deal with the challenge of running their infrastructure across many networks and namespaces due to the use of cloud and hosting services, legacy environments and acquisitions. This can make it difficult to maintain visibility of Internet-facing assets and to track down systems that pose a risk to security. The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery. During this talk, the founder of the project will discuss how OWASP Amass uses OSINT, network reconnaissance, graph databases and information sharing to provide both attackers and defenders better visibility of target organizations.&lt;br /&gt;
&lt;br /&gt;
Bio: Jeff Foley is the Founder and Project Leader of the OWASP Amass project. Mr. Foley has nearly 20 years of experience as an innovator for research &amp;amp; development, software engineering and red team activities in information security. He is a results-driven technical leader known for delivering game-changing research findings to overcome real-world challenges. Jeff serves as the Manager for Vulnerability Engineering at National Grid and is the CTO &amp;amp; Co-founder of ClaritySec, an Upstate New York based information security startup. Prior to this, he was the Director of Research for the Cyber Systems, Weapon Systems &amp;amp; Sensors Operation at Alion Science &amp;amp; Technology. While serving at Northrop Grumman, Jeff built and led the internal penetration testing team and was the program manager for offensive security research &amp;amp; development. Mr. Foley also shares his expertise and experience by supporting several local university information security programs and participating in information security competitions, such as the SUNY Polytechnic Institute Cybersecurity Advisory Board, Mohawk Valley Community College Computer Science Advisory Board and the CNY Hackathon Competition.&lt;br /&gt;
&lt;br /&gt;
=2019 Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Here is a document outlining the opportunities: [https://drive.google.com/file/d/0BydPdSuBlQ4scm1DRmlwMVNyUE11TzdxV1VoZ1lNRTdueTBv/view?usp=sharing Sponsorship-Doc]. Reach out to david.quisenberry@owasp.org to let us know.'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Dasher Technologies logo.png|link=https://www.dasher.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Daylight logo.png|link=https://thedaylightstudio.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Kraken logo.png|link=https://www.kraken.com/en-us/features/security]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:WebMD logo.jpg|link=https://www.webmd.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:NetSPI 2019 logo.png|link=https://www.netspi.com/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:Vacasa Logo .png|frameless|375x375px]]&lt;br /&gt;
&lt;br /&gt;
== 2018 Sponsors == &lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]] &lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2019 Training Day will be on September 25, 2019. &lt;br /&gt;
&lt;br /&gt;
This year for the 2nd time, we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AWS API Threat Modeling and Automated Testing &amp;lt;br&amp;gt;(Kendra Ash)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Security Tools and Jenkins Pipeline &amp;lt;br&amp;gt;(Sneha Kokil)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Top 10 / Juice Shop Hack Session &amp;lt;br&amp;gt;(David Quisenberry)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Container Security &amp;lt;br&amp;gt;(Alex Ivkin)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Chrome Exploitation &amp;lt;br&amp;gt;(Justin Angra)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Amass: Discovering Your Exposure on the Internet &amp;lt;br&amp;gt;(Jeff Foley)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Interested in teaching a training at Training Day 2019? Contact Portland OWASP via the mailing list or Twitter!&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration will again be via EventBrite&lt;br /&gt;
&lt;br /&gt;
Thank you to the OWASP Foundation and the many sponsors, trainers, volunteers and trainers that have helped make Training Day a success and allow us to continue!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:NetSPI_2019_logo.png&amp;diff=253623</id>
		<title>File:NetSPI 2019 logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:NetSPI_2019_logo.png&amp;diff=253623"/>
				<updated>2019-08-09T17:54:39Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NetSPI 2019 logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Dasher_Technologies_logo.png&amp;diff=253622</id>
		<title>File:Dasher Technologies logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Dasher_Technologies_logo.png&amp;diff=253622"/>
				<updated>2019-08-09T17:53:05Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Dasher Technologies logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:WebMD_logo.jpg&amp;diff=253621</id>
		<title>File:WebMD logo.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:WebMD_logo.jpg&amp;diff=253621"/>
				<updated>2019-08-09T17:50:15Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;WebMD logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Kraken_logo.png&amp;diff=253620</id>
		<title>File:Kraken logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Kraken_logo.png&amp;diff=253620"/>
				<updated>2019-08-09T17:49:05Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Kraken logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Daylight_logo.png&amp;diff=253619</id>
		<title>File:Daylight logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Daylight_logo.png&amp;diff=253619"/>
				<updated>2019-08-09T17:47:36Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Daylight Studio logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253435</id>
		<title>OWASP Portland 2019 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=253435"/>
				<updated>2019-07-30T17:02:54Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the fourth year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for the local Portland security community to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with other local infosec and appsec enthusiasts and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
The 4th annual OWASP Portland 2019 Training Day date will be on September 25, 2019. See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;General registration date will be announced soon.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2019 Training Day? Subscribe to the [https://groups.google.com/a/owasp.org/forum/#!forum/portland-chapter] Portland OWASP mailing list or follow [https://twitter.com/portlandowasp @PortlandOWASP] on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session. Each participant can register for one morning course, one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== AWS API Threat Modeling and Automated Testing ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kendra Ash''&lt;br /&gt;
&lt;br /&gt;
Abstract: If you are a software, DevOps, QA or security engineer and want to learn how to threat model API's in AWS this course is for you. This course will cover the what, why, when, and how of threat modeling applications in your organization. The bulk of this course will be based on the book Threat Modeling by Adam Shostack and will leverage a variant of the Escalation of Privileges card game. Also, I will dive into the approach I have used to gain adoption from engineering teams as a security engineer.&lt;br /&gt;
After gaining an understanding of threat modeling, we will dive into how we can automate security checks for an AWS environment — leveraging the AWS CLI tool to provide quick engineering feedback on ways to improve the security of their infrastructure.&lt;br /&gt;
&lt;br /&gt;
Bio: Kendra Ash (@securelykash) is an information security engineer at Vacasa, actively building a security team and program by leveraging guidance from her network and industry standards.&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Security Tools and Jenkins Pipeline ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Sneha Kokil''&lt;br /&gt;
&lt;br /&gt;
Abstract: Modern application development embeds security activities in SDLC, while adopting DevSecOps culture. Security tools are being viewed in the context of continuous integration and automation, which are the key factors in achieving a successful DevSecOps implementation. Integrating security tools in the CI/CD pipelines has become a primary focus of most of the organizations, who are striving to build application security from within. This workshop focuses on getting a good understanding of how some of the open source security tools can be integrated in Jenkins CI/CD pipeline for languages such as Go and Java, along with application container scanning solutions. The workshop will be a hands-on experience, where the participants will write their own pipeline code for integrating security tools. The key takeaways from this workshop will help participants experience how security tooling fits into CI/CD pipelines. It will also help them appreciate the real-world challenges and possible solutions, when integrating security in existing SDLC.&lt;br /&gt;
&lt;br /&gt;
Bio: Sneha Kokil is a senior security consultant at Synopsys. With a master's degree in information security from Northeastern University, along with several years of development and security experience, she specializes in integrating software security toolchains within SDLC processes. She is immensely passionate about DevSecOps and how it helps building security in. Outside of work, she is an avid biography and science fiction reader, a swimmer, and a mother to a wonderful daughter.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Top 10 / Juice Shop Hack Session ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: David Quisenberry''&lt;br /&gt;
&lt;br /&gt;
Abstract: This session is meant for those new to OWASP Top Ten. We will go over the OWASP Top Ten - where it came from, what it’s good for, what are the top ten, etc. And illustrate the concepts in the OWASP Top Ten through another OWASP Flagship Project - The OWASP Juice Shop. This will be a hands on class so everyone can follow along in the Juice Shop to explore the concepts. There will be time at the end for everyone to continue on their vulnerability hunting and a friendly Juice Shop CTF.&lt;br /&gt;
&lt;br /&gt;
Bio: David Quisenberry (@dmqpdx16) is a backend developer and security champion with Daylight Studio, a local Portland boutique web agency. He serves on the Portland OWASP board as Outreach/Events coordinator and does what he can to up the involvement of established and emerging software developers in security conversations. &lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running docker and burpsuite.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Students should be familiar with popular web application testing proxies such as Burp Proxy or OWASP ZAP. Some experience with basic SQL injection attacks is recommended.&lt;br /&gt;
&lt;br /&gt;
=== Container Security ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Alex Ivkin''&lt;br /&gt;
&lt;br /&gt;
Abstract: &amp;quot;When it comes to container security there are two prevailing schools of thought - either containers are secure by default, so you should not care much, or containers can not be secure in principle, so you should avoid them at all costs. In this training you will go through the real world examples of configuring and running containers in a secure manner. You will get insights into the security of both Windows and Linux containers, container infrastructure, such as container registries and orchestration platforms - docker swarm and kubernetes. We will examine real world vulnerabilities unique to different architectures of containers and how to address them.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
# Building and running docker containers securely&lt;br /&gt;
# Avoiding common pitfalls in docker infrastructure setup (dockerd, docker registry)&lt;br /&gt;
# Navigating security in the container orchestration platforms (docker swarm, kubernetes)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Bio: Alex Ivkin (@alerxes) is a Director of Solutions at Eclypsium, a local Portland company, specializing in firmware, hardware and supply chain security. Alex has deep implementation experience in a long list of security domains, including cloud, application security and IAM. He co-authored the ISACA CSX Professional certification and is an alpine climber.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: &lt;br /&gt;
* Mid to advanced level technical experience&lt;br /&gt;
* Basic experience with running docker containers&lt;br /&gt;
* Laptop with docker for windows setup and tested&lt;br /&gt;
&lt;br /&gt;
=== Intro to Chrome Exploitation ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Justin Angra''&lt;br /&gt;
&lt;br /&gt;
Abstract: Over 3 billion browser devices are actively loading arbitrary data served by someone else. What happens if one of those pages contains maliciously crafted JavaScript? Could they capture your passwords, perform UXSS, or worse - execute local code on your machine? In this session, you will get the opportunity to explore the anatomy and play with common vulnerability patterns in the renderer process of Chrome. This will be an interactive class; please bring a laptop with Docker installed.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Amass: Discovering Your Exposure on the Internet ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Jeff Foley ''&lt;br /&gt;
&lt;br /&gt;
Abstract: Today, large organizations deal with the challenge of running their infrastructure across many networks and namespaces due to the use of cloud and hosting services, legacy environments and acquisitions. This can make it difficult to maintain visibility of Internet-facing assets and to track down systems that pose a risk to security. The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery. During this talk, the founder of the project will discuss how OWASP Amass uses OSINT, network reconnaissance, graph databases and information sharing to provide both attackers and defenders better visibility of target organizations.&lt;br /&gt;
&lt;br /&gt;
Bio: Jeff Foley is the Founder and Project Leader of the OWASP Amass project. Mr. Foley has nearly 20 years of experience as an innovator for research &amp;amp; development, software engineering and red team activities in information security. He is a results-driven technical leader known for delivering game-changing research findings to overcome real-world challenges. Jeff serves as the Manager for Vulnerability Engineering at National Grid and is the CTO &amp;amp; Co-founder of ClaritySec, an Upstate New York based information security startup. Prior to this, he was the Director of Research for the Cyber Systems, Weapon Systems &amp;amp; Sensors Operation at Alion Science &amp;amp; Technology. While serving at Northrop Grumman, Jeff built and led the internal penetration testing team and was the program manager for offensive security research &amp;amp; development. Mr. Foley also shares his expertise and experience by supporting several local university information security programs and participating in information security competitions, such as the SUNY Polytechnic Institute Cybersecurity Advisory Board, Mohawk Valley Community College Computer Science Advisory Board and the CNY Hackathon Competition.&lt;br /&gt;
&lt;br /&gt;
=2019 Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Here is a document outlining the opportunities: [https://drive.google.com/file/d/0BydPdSuBlQ4scm1DRmlwMVNyUE11TzdxV1VoZ1lNRTdueTBv/view?usp=sharing Sponsorship-Doc]. Reach out to david.quisenberry@owasp.org to let us know.'''&lt;br /&gt;
&lt;br /&gt;
== 2018 Sponsors == &lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]] &lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2019 Training Day will be on September 25, 2019. &lt;br /&gt;
&lt;br /&gt;
This year for the 2nd time, we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AWS API Threat Modeling and Automated Testing &amp;lt;br&amp;gt;(Kendra Ash)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Security Tools and Jenkins Pipeline &amp;lt;br&amp;gt;(Sneha Kokil)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Top 10 / Juice Shop Hack Session &amp;lt;br&amp;gt;(David Quisenberry)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Container Security &amp;lt;br&amp;gt;(Alex Ivkin)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Chrome Exploitation &amp;lt;br&amp;gt;(Justin Angra)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Amass: Discovering Your Exposure on the Internet &amp;lt;br&amp;gt;(Jeff Foley)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Interested in teaching a training at Training Day 2019? Contact Portland OWASP via the mailing list or Twitter!&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration will again be via EventBrite&lt;br /&gt;
&lt;br /&gt;
Thank you to the OWASP Foundation and the many sponsors, trainers, volunteers and trainers that have helped make Training Day a success and allow us to continue!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=252913</id>
		<title>OWASP Portland 2019 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2019_Training_Day&amp;diff=252913"/>
				<updated>2019-07-09T05:16:37Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Update available courses so far&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the fourth year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for the local Portland security community to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with other local infosec and appsec enthusiasts and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
The 4th annual OWASP Portland 2019 Training Day date will be on September 25, 2019. See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;General registration date will be announced soon.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2019 Training Day? Subscribe to the [https://groups.google.com/a/owasp.org/forum/#!forum/portland-chapter] Portland OWASP mailing list or follow [https://twitter.com/portlandowasp @PortlandOWASP] on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session.  Each participant can register for one morning course, one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== All Day Session ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP Top 10 / Juice Shop Hack Session (all day) ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;This course is subject to change from a full day course to either a morning or afternoon session - TBD&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Instructor: David Quisenberry (ALL DAY SESSION)''&lt;br /&gt;
&lt;br /&gt;
Abstract: This session is meant for those new to OWASP Top Ten. We will go over the OWASP Top Ten - where it came from, what it’s good for, what are the top ten, etc. And illustrate the concepts in the OWASP Top Ten through another OWASP Flagship Project - The OWASP Juice Shop. This will be a hands on class so everyone can follow along in the Juice Shop to explore the concepts. There will be time at the end for everyone to continue on their vulnerability hunting and a friendly Juice Shop CTF.&lt;br /&gt;
&lt;br /&gt;
Bio: David Quisenberry (@dmqpdx16) is a backend developer and security champion with Daylight Studio, a local Portland boutique web agency. He serves on the Portland OWASP board as Outreach/Events coordinator and does what he can to up the involvement of established and emerging software developers in security conversations.  &lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running docker and burpsuite.&lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== Android Apps Hands-On ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Alexei Kojenov''&lt;br /&gt;
&lt;br /&gt;
Abstract: Mobile apps are released and updated with the speed of light (or faster??), and there is an app for every purpose. Naturally, one may wonder if these apps are secure, and if not, what can be done to improve them. But first, one must understand the common mobile app security considerations and vulnerabilities, and how an attacker would discover and exploit them. In this workshop, we’ll talk about the most common Android application vulnerabilities, and learn the ways to reverse engineer and pentest Android apps. Note: We’ll focus primarily on applications rather than the platform, and won’t go into debates like “Android vs. iOS” :) Also, you do not need to own an Android device in order to participate, as we’ll be using software emulation for our exercises.&lt;br /&gt;
&lt;br /&gt;
Bio: Alexei Kojenov (@kojenov) is a Senior Product Security Engineer with years of prior software development experience. During his programming days at a large technology company, he gradually moved from writing code to breaking code, which he enjoyed a lot! Alexei then decided to go work for an application security consulting company, helping big and small businesses identify and fix security vulnerabilities and design secure applications. Currently, he is part of Salesforce’s product security team, helping to deliver on Salesforce's #1 value: Trust.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: A laptop with Windows, MacOS, or Linux, and virtualization support.&lt;br /&gt;
&lt;br /&gt;
=== AWS API Threat Modeling and Automated Testing ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kendra Ash''&lt;br /&gt;
&lt;br /&gt;
Abstract: If you are a software, DevOps, QA or security engineer and want to learn how to threat model API's in AWS this course is for you. This course will cover the what, why, when, and how of threat modeling applications in your organization. The bulk of this course will be based on the book Threat Modeling by Adam Shostack and will leverage a variant of the Escalation of Privileges card game. Also, I will dive into the approach I have used to gain adoption from engineering teams as a security engineer.&lt;br /&gt;
After gaining an understanding of threat modeling, we will dive into how we can automate security checks for an AWS environment — leveraging the AWS CLI tool to provide quick engineering feedback on ways to improve the security of their infrastructure.&lt;br /&gt;
&lt;br /&gt;
Bio: Kendra Ash (@securelykash) is an information security engineer at Vacasa, actively building a security team and program by leveraging guidance from her network and industry standards.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: TBD&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Students should be familiar with popular web application testing proxies such as Burp Proxy or OWASP ZAP. Some experience with basic SQL injection attacks is recommended.&lt;br /&gt;
&lt;br /&gt;
=== Container Security ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Alex Ivkin''&lt;br /&gt;
&lt;br /&gt;
Abstract: &amp;quot;When it comes to container security there are two prevailing schools of thought - either containers are secure by default, so you should not care much, or containers can not be secure in principle, so you should avoid them at all costs. In this training you will go through the real world examples of configuring and running containers in a secure manner. You will get insights into the security of both Windows and Linux containers, container infrastructure, such as container registries and orchestration platforms - docker swarm and kubernetes. We will examine real world vulnerabilities unique to different architectures of containers and how to address them.&lt;br /&gt;
&lt;br /&gt;
Takeaways:&lt;br /&gt;
# Building and running docker containers securely&lt;br /&gt;
# Avoiding common pitfalls in docker infrastructure setup (dockerd, docker registry)&lt;br /&gt;
# Navigating security in the container orchestration platforms (docker swarm, kubernetes)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Bio: Alex Ivkin (@alerxes) is a Director of Solutions at Eclypsium, a local Portland company, specializing in firmware, hardware and supply chain security. Alex has deep implementation experience in a long list of security domains, including cloud, application security and IAM. He co-authored the ISACA CSX Professional certification and is an alpine climber.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: &lt;br /&gt;
* Mid to advanced level technical experience&lt;br /&gt;
* Basic experience with running docker containers&lt;br /&gt;
* Laptop with docker for windows setup and tested&lt;br /&gt;
&lt;br /&gt;
=2019 Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Watch this space for 2019 sponsorship information or contact us via the mailing list or Twitter!'''&lt;br /&gt;
&lt;br /&gt;
== 2018 Sponsors == &lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]] &lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2019 Training Day will be on September 25, 2019.  &lt;br /&gt;
&lt;br /&gt;
This year for the 2nd time, we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Top 10 / Juice Shop Hack Session (ALL DAY) &amp;lt;br&amp;gt;(David Quisenberry)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Android Apps Hands-On &amp;lt;br&amp;gt;(Alexei Kojenov)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AWS API Threat Modeling and Automated Testing &amp;lt;br&amp;gt;(Kendra Ash)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |TBD &amp;lt;br&amp;gt;(TBD)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |OWASP Top 10 / Juice Shop Hack Session (ALL DAY) &amp;lt;br&amp;gt;(David Quisenberry)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Container Security &amp;lt;br&amp;gt;(Alex Ivkin)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |TBD &amp;lt;br&amp;gt;(TBD)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Interested in teaching a training at Training Day 2019? Contact Portland OWASP via the mailing list or Twitter!&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration will again be via EventBrite&lt;br /&gt;
&lt;br /&gt;
Thank you to the OWASP Foundation and the many sponsors, trainers, volunteers and trainers that have helped make Training Day a success and allow us to continue!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Portland&amp;diff=246565</id>
		<title>Portland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Portland&amp;diff=246565"/>
				<updated>2019-01-15T09:01:00Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Add Vacasa Logo as Chapter Support&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to the Portland, Oregon OWASP Chapter.&lt;br /&gt;
&lt;br /&gt;
[[File:Portland_and_Mt_Hood.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Events=&lt;br /&gt;
&lt;br /&gt;
Past and future event information can be found in [http://calagator.org/events/search?query=OWASP Calagator].&lt;br /&gt;
&lt;br /&gt;
The Portland OWASP chapter aims to hold a chapter meeting once every month. There is also an OWASP training day held each year, featuring workshops ranging in multiple information security practices.&lt;br /&gt;
&lt;br /&gt;
Feel free to join us on [https://www.meetup.com/OWASP-Portland-Chapter/ Meetup], [https://www.linkedin.com/groups/4223013/ LinkedIn], and follow us on [https://twitter.com/PortlandOWASP Twitter] for upcoming events!&lt;br /&gt;
=For Participants=&lt;br /&gt;
OWASP Foundation ([https://docs.google.com/a/owasp.org/presentation/d/1ZgY25F0F7QgScMlB1X7LAa70LtyJql8XqcYdR4suPUo/edit#slide=id.p Overview Slides]) is a professional association of[[Membership | global members]] and is and open to anyone interested in learning more about software security. Local chapters are run independently by volunteers and guided by the [[Chapter_Leader_Handbook|Handbook]]. &lt;br /&gt;
&lt;br /&gt;
If you are interested in attending chapter meetings or otherwise getting involved, we &amp;lt;i&amp;gt;strongly&amp;lt;/i&amp;gt; encourage you to join the [http://lists.owasp.org/mailman/listinfo/owasp-Portland local chapter email list].  This list is low-volume, but acts as a great resource for local security information and announcements about chapter meetings.&lt;br /&gt;
&lt;br /&gt;
=For Speakers=&lt;br /&gt;
We would be thrilled if you would like to come give a talk at one of our chapter meetings.  Anything security-related is a good candidate for a talk and will likely draw an interested audience.  Suggestions for possible topics for future meetings:&lt;br /&gt;
&lt;br /&gt;
* Integrating security into an SDLC&lt;br /&gt;
* HTML5 security&lt;br /&gt;
* Social engineering&lt;br /&gt;
* Application Security Tools Review &amp;amp; Comparisons&lt;br /&gt;
* Discussion starters for controversial security topics&lt;br /&gt;
* Your experiences trying to implement a security solution&lt;br /&gt;
* Security basics talks; introductions to secure coding practices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our OWASP meetings typically draw between 15 to 25 attendees. Chapter meetings are a great place to do a dry run of talks you intend to give at conferences or just to connect with locals.  Before you present, please be sure you carefully review the [[Speaker_Agreement | speaker agreement]].&lt;br /&gt;
&lt;br /&gt;
= OWASP Annual Training Day =&lt;br /&gt;
[[OWASP Portland 2018 Training Day|2018 Training Day]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland 2017 Training Day|2017 Training Day]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland 2016 Training Day|2016 Training Day]]&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
Your current Portland chapter board:&lt;br /&gt;
&lt;br /&gt;
*Bhushan Gupta - 2018 Chapter Leader&lt;br /&gt;
*Ian Melven - 2019 Chapter Leader&lt;br /&gt;
*David Quisenberry - Community Outreach&lt;br /&gt;
*Sonny Nallamilli - 2018 Treasurer&lt;br /&gt;
*Benny Zhao - 2019 Treasurer&lt;br /&gt;
&lt;br /&gt;
Other volunteers and organizers:&lt;br /&gt;
&lt;br /&gt;
*James Bohem&lt;br /&gt;
*Adam Russell &amp;lt;adam . russell {a} owasp . org&amp;gt;&lt;br /&gt;
*Matthew Lapworth&lt;br /&gt;
*Katie Feucht&lt;br /&gt;
*Timothy D. Morgan &amp;lt;tim . morgan {a} owasp . org&amp;gt; - Founder&lt;br /&gt;
*AJ Dexter (aj.dexter 'at' gmail.com) - Founder (now retired)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Supporters =&lt;br /&gt;
Besides being funded through individual contributions and chapter memberships, our chapter is also supported through corporate sponsors.  We would like to thank our sponsors for making many excellent activities possible:&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
=== Champion Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|frameless|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:Vacasa Logo .png|frameless|375x375px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland Sponsorship Archive|Past Chapter Supporters]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;&amp;lt;big&amp;gt;Want to become a chapter supporter?  See the [[OWASP Portland Sponsorship Policy]] for more information.&amp;lt;/big&amp;gt;&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Donate ==&lt;br /&gt;
OWASP is non-profit, volunteer-managed organization.  All chapters are organized by volunteers.  By donating to your local chapter or becoming an OWASP member, you help support a variety of activities and events including chapter meetings, competitions, and training.  As a [[About_OWASP | 501(c)(3)]] non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible.  Financial contributions should only be made online using the authorized online chapter donation button.&lt;br /&gt;
&lt;br /&gt;
[[Image:Btn_donate_SM.gif|link=http://www.regonline.com/donation_1044369]] to this chapter or become a local chapter supporter.&lt;br /&gt;
&lt;br /&gt;
Or consider the value of [[Membership | Individual, Corporate, or Academic Supporter membership]]. Ready to become a member? [[Image:Join_Now_BlueIcon.JPG|75px|link=https://myowasp.force.com/memberappregion]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Oregon]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Vacasa_Logo_.png&amp;diff=246564</id>
		<title>File:Vacasa Logo .png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Vacasa_Logo_.png&amp;diff=246564"/>
				<updated>2019-01-15T08:57:50Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Vacasa Logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Vacasa_Logo.png&amp;diff=246563</id>
		<title>File:Vacasa Logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Vacasa_Logo.png&amp;diff=246563"/>
				<updated>2019-01-15T08:55:58Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Vacasa Logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Portland&amp;diff=246481</id>
		<title>Portland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Portland&amp;diff=246481"/>
				<updated>2019-01-09T21:10:25Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: 2019 update on supporters for chapter&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to the Portland, Oregon OWASP Chapter.&lt;br /&gt;
&lt;br /&gt;
[[File:Portland_and_Mt_Hood.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Events=&lt;br /&gt;
&lt;br /&gt;
Past and future event information can be found in [http://calagator.org/events/search?query=OWASP Calagator].&lt;br /&gt;
&lt;br /&gt;
The Portland OWASP chapter aims to hold a chapter meeting once every month. There is also an OWASP training day held each year, featuring workshops ranging in multiple information security practices.&lt;br /&gt;
&lt;br /&gt;
Feel free to join us on [https://www.meetup.com/OWASP-Portland-Chapter/ Meetup], [https://www.linkedin.com/groups/4223013/ LinkedIn], and follow us on [https://twitter.com/PortlandOWASP Twitter] for upcoming events!&lt;br /&gt;
=For Participants=&lt;br /&gt;
OWASP Foundation ([https://docs.google.com/a/owasp.org/presentation/d/1ZgY25F0F7QgScMlB1X7LAa70LtyJql8XqcYdR4suPUo/edit#slide=id.p Overview Slides]) is a professional association of[[Membership | global members]] and is and open to anyone interested in learning more about software security. Local chapters are run independently by volunteers and guided by the [[Chapter_Leader_Handbook|Handbook]]. &lt;br /&gt;
&lt;br /&gt;
If you are interested in attending chapter meetings or otherwise getting involved, we &amp;lt;i&amp;gt;strongly&amp;lt;/i&amp;gt; encourage you to join the [http://lists.owasp.org/mailman/listinfo/owasp-Portland local chapter email list].  This list is low-volume, but acts as a great resource for local security information and announcements about chapter meetings.&lt;br /&gt;
&lt;br /&gt;
=For Speakers=&lt;br /&gt;
We would be thrilled if you would like to come give a talk at one of our chapter meetings.  Anything security-related is a good candidate for a talk and will likely draw an interested audience.  Suggestions for possible topics for future meetings:&lt;br /&gt;
&lt;br /&gt;
* Integrating security into an SDLC&lt;br /&gt;
* HTML5 security&lt;br /&gt;
* Social engineering&lt;br /&gt;
* Application Security Tools Review &amp;amp; Comparisons&lt;br /&gt;
* Discussion starters for controversial security topics&lt;br /&gt;
* Your experiences trying to implement a security solution&lt;br /&gt;
* Security basics talks; introductions to secure coding practices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our OWASP meetings typically draw between 15 to 25 attendees. Chapter meetings are a great place to do a dry run of talks you intend to give at conferences or just to connect with locals.  Before you present, please be sure you carefully review the [[Speaker_Agreement | speaker agreement]].&lt;br /&gt;
&lt;br /&gt;
= OWASP Annual Training Day =&lt;br /&gt;
[[OWASP Portland 2018 Training Day|2018 Training Day]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland 2017 Training Day|2017 Training Day]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland 2016 Training Day|2016 Training Day]]&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
Your current Portland chapter board:&lt;br /&gt;
&lt;br /&gt;
*Bhushan Gupta - 2018 Chapter Leader&lt;br /&gt;
*Ian Melven - 2019 Chapter Leader&lt;br /&gt;
*David Quisenberry - Community Outreach&lt;br /&gt;
*Sonny Nallamilli - 2018 Treasurer&lt;br /&gt;
*Benny Zhao - 2019 Treasurer&lt;br /&gt;
&lt;br /&gt;
Other volunteers and organizers:&lt;br /&gt;
&lt;br /&gt;
*James Bohem&lt;br /&gt;
*Adam Russell &amp;lt;adam . russell {a} owasp . org&amp;gt;&lt;br /&gt;
*Matthew Lapworth&lt;br /&gt;
*Katie Feucht&lt;br /&gt;
*Timothy D. Morgan &amp;lt;tim . morgan {a} owasp . org&amp;gt; - Founder&lt;br /&gt;
*AJ Dexter (aj.dexter 'at' gmail.com) - Founder (now retired)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Supporters =&lt;br /&gt;
Besides being funded through individual contributions and chapter memberships, our chapter is also supported through corporate sponsors.  We would like to thank our sponsors for making many excellent activities possible:&lt;br /&gt;
&lt;br /&gt;
== 2019 ==&lt;br /&gt;
=== Champion Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|frameless|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland Sponsorship Archive|Past Chapter Supporters]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;&amp;lt;big&amp;gt;Want to become a chapter supporter?  See the [[OWASP Portland Sponsorship Policy]] for more information.&amp;lt;/big&amp;gt;&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Donate ==&lt;br /&gt;
OWASP is non-profit, volunteer-managed organization.  All chapters are organized by volunteers.  By donating to your local chapter or becoming an OWASP member, you help support a variety of activities and events including chapter meetings, competitions, and training.  As a [[About_OWASP | 501(c)(3)]] non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible.  Financial contributions should only be made online using the authorized online chapter donation button.&lt;br /&gt;
&lt;br /&gt;
[[Image:Btn_donate_SM.gif|link=http://www.regonline.com/donation_1044369]] to this chapter or become a local chapter supporter.&lt;br /&gt;
&lt;br /&gt;
Or consider the value of [[Membership | Individual, Corporate, or Academic Supporter membership]]. Ready to become a member? [[Image:Join_Now_BlueIcon.JPG|75px|link=https://myowasp.force.com/memberappregion]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Oregon]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_Sponsorship_Archive&amp;diff=246479</id>
		<title>OWASP Portland Sponsorship Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_Sponsorship_Archive&amp;diff=246479"/>
				<updated>2019-01-09T21:00:09Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Archive past supporters&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains an archive of companies who have sponsored the OWASP Portland chapter in the past.&lt;br /&gt;
&lt;br /&gt;
== 2018 ==&lt;br /&gt;
=== Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|frameless|link=https://newrelic.com/]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|link=https://www.jamasoftware.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:webmd.png|x110px|frameless|link=https://www.webmdhealthservices.com/]]&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
=== Champion Supporters ===&lt;br /&gt;
&amp;lt;i&amp;gt;None&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
&amp;lt;i&amp;gt;None&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|frameless|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|link=https://www.jamasoftware.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:webmd.png|x110px|frameless|link=https://www.webmdhealthservices.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2015 ==&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:blindspot-logo.png|x90px|frameless|left|link=https://blindspotsecurity.com/]]&lt;br /&gt;
[[File:Jive.png|x100px|frameless|right|link=https://www.jivesoftware.com/]]&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|center|link=https://www.jamasoftware.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2014 ==&lt;br /&gt;
&lt;br /&gt;
=== Champion Supporters ===&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:Jive.png|x100px|link=https://www.jivesoftware.com/]]&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Portland&amp;diff=245181</id>
		<title>Portland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Portland&amp;diff=245181"/>
				<updated>2018-11-16T07:45:16Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Add Meetup page, Twitter, and Training Day links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to the Portland, Oregon OWASP Chapter.&lt;br /&gt;
&lt;br /&gt;
[[File:Portland_and_Mt_Hood.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Events=&lt;br /&gt;
&lt;br /&gt;
Past and future event information can be found in [http://calagator.org/events/search?query=OWASP Calagator].&lt;br /&gt;
&lt;br /&gt;
The Portland OWASP chapter aims to hold a chapter meeting once every month. There is also an OWASP training day held each year, featuring workshops ranging in multiple information security practices.&lt;br /&gt;
&lt;br /&gt;
Feel free to join us on our [https://www.meetup.com/OWASP-Portland-Chapter/ Meetup Page] and follow us on [https://twitter.com/PortlandOWASP Twitter] for upcoming events!&lt;br /&gt;
=For Participants=&lt;br /&gt;
OWASP Foundation ([https://docs.google.com/a/owasp.org/presentation/d/1ZgY25F0F7QgScMlB1X7LAa70LtyJql8XqcYdR4suPUo/edit#slide=id.p Overview Slides]) is a professional association of[[Membership | global members]] and is and open to anyone interested in learning more about software security. Local chapters are run independently by volunteers and guided by the [[Chapter_Leader_Handbook|Handbook]]. &lt;br /&gt;
&lt;br /&gt;
If you are interested in attending chapter meetings or otherwise getting involved, we &amp;lt;i&amp;gt;strongly&amp;lt;/i&amp;gt; encourage you to join the [http://lists.owasp.org/mailman/listinfo/owasp-Portland local chapter email list].  This list is low-volume, but acts as a great resource for local security information and announcements about chapter meetings.&lt;br /&gt;
&lt;br /&gt;
=For Speakers=&lt;br /&gt;
We would be thrilled if you would like to come give a talk at one of our chapter meetings.  Anything security-related is a good candidate for a talk and will likely draw an interested audience.  Suggestions for possible topics for future meetings:&lt;br /&gt;
&lt;br /&gt;
* Integrating security into an SDLC&lt;br /&gt;
* HTML5 security&lt;br /&gt;
* Social engineering&lt;br /&gt;
* Application Security Tools Review &amp;amp; Comparisons&lt;br /&gt;
* Discussion starters for controversial security topics&lt;br /&gt;
* Your experiences trying to implement a security solution&lt;br /&gt;
* Security basics talks; introductions to secure coding practices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our OWASP meetings typically draw between 15 to 25 attendees. Chapter meetings are a great place to do a dry run of talks you intend to give at conferences or just to connect with locals.  Before you present, please be sure you carefully review the [[Speaker_Agreement | speaker agreement]].&lt;br /&gt;
&lt;br /&gt;
= OWASP Annual Training Day =&lt;br /&gt;
[[OWASP Portland 2018 Training Day|2018 Training Day]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland 2017 Training Day|2017 Training Day]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland 2016 Training Day|2016 Training Day]]&lt;br /&gt;
&lt;br /&gt;
=Contact=&lt;br /&gt;
&lt;br /&gt;
Your current Portland chapter board:&lt;br /&gt;
&lt;br /&gt;
*Bhushan Gupta - Chapter Leader&lt;br /&gt;
*Ian Melven - Community Outreach&lt;br /&gt;
*Sonny Nallamilli - Treasurer&lt;br /&gt;
&lt;br /&gt;
Other volunteers and organizers:&lt;br /&gt;
&lt;br /&gt;
*James Bohem&lt;br /&gt;
*Adam Russell &amp;lt;adam . russell {a} owasp . org&amp;gt;&lt;br /&gt;
*Matthew Lapworth&lt;br /&gt;
*Katie Feucht&lt;br /&gt;
*Timothy D. Morgan &amp;lt;tim . morgan {a} owasp . org&amp;gt; - Founder&lt;br /&gt;
*AJ Dexter (aj.dexter 'at' gmail.com) - Founder (now retired)&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Supporters =&lt;br /&gt;
Besides being funded through individual contributions and chapter memberships, our chapter is also supported through corporate sponsors.  We would like to thank our sponsors for making many excellent activities possible:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2017 ==&lt;br /&gt;
=== Champion Supporters ===&lt;br /&gt;
&amp;lt;i&amp;gt;None yet!&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
&amp;lt;i&amp;gt;None yet!&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2016 ==&lt;br /&gt;
&lt;br /&gt;
=== Signature Supporters ===&lt;br /&gt;
[[File:simple-logo.png|x100px|link=https://simple.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Newrelic-logo.png|x100px|frameless|link=https://newrelic.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Patron Supporters ===&lt;br /&gt;
[[File:Jama-logo.png|x100px|frameless|link=https://www.jamasoftware.com/]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:webmd.png|x110px|frameless|link=https://www.webmdhealthservices.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland Sponsorship Archive|Past Chapter Supporters]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;&amp;lt;big&amp;gt;Want to become a chapter supporter?  See the [[OWASP Portland Sponsorship Policy]] for more information.&amp;lt;/big&amp;gt;&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Donate ==&lt;br /&gt;
OWASP is non-profit, volunteer-managed organization.  All chapters are organized by volunteers.  By donating to your local chapter or becoming an OWASP member, you help support a variety of activities and events including chapter meetings, competitions, and training.  As a [[About_OWASP | 501(c)(3)]] non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible.  Financial contributions should only be made online using the authorized online chapter donation button.&lt;br /&gt;
&lt;br /&gt;
[[Image:Btn_donate_SM.gif|link=http://www.regonline.com/donation_1044369]] to this chapter or become a local chapter supporter.&lt;br /&gt;
&lt;br /&gt;
Or consider the value of [[Membership | Individual, Corporate, or Academic Supporter membership]]. Ready to become a member? [[Image:Join_Now_BlueIcon.JPG|75px|link=https://myowasp.force.com/memberappregion]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Oregon]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=243789</id>
		<title>OWASP Portland 2018 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=243789"/>
				<updated>2018-09-27T17:38:33Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the third year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for those interested to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with the local infosec community and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
OWASP Portland 2018 Training Day will be '''October 3, 2018.''' See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;General registration is open on September 1, 2018. If you have recently donated to the OWASP Portland Chapter by accident (thinking you have registered for a course), we will issue you a refund. When registration is open, you should be able to select the available courses you want to take.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2018 Training Day? Subscribe to the Portland OWASP mailing list or follow @PortlandOWASP on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session.  Each participant can register for one morning course, or one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== Intro to Hacking Web 3.0 ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Security Innovation ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Mick Ayzenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: In this half day course, we will introduce several emerging Blockchain concepts such as Web 3.0, smart contracts, and decentralized applications (DApps).  You will get the opportunity to explore and interact with applications on this platform, and will be introduced to several of the most common vulnerability categories found in smart contracts through a capture the flag platform. This class will be highly interactive, so bring a laptop. No previous Blockchain experience required.&lt;br /&gt;
&lt;br /&gt;
=== Introduction to Computer Forensics ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kris Rosenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: It’s 3AM and the phone rings… ok, maybe not 3AM, but you get the call that a computer system on your network is acting strange.  After taking a look you realize that this system may be infected with malware, or possibly you have an active intruder inside your network.  What do you do next?  This session will guide you through the basic initial steps that can be taken in a security incident to effectively isolate and contain the attack and collect evidence for potential future prosecution.  We will introduce the PICERL framework for incident handling and discuss each phase in detail: Planning, Identification, Containment, Eradication, Recovery, and Lessons Learned.  At the end of the session you should have a basic understanding of how to respond to a potential security incident, and preserve any evidence that may be needed.&lt;br /&gt;
&lt;br /&gt;
=== Intro to Practical Internal Vulnerability Scanning ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security Group, LLC ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Patterson Cake''&lt;br /&gt;
&lt;br /&gt;
Abstract: If your organization has the resources to scan all of the things all of the time, this course may not be for you! If, however, you are like most organizations, struggling to keep up and to make tangible progress towards improving your security posture, read on! In this course, we'll discuss scanning tools and techniques to help you identify unknown devices, sensitive data exposure, and system misconfigurations within your environment, using open-source and built-in tools, like Nmap and PowerShell, along with some good old-fashioned NI (Natural Intelligence). We'll focus on practical, tactical ways to find things like unapproved IoT devices on your network, sensitive data shares with &amp;quot;Everyone&amp;quot; permissions, and web apps with default credentials, things you care about which are often easy to remediate but may not show up on traditional vulnerability or compliance scans.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running a recent version of Nmap (Windows, Linux or Mac) with admin/root privileges.&lt;br /&gt;
&lt;br /&gt;
=== Incident Handling in Cloud Environment - a primer ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by ForgeRock ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Derek Hill''&lt;br /&gt;
&lt;br /&gt;
Abstract: Have you ever wondered what it takes to investigate an incident inside your company network? What about your assets stored in a public cloud? When does an event become an incident? Who decides this?  We will cover the important steps of an incident handling process, including getting you started in creating your own incident handling plan. We will talk about the challenges of doing this in cloud, where you don't have physical access to the machines. You will walk away with an understanding of the fundamental steps of incident handling as well as some examples of what to look for, how to handle collection and preservation of evidence.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by New Relic ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
=== AppSec Testing Beyond Pen Test ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Bhushan Gupta''&lt;br /&gt;
&lt;br /&gt;
Abstract: Most web application security testing efforts are concentrated around penetration testing, which is an art based on hackers’ psyche, thought process, and determination to exploit software vulnerabilities. However, does it yield a high level of confidence and sense of security in a developer’s mind? The web application developers must begin to think of building security throughout the software development life cycle (SDLC). This workshop paper focuses on an approach that aligns the web application security testing with the three basic principles of security; confidentiality, integrity, and availability (CIA). Using a simple approach, workshop teaches how to identify the most vulnerable processes in an application, highlighting the test-intensive areas. The students will learn:&lt;br /&gt;
# How to identify the security requirements for their business &lt;br /&gt;
# How to plan security testing using both statics and dynamic code analysis&lt;br /&gt;
# How to apply STRIDE model to evaluate critical web application components&lt;br /&gt;
# How to prioritizing vulnerabilities based upon DREAD model to minimize breech impact&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Advanced Custom Network Protocol Fuzzing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Oracle Cloud Infrastructure ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joshua Pereyda''&lt;br /&gt;
&lt;br /&gt;
Abstract: Get hands on experience writing custom network protocol fuzzers. This class will cover the basics of network protocol &amp;quot;&amp;quot;smart fuzzing.&amp;quot;&amp;quot; Exercises will utilize the open source network protocol fuzzing framework, boofuzz. Attendees will gain practice reverse engineering a network protocol, implementing and iterating on a custom fuzzer, and identifying vulnerabilities. After the course:&lt;br /&gt;
&lt;br /&gt;
# You will know the basics of fuzzing.&lt;br /&gt;
# You will know how to write custom network protocol fuzzers using state of the art open source tools.&lt;br /&gt;
# You will have hands on experience with this widely-discussed but still largely mysterious test method.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Watch this space for 2018 sponsorship information!'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]] &lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:PNSQC 2018 125x125.jpg|link=https://www.pnsqc.org/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2018 Training Day will be October 3, 2018. This year we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Hacking Web 3.0 &amp;lt;br&amp;gt;(Mick Ayzenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Introduction to Computer Forensics &amp;lt;br&amp;gt;(Kris Rosenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Practical Internal Vulnerability Scanning &amp;lt;br&amp;gt;(Patterson Cake)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Incident Handling in Cloud Environment - a primer &amp;lt;br&amp;gt;(Derek Hill)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AppSec Testing Beyond Pen Test &amp;lt;br&amp;gt;(Bhushan Gupta)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Custom Network Protocol Fuzzing &amp;lt;br&amp;gt;(Joshua Pereyda)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration is via EventBrite: https://www.eventbrite.com/e/portland-owasp-training-day-2018-tickets-48203102778&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:PNSQC_2018_125x125.jpg&amp;diff=243788</id>
		<title>File:PNSQC 2018 125x125.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:PNSQC_2018_125x125.jpg&amp;diff=243788"/>
				<updated>2018-09-27T17:36:33Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;PNSQC logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242867</id>
		<title>OWASP Portland 2018 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242867"/>
				<updated>2018-08-27T22:24:41Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the third year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for those interested to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with the local infosec community and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
OWASP Portland 2018 Training Day will be '''October 3, 2018.''' See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red&amp;quot;&amp;gt;General registration is open on September 1, 2018. If you have recently donated to the OWASP Portland Chapter by accident (thinking you have registered for a course), we will issue you a refund. When registration is open, you should be able to select the available courses you want to take.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2018 Training Day? Subscribe to the Portland OWASP mailing list or follow @PortlandOWASP on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session.  Each participant can register for one morning course, or one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== Intro to Hacking Web 3.0 ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Security Innovation ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Mick Ayzenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: In this half day course, we will introduce several emerging Blockchain concepts such as Web 3.0, smart contracts, and decentralized applications (DApps).  You will get the opportunity to explore and interact with applications on this platform, and will be introduced to several of the most common vulnerability categories found in smart contracts through a capture the flag platform. This class will be highly interactive, so bring a laptop. No previous Blockchain experience required.&lt;br /&gt;
&lt;br /&gt;
=== Introduction to Computer Forensics ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kris Rosenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: It’s 3AM and the phone rings… ok, maybe not 3AM, but you get the call that a computer system on your network is acting strange.  After taking a look you realize that this system may be infected with malware, or possibly you have an active intruder inside your network.  What do you do next?  This session will guide you through the basic initial steps that can be taken in a security incident to effectively isolate and contain the attack and collect evidence for potential future prosecution.  We will introduce the PICERL framework for incident handling and discuss each phase in detail: Planning, Identification, Containment, Eradication, Recovery, and Lessons Learned.  At the end of the session you should have a basic understanding of how to respond to a potential security incident, and preserve any evidence that may be needed.&lt;br /&gt;
&lt;br /&gt;
=== Intro to Practical Internal Vulnerability Scanning ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security Group, LLC ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Patterson Cake''&lt;br /&gt;
&lt;br /&gt;
Abstract: If your organization has the resources to scan all of the things all of the time, this course may not be for you! If, however, you are like most organizations, struggling to keep up and to make tangible progress towards improving your security posture, read on! In this course, we'll discuss scanning tools and techniques to help you identify unknown devices, sensitive data exposure, and system misconfigurations within your environment, using open-source and built-in tools, like Nmap and PowerShell, along with some good old-fashioned NI (Natural Intelligence). We'll focus on practical, tactical ways to find things like unapproved IoT devices on your network, sensitive data shares with &amp;quot;Everyone&amp;quot; permissions, and web apps with default credentials, things you care about which are often easy to remediate but may not show up on traditional vulnerability or compliance scans.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running a recent version of Nmap (Windows, Linux or Mac) with admin/root privileges.&lt;br /&gt;
&lt;br /&gt;
=== Incident Handling in Cloud Environment - a primer ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by ForgeRock ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Derek Hill''&lt;br /&gt;
&lt;br /&gt;
Abstract: Have you ever wondered what it takes to investigate an incident inside your company network? What about your assets stored in a public cloud? When does an event become an incident? Who decides this?  We will cover the important steps of an incident handling process, including getting you started in creating your own incident handling plan. We will talk about the challenges of doing this in cloud, where you don't have physical access to the machines. You will walk away with an understanding of the fundamental steps of incident handling as well as some examples of what to look for, how to handle collection and preservation of evidence.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by New Relic ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
=== AppSec Testing Beyond Pen Test ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Bhushan Gupta''&lt;br /&gt;
&lt;br /&gt;
Abstract: Most web application security testing efforts are concentrated around penetration testing, which is an art based on hackers’ psyche, thought process, and determination to exploit software vulnerabilities. However, does it yield a high level of confidence and sense of security in a developer’s mind? The web application developers must begin to think of building security throughout the software development life cycle (SDLC). This workshop paper focuses on an approach that aligns the web application security testing with the three basic principles of security; confidentiality, integrity, and availability (CIA). Using a simple approach, workshop teaches how to identify the most vulnerable processes in an application, highlighting the test-intensive areas. The students will learn:&lt;br /&gt;
# How to identify the security requirements for their business &lt;br /&gt;
# How to plan security testing using both statics and dynamic code analysis&lt;br /&gt;
# How to apply STRIDE model to evaluate critical web application components&lt;br /&gt;
# How to prioritizing vulnerabilities based upon DREAD model to minimize breech impact&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Advanced Custom Network Protocol Fuzzing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Oracle Cloud Infrastructure ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joshua Pereyda''&lt;br /&gt;
&lt;br /&gt;
Abstract: Get hands on experience writing custom network protocol fuzzers. This class will cover the basics of network protocol &amp;quot;&amp;quot;smart fuzzing.&amp;quot;&amp;quot; Exercises will utilize the open source network protocol fuzzing framework, boofuzz. Attendees will gain practice reverse engineering a network protocol, implementing and iterating on a custom fuzzer, and identifying vulnerabilities. After the course:&lt;br /&gt;
&lt;br /&gt;
# You will know the basics of fuzzing.&lt;br /&gt;
# You will know how to write custom network protocol fuzzers using state of the art open source tools.&lt;br /&gt;
# You will have hands on experience with this widely-discussed but still largely mysterious test method.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Watch this space for 2018 sponsorship information!'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]] &lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2018 Training Day will be October 3, 2018. This year we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Hacking Web 3.0 &amp;lt;br&amp;gt;(Mick Ayzenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Introduction to Computer Forensics &amp;lt;br&amp;gt;(Kris Rosenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Practical Internal Vulnerability Scanning &amp;lt;br&amp;gt;(Patterson Cake)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Incident Handling in Cloud Environment - a primer &amp;lt;br&amp;gt;(Derek Hill)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AppSec Testing Beyond Pen Test &amp;lt;br&amp;gt;(Bhushan Gupta)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Custom Network Protocol Fuzzing &amp;lt;br&amp;gt;(Joshua Pereyda)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration is via EventBrite: https://www.eventbrite.com/e/portland-owasp-training-day-2018-tickets-48203102778&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242758</id>
		<title>OWASP Portland 2018 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242758"/>
				<updated>2018-08-23T03:39:03Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Added Security Innovation sponsorship&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the third year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for those interested to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with the local infosec community and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
OWASP Portland 2018 Training Day will be '''October 3, 2018.''' See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2018 Training Day? Subscribe to the Portland OWASP mailing list or follow @PortlandOWASP on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session.  Each participant can register for one morning course, or one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== Intro to Hacking Web 3.0 ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Security Innovation ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Mick Ayzenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: In this half day course, we will introduce several emerging Blockchain concepts such as Web 3.0, smart contracts, and decentralized applications (DApps).  You will get the opportunity to explore and interact with applications on this platform, and will be introduced to several of the most common vulnerability categories found in smart contracts through a capture the flag platform. This class will be highly interactive, so bring a laptop. No previous Blockchain experience required.&lt;br /&gt;
&lt;br /&gt;
=== Introduction to Computer Forensics ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kris Rosenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: It’s 3AM and the phone rings… ok, maybe not 3AM, but you get the call that a computer system on your network is acting strange.  After taking a look you realize that this system may be infected with malware, or possibly you have an active intruder inside your network.  What do you do next?  This session will guide you through the basic initial steps that can be taken in a security incident to effectively isolate and contain the attack and collect evidence for potential future prosecution.  We will introduce the PICERL framework for incident handling and discuss each phase in detail: Planning, Identification, Containment, Eradication, Recovery, and Lessons Learned.  At the end of the session you should have a basic understanding of how to respond to a potential security incident, and preserve any evidence that may be needed.&lt;br /&gt;
&lt;br /&gt;
=== Intro to Practical Internal Vulnerability Scanning ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security Group, LLC ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Patterson Cake''&lt;br /&gt;
&lt;br /&gt;
Abstract: If your organization has the resources to scan all of the things all of the time, this course may not be for you! If, however, you are like most organizations, struggling to keep up and to make tangible progress towards improving your security posture, read on! In this course, we'll discuss scanning tools and techniques to help you identify unknown devices, sensitive data exposure, and system misconfigurations within your environment, using open-source and built-in tools, like Nmap and PowerShell, along with some good old-fashioned NI (Natural Intelligence). We'll focus on practical, tactical ways to find things like unapproved IoT devices on your network, sensitive data shares with &amp;quot;Everyone&amp;quot; permissions, and web apps with default credentials, things you care about which are often easy to remediate but may not show up on traditional vulnerability or compliance scans.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running a recent version of Nmap (Windows, Linux or Mac) with admin/root privileges.&lt;br /&gt;
&lt;br /&gt;
=== Incident Handling in Cloud Environment - a primer ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by ForgeRock ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Derek Hill''&lt;br /&gt;
&lt;br /&gt;
Abstract: Have you ever wondered what it takes to investigate an incident inside your company network? What about your assets stored in a public cloud? When does an event become an incident? Who decides this?  We will cover the important steps of an incident handling process, including getting you started in creating your own incident handling plan. We will talk about the challenges of doing this in cloud, where you don't have physical access to the machines. You will walk away with an understanding of the fundamental steps of incident handling as well as some examples of what to look for, how to handle collection and preservation of evidence.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by New Relic ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
=== AppSec Testing Beyond Pen Test ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Bhushan Gupta''&lt;br /&gt;
&lt;br /&gt;
Abstract: Most web application security testing efforts are concentrated around penetration testing, which is an art based on hackers’ psyche, thought process, and determination to exploit software vulnerabilities. However, does it yield a high level of confidence and sense of security in a developer’s mind? The web application developers must begin to think of building security throughout the software development life cycle (SDLC). This workshop paper focuses on an approach that aligns the web application security testing with the three basic principles of security; confidentiality, integrity, and availability (CIA). Using a simple approach, workshop teaches how to identify the most vulnerable processes in an application, highlighting the test-intensive areas. The students will learn:&lt;br /&gt;
# How to identify the security requirements for their business &lt;br /&gt;
# How to plan security testing using both statics and dynamic code analysis&lt;br /&gt;
# How to apply STRIDE model to evaluate critical web application components&lt;br /&gt;
# How to prioritizing vulnerabilities based upon DREAD model to minimize breech impact&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Advanced Custom Network Protocol Fuzzing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Oracle Cloud Infrastructure ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joshua Pereyda''&lt;br /&gt;
&lt;br /&gt;
Abstract: Get hands on experience writing custom network protocol fuzzers. This class will cover the basics of network protocol &amp;quot;&amp;quot;smart fuzzing.&amp;quot;&amp;quot; Exercises will utilize the open source network protocol fuzzing framework, boofuzz. Attendees will gain practice reverse engineering a network protocol, implementing and iterating on a custom fuzzer, and identifying vulnerabilities. After the course:&lt;br /&gt;
&lt;br /&gt;
# You will know the basics of fuzzing.&lt;br /&gt;
# You will know how to write custom network protocol fuzzers using state of the art open source tools.&lt;br /&gt;
# You will have hands on experience with this widely-discussed but still largely mysterious test method.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Watch this space for 2018 sponsorship information!'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:Security Innovation logo.png|link=https://www.securityinnovation.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]] &lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2018 Training Day will be October 3, 2018. This year we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Hacking Web 3.0 &amp;lt;br&amp;gt;(Mick Ayzenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Introduction to Computer Forensics &amp;lt;br&amp;gt;(Kris Rosenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Practical Internal Vulnerability Scanning &amp;lt;br&amp;gt;(Patterson Cake)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Incident Handling in Cloud Environment - a primer &amp;lt;br&amp;gt;(Derek Hill)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AppSec Testing Beyond Pen Test &amp;lt;br&amp;gt;(Bhushan Gupta)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Custom Network Protocol Fuzzing &amp;lt;br&amp;gt;(Joshua Pereyda)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration is via EventBrite: https://www.eventbrite.com/e/portland-owasp-training-day-2018-tickets-48203102778&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Security_Innovation_logo.png&amp;diff=242757</id>
		<title>File:Security Innovation logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Security_Innovation_logo.png&amp;diff=242757"/>
				<updated>2018-08-23T03:36:39Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Security Innovation logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242706</id>
		<title>OWASP Portland 2018 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242706"/>
				<updated>2018-08-21T19:23:04Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Added ForgeRock sponsor, lunch ideas, and registration link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the third year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for those interested to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with the local infosec community and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
OWASP Portland 2018 Training Day will be '''October 3, 2018.''' See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2018 Training Day? Subscribe to the Portland OWASP mailing list or follow @PortlandOWASP on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session.  Each participant can register for one morning course, or one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== Intro to Hacking Web 3.0 ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Mick Ayzenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: In this half day course, we will introduce several emerging Blockchain concepts such as Web 3.0, smart contracts, and decentralized applications (DApps).  You will get the opportunity to explore and interact with applications on this platform, and will be introduced to several of the most common vulnerability categories found in smart contracts through a capture the flag platform. This class will be highly interactive, so bring a laptop. No previous Blockchain experience required.&lt;br /&gt;
&lt;br /&gt;
=== Introduction to Computer Forensics ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kris Rosenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: It’s 3AM and the phone rings… ok, maybe not 3AM, but you get the call that a computer system on your network is acting strange.  After taking a look you realize that this system may be infected with malware, or possibly you have an active intruder inside your network.  What do you do next?  This session will guide you through the basic initial steps that can be taken in a security incident to effectively isolate and contain the attack and collect evidence for potential future prosecution.  We will introduce the PICERL framework for incident handling and discuss each phase in detail: Planning, Identification, Containment, Eradication, Recovery, and Lessons Learned.  At the end of the session you should have a basic understanding of how to respond to a potential security incident, and preserve any evidence that may be needed.&lt;br /&gt;
&lt;br /&gt;
=== Intro to Practical Internal Vulnerability Scanning ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security Group, LLC ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Patterson Cake''&lt;br /&gt;
&lt;br /&gt;
Abstract: If your organization has the resources to scan all of the things all of the time, this course may not be for you! If, however, you are like most organizations, struggling to keep up and to make tangible progress towards improving your security posture, read on! In this course, we'll discuss scanning tools and techniques to help you identify unknown devices, sensitive data exposure, and system misconfigurations within your environment, using open-source and built-in tools, like Nmap and PowerShell, along with some good old-fashioned NI (Natural Intelligence). We'll focus on practical, tactical ways to find things like unapproved IoT devices on your network, sensitive data shares with &amp;quot;Everyone&amp;quot; permissions, and web apps with default credentials, things you care about which are often easy to remediate but may not show up on traditional vulnerability or compliance scans.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running a recent version of Nmap (Windows, Linux or Mac) with admin/root privileges.&lt;br /&gt;
&lt;br /&gt;
=== Incident Handling in Cloud Environment - a primer ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by ForgeRock ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Derek Hill''&lt;br /&gt;
&lt;br /&gt;
Abstract: Have you ever wondered what it takes to investigate an incident inside your company network? What about your assets stored in a public cloud? When does an event become an incident? Who decides this?  We will cover the important steps of an incident handling process, including getting you started in creating your own incident handling plan. We will talk about the challenges of doing this in cloud, where you don't have physical access to the machines. You will walk away with an understanding of the fundamental steps of incident handling as well as some examples of what to look for, how to handle collection and preservation of evidence.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by New Relic ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
=== AppSec Testing Beyond Pen Test ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Bhushan Gupta''&lt;br /&gt;
&lt;br /&gt;
Abstract: Most web application security testing efforts are concentrated around penetration testing, which is an art based on hackers’ psyche, thought process, and determination to exploit software vulnerabilities. However, does it yield a high level of confidence and sense of security in a developer’s mind? The web application developers must begin to think of building security throughout the software development life cycle (SDLC). This workshop paper focuses on an approach that aligns the web application security testing with the three basic principles of security; confidentiality, integrity, and availability (CIA). Using a simple approach, workshop teaches how to identify the most vulnerable processes in an application, highlighting the test-intensive areas. The students will learn:&lt;br /&gt;
# How to identify the security requirements for their business &lt;br /&gt;
# How to plan security testing using both statics and dynamic code analysis&lt;br /&gt;
# How to apply STRIDE model to evaluate critical web application components&lt;br /&gt;
# How to prioritizing vulnerabilities based upon DREAD model to minimize breech impact&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Advanced Custom Network Protocol Fuzzing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Oracle Cloud Infrastructure ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joshua Pereyda''&lt;br /&gt;
&lt;br /&gt;
Abstract: Get hands on experience writing custom network protocol fuzzers. This class will cover the basics of network protocol &amp;quot;&amp;quot;smart fuzzing.&amp;quot;&amp;quot; Exercises will utilize the open source network protocol fuzzing framework, boofuzz. Attendees will gain practice reverse engineering a network protocol, implementing and iterating on a custom fuzzer, and identifying vulnerabilities. After the course:&lt;br /&gt;
&lt;br /&gt;
# You will know the basics of fuzzing.&lt;br /&gt;
# You will know how to write custom network protocol fuzzers using state of the art open source tools.&lt;br /&gt;
# You will have hands on experience with this widely-discussed but still largely mysterious test method.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Watch this space for 2018 sponsorship information!'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:ForgeRock logo.png|link=https://www.forgerock.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]] &lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2018 Training Day will be October 3, 2018. This year we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Hacking Web 3.0 &amp;lt;br&amp;gt;(Mick Ayzenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Introduction to Computer Forensics &amp;lt;br&amp;gt;(Kris Rosenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Practical Internal Vulnerability Scanning &amp;lt;br&amp;gt;(Patterson Cake)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Incident Handling in Cloud Environment - a primer &amp;lt;br&amp;gt;(Derek Hill)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AppSec Testing Beyond Pen Test &amp;lt;br&amp;gt;(Bhushan Gupta)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Custom Network Protocol Fuzzing &amp;lt;br&amp;gt;(Joshua Pereyda)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Here are some lunch ideas:&lt;br /&gt;
* Farmhouse Cafe, 101 SW Main St.&lt;br /&gt;
* The Good Earth Cafe, 1136 SW 3rd Ave.&lt;br /&gt;
* Chipotle Mexican Grill, 240 SW Yamhill St.&lt;br /&gt;
* Luc Lac Vietnamese Kitchen, 835 SW 2nd Ave.&lt;br /&gt;
* Rock Bottom Restaurant &amp;amp; Brewery, 206 SW Morrison St.&lt;br /&gt;
* Buffalo Wild Wings, 327 SW Morrison St.&lt;br /&gt;
* Cafe Yumm, 301 SW Morrison St.&lt;br /&gt;
* Killer Burger, 510 SW 3rd Ave.&lt;br /&gt;
* House of Ramen, 223 SW Columbia St.&lt;br /&gt;
* There are some food carts north of the World Trade Center on SW 3rd Ave. and SW Stark St.&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
&lt;br /&gt;
Registration is via EventBrite: https://www.eventbrite.com/e/portland-owasp-training-day-2018-tickets-48203102778&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:ForgeRock_logo.png&amp;diff=242697</id>
		<title>File:ForgeRock logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:ForgeRock_logo.png&amp;diff=242697"/>
				<updated>2018-08-21T18:03:19Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ForgeRock Logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Forgerock_logo.png&amp;diff=242696</id>
		<title>File:Forgerock logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Forgerock_logo.png&amp;diff=242696"/>
				<updated>2018-08-21T17:48:59Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Forgerock logo&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Portland&amp;diff=242626</id>
		<title>Talk:Portland</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Portland&amp;diff=242626"/>
				<updated>2018-08-17T08:09:53Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Adding 2017 and 2018 Training Day links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[OWASP Portland 2018 Training Day|2018 Training Day]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland 2017 Training Day|2017 Training Day]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP Portland 2016 Training Day|2016 Training Day]]&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242625</id>
		<title>OWASP Portland 2018 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242625"/>
				<updated>2018-08-17T07:56:13Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Adding sponsorship to session&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the third year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for those interested to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with the local infosec community and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
OWASP Portland 2018 Training Day will be '''October 3, 2018.''' See [[#Details|Details]] for more info.&lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2018 Training Day? Subscribe to the Portland OWASP mailing list or follow @PortlandOWASP on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session.  Each participant can register for one morning course, or one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== Intro to Hacking Web 3.0 ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Mick Ayzenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: In this half day course, we will introduce several emerging Blockchain concepts such as Web 3.0, smart contracts, and decentralized applications (DApps).  You will get the opportunity to explore and interact with applications on this platform, and will be introduced to several of the most common vulnerability categories found in smart contracts through a capture the flag platform. This class will be highly interactive, so bring a laptop. No previous Blockchain experience required.&lt;br /&gt;
&lt;br /&gt;
=== Introduction to Computer Forensics ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kris Rosenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: It’s 3AM and the phone rings… ok, maybe not 3AM, but you get the call that a computer system on your network is acting strange.  After taking a look you realize that this system may be infected with malware, or possibly you have an active intruder inside your network.  What do you do next?  This session will guide you through the basic initial steps that can be taken in a security incident to effectively isolate and contain the attack and collect evidence for potential future prosecution.  We will introduce the PICERL framework for incident handling and discuss each phase in detail: Planning, Identification, Containment, Eradication, Recovery, and Lessons Learned.  At the end of the session you should have a basic understanding of how to respond to a potential security incident, and preserve any evidence that may be needed.&lt;br /&gt;
&lt;br /&gt;
=== Intro to Practical Internal Vulnerability Scanning ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security Group, LLC ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Patterson Cake''&lt;br /&gt;
&lt;br /&gt;
Abstract: If your organization has the resources to scan all of the things all of the time, this course may not be for you! If, however, you are like most organizations, struggling to keep up and to make tangible progress towards improving your security posture, read on! In this course, we'll discuss scanning tools and techniques to help you identify unknown devices, sensitive data exposure, and system misconfigurations within your environment, using open-source and built-in tools, like Nmap and PowerShell, along with some good old-fashioned NI (Natural Intelligence). We'll focus on practical, tactical ways to find things like unapproved IoT devices on your network, sensitive data shares with &amp;quot;Everyone&amp;quot; permissions, and web apps with default credentials, things you care about which are often easy to remediate but may not show up on traditional vulnerability or compliance scans.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running a recent version of Nmap (Windows, Linux or Mac) with admin/root privileges.&lt;br /&gt;
&lt;br /&gt;
=== Incident Handling in Cloud Environment - a primer ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by ForgeRock ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Derek Hill''&lt;br /&gt;
&lt;br /&gt;
Abstract: Have you ever wondered what it takes to investigate an incident inside your company network? What about your assets stored in a public cloud? When does an event become an incident? Who decides this?  We will cover the important steps of an incident handling process, including getting you started in creating your own incident handling plan. We will talk about the challenges of doing this in cloud, where you don't have physical access to the machines. You will walk away with an understanding of the fundamental steps of incident handling as well as some examples of what to look for, how to handle collection and preservation of evidence.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by New Relic ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
=== AppSec Testing Beyond Pen Test ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Bhushan Gupta''&lt;br /&gt;
&lt;br /&gt;
Abstract: Most web application security testing efforts are concentrated around penetration testing, which is an art based on hackers’ psyche, thought process, and determination to exploit software vulnerabilities. However, does it yield a high level of confidence and sense of security in a developer’s mind? The web application developers must begin to think of building security throughout the software development life cycle (SDLC). This workshop paper focuses on an approach that aligns the web application security testing with the three basic principles of security; confidentiality, integrity, and availability (CIA). Using a simple approach, workshop teaches how to identify the most vulnerable processes in an application, highlighting the test-intensive areas. The students will learn:&lt;br /&gt;
# How to identify the security requirements for their business &lt;br /&gt;
# How to plan security testing using both statics and dynamic code analysis&lt;br /&gt;
# How to apply STRIDE model to evaluate critical web application components&lt;br /&gt;
# How to prioritizing vulnerabilities based upon DREAD model to minimize breech impact&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Advanced Custom Network Protocol Fuzzing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Oracle Cloud Infrastructure ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joshua Pereyda''&lt;br /&gt;
&lt;br /&gt;
Abstract: Get hands on experience writing custom network protocol fuzzers. This class will cover the basics of network protocol &amp;quot;&amp;quot;smart fuzzing.&amp;quot;&amp;quot; Exercises will utilize the open source network protocol fuzzing framework, boofuzz. Attendees will gain practice reverse engineering a network protocol, implementing and iterating on a custom fuzzer, and identifying vulnerabilities. After the course:&lt;br /&gt;
&lt;br /&gt;
# You will know the basics of fuzzing.&lt;br /&gt;
# You will know how to write custom network protocol fuzzers using state of the art open source tools.&lt;br /&gt;
# You will have hands on experience with this widely-discussed but still largely mysterious test method.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Watch this space for 2018 sponsorship information!'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]] &lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2018 Training Day will be October 3, 2018. This year we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Hacking Web 3.0 &amp;lt;br&amp;gt;(Mick Ayzenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Introduction to Computer Forensics &amp;lt;br&amp;gt;(Kris Rosenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Practical Internal Vulnerability Scanning &amp;lt;br&amp;gt;(Patterson Cake)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Incident Handling in Cloud Environment - a primer &amp;lt;br&amp;gt;(Derek Hill)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AppSec Testing Beyond Pen Test &amp;lt;br&amp;gt;(Bhushan Gupta)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Custom Network Protocol Fuzzing &amp;lt;br&amp;gt;(Joshua Pereyda)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Lunch ideas for 2018 coming soon!&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
Registration information and dates coming soon!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242572</id>
		<title>OWASP Portland 2018 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242572"/>
				<updated>2018-08-15T19:58:22Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Small edits for Incident Handling workshop&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the third year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for those interested to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with the local infosec community and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2018 Training Day? Subscribe to the Portland OWASP mailing list or follow @PortlandOWASP on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session.  Each participant can register for one morning course, or one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== Intro to Hacking Web 3.0 ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Mick Ayzenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: In this half day course, we will introduce several emerging Blockchain concepts such as Web 3.0, smart contracts, and decentralized applications (DApps).  You will get the opportunity to explore and interact with applications on this platform, and will be introduced to several of the most common vulnerability categories found in smart contracts through a capture the flag platform. This class will be highly interactive, so bring a laptop. No previous Blockchain experience required.&lt;br /&gt;
&lt;br /&gt;
=== Introduction to Computer Forensics ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kris Rosenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: It’s 3AM and the phone rings… ok, maybe not 3AM, but you get the call that a computer system on your network is acting strange.  After taking a look you realize that this system may be infected with malware, or possibly you have an active intruder inside your network.  What do you do next?  This session will guide you through the basic initial steps that can be taken in a security incident to effectively isolate and contain the attack and collect evidence for potential future prosecution.  We will introduce the PICERL framework for incident handling and discuss each phase in detail: Planning, Identification, Containment, Eradication, Recovery, and Lessons Learned.  At the end of the session you should have a basic understanding of how to respond to a potential security incident, and preserve any evidence that may be needed.&lt;br /&gt;
&lt;br /&gt;
=== Intro to Practical Internal Vulnerability Scanning ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security Group, LLC ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Patterson Cake''&lt;br /&gt;
&lt;br /&gt;
Abstract: If your organization has the resources to scan all of the things all of the time, this course may not be for you! If, however, you are like most organizations, struggling to keep up and to make tangible progress towards improving your security posture, read on! In this course, we'll discuss scanning tools and techniques to help you identify unknown devices, sensitive data exposure, and system misconfigurations within your environment, using open-source and built-in tools, like Nmap and PowerShell, along with some good old-fashioned NI (Natural Intelligence). We'll focus on practical, tactical ways to find things like unapproved IoT devices on your network, sensitive data shares with &amp;quot;Everyone&amp;quot; permissions, and web apps with default credentials, things you care about which are often easy to remediate but may not show up on traditional vulnerability or compliance scans.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running a recent version of Nmap (Windows, Linux or Mac) with admin/root privileges.&lt;br /&gt;
&lt;br /&gt;
=== Incident Handling in Cloud Environment - a primer ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by ForgeRock ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Derek Hill''&lt;br /&gt;
&lt;br /&gt;
Abstract: Have you ever wondered what it takes to investigate an incident inside your company network? What about your assets stored in a public cloud? When does an event become an incident? Who decides this?  We will cover the important steps of an incident handling process, including getting you started in creating your own incident handling plan. We will talk about the challenges of doing this in cloud, where you don't have physical access to the machines. You will walk away with an understanding of the fundamental steps of incident handling as well as some examples of what to look for, how to handle collection and preservation of evidence.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
=== AppSec Testing Beyond Pen Test ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Bhushan Gupta''&lt;br /&gt;
&lt;br /&gt;
Abstract: Most web application security testing efforts are concentrated around penetration testing, which is an art based on hackers’ psyche, thought process, and determination to exploit software vulnerabilities. However, does it yield a high level of confidence and sense of security in a developer’s mind? The web application developers must begin to think of building security throughout the software development life cycle (SDLC). This workshop paper focuses on an approach that aligns the web application security testing with the three basic principles of security; confidentiality, integrity, and availability (CIA). Using a simple approach, workshop teaches how to identify the most vulnerable processes in an application, highlighting the test-intensive areas. The students will learn:&lt;br /&gt;
# How to identify the security requirements for their business &lt;br /&gt;
# How to plan security testing using both statics and dynamic code analysis&lt;br /&gt;
# How to apply STRIDE model to evaluate critical web application components&lt;br /&gt;
# How to prioritizing vulnerabilities based upon DREAD model to minimize breech impact&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Advanced Custom Network Protocol Fuzzing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Oracle Cloud Infrastructure ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joshua Pereyda''&lt;br /&gt;
&lt;br /&gt;
Abstract: Get hands on experience writing custom network protocol fuzzers. This class will cover the basics of network protocol &amp;quot;&amp;quot;smart fuzzing.&amp;quot;&amp;quot; Exercises will utilize the open source network protocol fuzzing framework, boofuzz. Attendees will gain practice reverse engineering a network protocol, implementing and iterating on a custom fuzzer, and identifying vulnerabilities. After the course:&lt;br /&gt;
&lt;br /&gt;
# You will know the basics of fuzzing.&lt;br /&gt;
# You will know how to write custom network protocol fuzzers using state of the art open source tools.&lt;br /&gt;
# You will have hands on experience with this widely-discussed but still largely mysterious test method.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Watch this space for 2018 sponsorship information!'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]]&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:OCI Logo.png|link=https://cloud.oracle.com/en_US/iaas]] &lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2018 Training Day will be October 3, 2018. This year we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Hacking Web 3.0 &amp;lt;br&amp;gt;(Mick Ayzenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Introduction to Computer Forensics &amp;lt;br&amp;gt;(Kris Rosenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Practical Internal Vulnerability Scanning &amp;lt;br&amp;gt;(Patterson Cake)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Incident Handling in Cloud Environment - a primer &amp;lt;br&amp;gt;(Derek Hill)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AppSec Testing Beyond Pen Test &amp;lt;br&amp;gt;(Bhushan Gupta)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Custom Network Protocol Fuzzing &amp;lt;br&amp;gt;(Joshua Pereyda)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Lunch ideas for 2018 coming soon!&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
Registration information and dates coming soon!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242481</id>
		<title>OWASP Portland 2018 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242481"/>
				<updated>2018-08-13T07:42:05Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: Sponsorship edits&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the third year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for those interested to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with the local infosec community and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2018 Training Day? Subscribe to the Portland OWASP mailing list or follow @PortlandOWASP on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session.  Each participant can register for one morning course, or one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== Intro to Hacking Web 3.0 ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Mick Ayzenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: In this half day course, we will introduce several emerging Blockchain concepts such as Web 3.0, smart contracts, and decentralized applications (DApps).  You will get the opportunity to explore and interact with applications on this platform, and will be introduced to several of the most common vulnerability categories found in smart contracts through a capture the flag platform. This class will be highly interactive, so bring a laptop. No previous Blockchain experience required.&lt;br /&gt;
&lt;br /&gt;
=== Introduction to Computer Forensics ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kris Rosenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: It’s 3AM and the phone rings… ok, maybe not 3AM, but you get the call that a computer system on your network is acting strange.  After taking a look you realize that this system may be infected with malware, or possibly you have an active intruder inside your network.  What do you do next?  This session will guide you through the basic initial steps that can be taken in a security incident to effectively isolate and contain the attack and collect evidence for potential future prosecution.  We will introduce the PICERL framework for incident handling and discuss each phase in detail: Planning, Identification, Containment, Eradication, Recovery, and Lessons Learned.  At the end of the session you should have a basic understanding of how to respond to a potential security incident, and preserve any evidence that may be needed.&lt;br /&gt;
&lt;br /&gt;
=== Intro to Practical Internal Vulnerability Scanning ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Summit Security Group, LLC ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Patterson Cake''&lt;br /&gt;
&lt;br /&gt;
Abstract: If your organization has the resources to scan all of the things all of the time, this course may not be for you! If, however, you are like most organizations, struggling to keep up and to make tangible progress towards improving your security posture, read on! In this course, we'll discuss scanning tools and techniques to help you identify unknown devices, sensitive data exposure, and system misconfigurations within your environment, using open-source and built-in tools, like Nmap and PowerShell, along with some good old-fashioned NI (Natural Intelligence). We'll focus on practical, tactical ways to find things like unapproved IoT devices on your network, sensitive data shares with &amp;quot;Everyone&amp;quot; permissions, and web apps with default credentials, things you care about which are often easy to remediate but may not show up on traditional vulnerability or compliance scans.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running a recent version of Nmap (Windows, Linux or Mac) with admin/root privileges.&lt;br /&gt;
&lt;br /&gt;
=== Incident Handling - a primer ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Derek Hill''&lt;br /&gt;
&lt;br /&gt;
Abstract: Have you ever wondered what it takes to investigate an incident inside your company network? What about your assets stored in a public cloud? When does an event become an incident? Who decides this?  We will cover the important steps of an incident handling process, including getting you started in creating your own incident handling plan. We will talk about the challenges of doing this in cloud, where you don't have physical access to the machines. You will walk away with an understanding of the fundamental steps of incident handling as well as some examples of what to look for, how to handle collection and preservation of evidence.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
=== AppSec Testing Beyond Pen Test ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Bhushan Gupta''&lt;br /&gt;
&lt;br /&gt;
Abstract: Most web application security testing efforts are concentrated around penetration testing, which is an art based on hackers’ psyche, thought process, and determination to exploit software vulnerabilities. However, does it yield a high level of confidence and sense of security in a developer’s mind? The web application developers must begin to think of building security throughout the software development life cycle (SDLC). This workshop paper focuses on an approach that aligns the web application security testing with the three basic principles of security; confidentiality, integrity, and availability (CIA). Using a simple approach, workshop teaches how to identify the most vulnerable processes in an application, highlighting the test-intensive areas. The students will learn:&lt;br /&gt;
# How to identify the security requirements for their business &lt;br /&gt;
# How to plan security testing using both statics and dynamic code analysis&lt;br /&gt;
# How to apply STRIDE model to evaluate critical web application components&lt;br /&gt;
# How to prioritizing vulnerabilities based upon DREAD model to minimize breech impact&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Advanced Custom Network Protocol Fuzzing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Oracle Cloud Infrastructure ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joshua Pereyda''&lt;br /&gt;
&lt;br /&gt;
Abstract: Get hands on experience writing custom network protocol fuzzers. This class will cover the basics of network protocol &amp;quot;&amp;quot;smart fuzzing.&amp;quot;&amp;quot; Exercises will utilize the open source network protocol fuzzing framework, boofuzz. Attendees will gain practice reverse engineering a network protocol, implementing and iterating on a custom fuzzer, and identifying vulnerabilities. After the course:&lt;br /&gt;
&lt;br /&gt;
# You will know the basics of fuzzing.&lt;br /&gt;
# You will know how to write custom network protocol fuzzers using state of the art open source tools.&lt;br /&gt;
# You will have hands on experience with this widely-discussed but still largely mysterious test method.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Watch this space for 2018 sponsorship information!'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
===== [https://cloud.oracle.com/en_US/cloud-infrastructure Oracle Cloud Infrastructure] =====&lt;br /&gt;
&lt;br /&gt;
=== Morning Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
===== [https://cloud.oracle.com/en_US/cloud-infrastructure Oracle Cloud Infrastructure] =====&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2018 Training Day will be October 3, 2018. This year we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Hacking Web 3.0 &amp;lt;br&amp;gt;(Mick Ayzenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Introduction to Computer Forensics &amp;lt;br&amp;gt;(Kris Rosenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Practical Internal Vulnerability Scanning &amp;lt;br&amp;gt;(Patterson Cake)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Incident Handling - a primer &amp;lt;br&amp;gt;(Derek Hill)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AppSec Testing Beyond Pen Test &amp;lt;br&amp;gt;(Bhushan Gupta)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Custom Network Protocol Fuzzing &amp;lt;br&amp;gt;(Joshua Pereyda)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Lunch ideas for 2018 coming soon!&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
Registration information and dates coming soon!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242465</id>
		<title>OWASP Portland 2018 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242465"/>
				<updated>2018-08-11T19:00:28Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: /* Schedule */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the third year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for those interested to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with the local infosec community and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2018 Training Day? Subscribe to the Portland OWASP mailing list or follow @PortlandOWASP on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session.  Each participant can register for one morning course, or one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== Intro to Hacking Web 3.0 ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Mick Ayzenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: In this half day course, we will introduce several emerging Blockchain concepts such as Web 3.0, smart contracts, and decentralized applications (DApps).  You will get the opportunity to explore and interact with applications on this platform, and will be introduced to several of the most common vulnerability categories found in smart contracts through a capture the flag platform. This class will be highly interactive, so bring a laptop. No previous Blockchain experience required.&lt;br /&gt;
&lt;br /&gt;
=== Introduction to Computer Forensics ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kris Rosenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: It’s 3AM and the phone rings… ok, maybe not 3AM, but you get the call that a computer system on your network is acting strange.  After taking a look you realize that this system may be infected with malware, or possibly you have an active intruder inside your network.  What do you do next?  This session will guide you through the basic initial steps that can be taken in a security incident to effectively isolate and contain the attack and collect evidence for potential future prosecution.  We will introduce the PICERL framework for incident handling and discuss each phase in detail: Planning, Identification, Containment, Eradication, Recovery, and Lessons Learned.  At the end of the session you should have a basic understanding of how to respond to a potential security incident, and preserve any evidence that may be needed.&lt;br /&gt;
&lt;br /&gt;
=== Intro to Practical Internal Vulnerability Scanning ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Patterson Cake''&lt;br /&gt;
&lt;br /&gt;
Abstract: If your organization has the resources to scan all of the things all of the time, this course may not be for you! If, however, you are like most organizations, struggling to keep up and to make tangible progress towards improving your security posture, read on! In this course, we'll discuss scanning tools and techniques to help you identify unknown devices, sensitive data exposure, and system misconfigurations within your environment, using open-source and built-in tools, like Nmap and PowerShell, along with some good old-fashioned NI (Natural Intelligence). We'll focus on practical, tactical ways to find things like unapproved IoT devices on your network, sensitive data shares with &amp;quot;Everyone&amp;quot; permissions, and web apps with default credentials, things you care about which are often easy to remediate but may not show up on traditional vulnerability or compliance scans.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running a recent version of Nmap (Windows, Linux or Mac) with admin/root privileges.&lt;br /&gt;
&lt;br /&gt;
=== Incident Handling - a primer ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Derek Hill''&lt;br /&gt;
&lt;br /&gt;
Abstract: Have you ever wondered what it takes to investigate an incident inside your company network? What about your assets stored in a public cloud? When does an event become an incident? Who decides this?  We will cover the important steps of an incident handling process, including getting you started in creating your own incident handling plan. We will talk about the challenges of doing this in cloud, where you don't have physical access to the machines. You will walk away with an understanding of the fundamental steps of incident handling as well as some examples of what to look for, how to handle collection and preservation of evidence.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
=== AppSec Testing Beyond Pen Test ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Bhushan Gupta''&lt;br /&gt;
&lt;br /&gt;
Abstract: Most web application security testing efforts are concentrated around penetration testing, which is an art based on hackers’ psyche, thought process, and determination to exploit software vulnerabilities. However, does it yield a high level of confidence and sense of security in a developer’s mind? The web application developers must begin to think of building security throughout the software development life cycle (SDLC). This workshop paper focuses on an approach that aligns the web application security testing with the three basic principles of security; confidentiality, integrity, and availability (CIA). Using a simple approach, workshop teaches how to identify the most vulnerable processes in an application, highlighting the test-intensive areas. The students will learn:&lt;br /&gt;
# How to identify the security requirements for their business &lt;br /&gt;
# How to plan security testing using both statics and dynamic code analysis&lt;br /&gt;
# How to apply STRIDE model to evaluate critical web application components&lt;br /&gt;
# How to prioritizing vulnerabilities based upon DREAD model to minimize breech impact&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Advanced Custom Network Protocol Fuzzing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Oracle ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joshua Pereyda''&lt;br /&gt;
&lt;br /&gt;
Abstract: Get hands on experience writing custom network protocol fuzzers. This class will cover the basics of network protocol &amp;quot;&amp;quot;smart fuzzing.&amp;quot;&amp;quot; Exercises will utilize the open source network protocol fuzzing framework, boofuzz. Attendees will gain practice reverse engineering a network protocol, implementing and iterating on a custom fuzzer, and identifying vulnerabilities. After the course:&lt;br /&gt;
&lt;br /&gt;
# You will know the basics of fuzzing.&lt;br /&gt;
# You will know how to write custom network protocol fuzzers using state of the art open source tools.&lt;br /&gt;
# You will have hands on experience with this widely-discussed but still largely mysterious test method.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Watch this space for 2018 sponsorship information!'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2018 Training Day will be October 3, 2018. This year we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 8:30 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration and Continental Breakfast&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:30 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Hacking Web 3.0 &amp;lt;br&amp;gt;(Mick Ayzenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Introduction to Computer Forensics &amp;lt;br&amp;gt;(Kris Rosenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Practical Internal Vulnerability Scanning &amp;lt;br&amp;gt;(Patterson Cake)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Incident Handling - a primer &amp;lt;br&amp;gt;(Derek Hill)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AppSec Testing Beyond Pen Test &amp;lt;br&amp;gt;(Bhushan Gupta)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Custom Network Protocol Fuzzing &amp;lt;br&amp;gt;(Joshua Pereyda)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Lunch ideas for 2018 coming soon!&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
Registration information and dates coming soon!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242454</id>
		<title>OWASP Portland 2018 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242454"/>
				<updated>2018-08-10T17:28:28Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: /* Schedule */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the third year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for those interested to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with the local infosec community and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2018 Training Day? Subscribe to the Portland OWASP mailing list or follow @PortlandOWASP on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session.  Each participant can register for one morning course, or one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== Intro to Hacking Web 3.0 ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Mick Ayzenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: In this half day course, we will introduce several emerging Blockchain concepts such as Web 3.0, smart contracts, and decentralized applications (DApps).  You will get the opportunity to explore and interact with applications on this platform, and will be introduced to several of the most common vulnerability categories found in smart contracts through a capture the flag platform. This class will be highly interactive, so bring a laptop. No previous Blockchain experience required.&lt;br /&gt;
&lt;br /&gt;
=== Introduction to Computer Forensics ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kris Rosenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: It’s 3AM and the phone rings… ok, maybe not 3AM, but you get the call that a computer system on your network is acting strange.  After taking a look you realize that this system may be infected with malware, or possibly you have an active intruder inside your network.  What do you do next?  This session will guide you through the basic initial steps that can be taken in a security incident to effectively isolate and contain the attack and collect evidence for potential future prosecution.  We will introduce the PICERL framework for incident handling and discuss each phase in detail: Planning, Identification, Containment, Eradication, Recovery, and Lessons Learned.  At the end of the session you should have a basic understanding of how to respond to a potential security incident, and preserve any evidence that may be needed.&lt;br /&gt;
&lt;br /&gt;
=== Intro to Practical Internal Vulnerability Scanning ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Patterson Cake''&lt;br /&gt;
&lt;br /&gt;
Abstract: If your organization has the resources to scan all of the things all of the time, this course may not be for you! If, however, you are like most organizations, struggling to keep up and to make tangible progress towards improving your security posture, read on! In this course, we'll discuss scanning tools and techniques to help you identify unknown devices, sensitive data exposure, and system misconfigurations within your environment, using open-source and built-in tools, like Nmap and PowerShell, along with some good old-fashioned NI (Natural Intelligence). We'll focus on practical, tactical ways to find things like unapproved IoT devices on your network, sensitive data shares with &amp;quot;Everyone&amp;quot; permissions, and web apps with default credentials, things you care about which are often easy to remediate but may not show up on traditional vulnerability or compliance scans.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running a recent version of Nmap (Windows, Linux or Mac) with admin/root privileges.&lt;br /&gt;
&lt;br /&gt;
=== Incident Handling - a primer ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Derek Hill''&lt;br /&gt;
&lt;br /&gt;
Abstract: Have you ever wondered what it takes to investigate an incident inside your company network? What about your assets stored in a public cloud? When does an event become an incident? Who decides this?  We will cover the important steps of an incident handling process, including getting you started in creating your own incident handling plan. We will talk about the challenges of doing this in cloud, where you don't have physical access to the machines. You will walk away with an understanding of the fundamental steps of incident handling as well as some examples of what to look for, how to handle collection and preservation of evidence.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
=== AppSec Testing Beyond Pen Test ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Bhushan Gupta''&lt;br /&gt;
&lt;br /&gt;
Abstract: Most web application security testing efforts are concentrated around penetration testing, which is an art based on hackers’ psyche, thought process, and determination to exploit software vulnerabilities. However, does it yield a high level of confidence and sense of security in a developer’s mind? The web application developers must begin to think of building security throughout the software development life cycle (SDLC). This workshop paper focuses on an approach that aligns the web application security testing with the three basic principles of security; confidentiality, integrity, and availability (CIA). Using a simple approach, workshop teaches how to identify the most vulnerable processes in an application, highlighting the test-intensive areas. The students will learn:&lt;br /&gt;
# How to identify the security requirements for their business &lt;br /&gt;
# How to plan security testing using both statics and dynamic code analysis&lt;br /&gt;
# How to apply STRIDE model to evaluate critical web application components&lt;br /&gt;
# How to prioritizing vulnerabilities based upon DREAD model to minimize breech impact&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Advanced Custom Network Protocol Fuzzing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Oracle ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joshua Pereyda''&lt;br /&gt;
&lt;br /&gt;
Abstract: Get hands on experience writing custom network protocol fuzzers. This class will cover the basics of network protocol &amp;quot;&amp;quot;smart fuzzing.&amp;quot;&amp;quot; Exercises will utilize the open source network protocol fuzzing framework, boofuzz. Attendees will gain practice reverse engineering a network protocol, implementing and iterating on a custom fuzzer, and identifying vulnerabilities. After the course:&lt;br /&gt;
&lt;br /&gt;
# You will know the basics of fuzzing.&lt;br /&gt;
# You will know how to write custom network protocol fuzzers using state of the art open source tools.&lt;br /&gt;
# You will have hands on experience with this widely-discussed but still largely mysterious test method.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Watch this space for 2018 sponsorship information!'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2018 Training Day will be October 3, 2018. This year we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Hacking Web 3.0 &amp;lt;br&amp;gt;(Mick Ayzenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Introduction to Computer Forensics &amp;lt;br&amp;gt;(Kris Rosenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Practical Internal Vulnerability Scanning &amp;lt;br&amp;gt;(Patterson Cake)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Incident Handling - a primer &amp;lt;br&amp;gt;(Derek Hill)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AppSec Testing Beyond Pen Test &amp;lt;br&amp;gt;(Bhushan Gupta)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Custom Network Protocol Fuzzing &amp;lt;br&amp;gt;(Joshua Pereyda)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rock Bottom Restaurant and Brewery&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Lunch ideas for 2018 coming soon!&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
Registration information and dates coming soon!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242453</id>
		<title>OWASP Portland 2018 Training Day</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Portland_2018_Training_Day&amp;diff=242453"/>
				<updated>2018-08-10T17:26:33Z</updated>
		
		<summary type="html">&lt;p&gt;Bzhao: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For the third year in a row, the Portland OWASP chapter is proud to host our information security training day! This is be an excellent opportunity for those interested to receive top quality information security and application security training for prices far lower than normally offered. It's also a great chance to network with the local infosec community and meet those who share your interests. &lt;br /&gt;
&lt;br /&gt;
Want to get news and information on our 2018 Training Day? Subscribe to the Portland OWASP mailing list or follow @PortlandOWASP on Twitter!&lt;br /&gt;
&lt;br /&gt;
=Courses=&lt;br /&gt;
Courses will be held in two tracks: four in the morning session, and four in the afternoon session.  Each participant can register for one morning course, or one afternoon course, or one of each. &lt;br /&gt;
&lt;br /&gt;
== Morning Session 8:30 AM - Noon ==&lt;br /&gt;
&lt;br /&gt;
=== Intro to Hacking Web 3.0 ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Mick Ayzenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: In this half day course, we will introduce several emerging Blockchain concepts such as Web 3.0, smart contracts, and decentralized applications (DApps).  You will get the opportunity to explore and interact with applications on this platform, and will be introduced to several of the most common vulnerability categories found in smart contracts through a capture the flag platform. This class will be highly interactive, so bring a laptop. No previous Blockchain experience required.&lt;br /&gt;
&lt;br /&gt;
=== Introduction to Computer Forensics ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Kris Rosenberg''&lt;br /&gt;
&lt;br /&gt;
Abstract: It’s 3AM and the phone rings… ok, maybe not 3AM, but you get the call that a computer system on your network is acting strange.  After taking a look you realize that this system may be infected with malware, or possibly you have an active intruder inside your network.  What do you do next?  This session will guide you through the basic initial steps that can be taken in a security incident to effectively isolate and contain the attack and collect evidence for potential future prosecution.  We will introduce the PICERL framework for incident handling and discuss each phase in detail: Planning, Identification, Containment, Eradication, Recovery, and Lessons Learned.  At the end of the session you should have a basic understanding of how to respond to a potential security incident, and preserve any evidence that may be needed.&lt;br /&gt;
&lt;br /&gt;
=== Intro to Practical Internal Vulnerability Scanning ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Patterson Cake''&lt;br /&gt;
&lt;br /&gt;
Abstract: If your organization has the resources to scan all of the things all of the time, this course may not be for you! If, however, you are like most organizations, struggling to keep up and to make tangible progress towards improving your security posture, read on! In this course, we'll discuss scanning tools and techniques to help you identify unknown devices, sensitive data exposure, and system misconfigurations within your environment, using open-source and built-in tools, like Nmap and PowerShell, along with some good old-fashioned NI (Natural Intelligence). We'll focus on practical, tactical ways to find things like unapproved IoT devices on your network, sensitive data shares with &amp;quot;Everyone&amp;quot; permissions, and web apps with default credentials, things you care about which are often easy to remediate but may not show up on traditional vulnerability or compliance scans.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Laptop capable of running a recent version of Nmap (Windows, Linux or Mac) with admin/root privileges.&lt;br /&gt;
&lt;br /&gt;
=== Incident Handling - a primer ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Derek Hill''&lt;br /&gt;
&lt;br /&gt;
Abstract: Have you ever wondered what it takes to investigate an incident inside your company network? What about your assets stored in a public cloud? When does an event become an incident? Who decides this?  We will cover the important steps of an incident handling process, including getting you started in creating your own incident handling plan. We will talk about the challenges of doing this in cloud, where you don't have physical access to the machines. You will walk away with an understanding of the fundamental steps of incident handling as well as some examples of what to look for, how to handle collection and preservation of evidence.&lt;br /&gt;
&lt;br /&gt;
== Afternoon Session: 1:30 PM - 5:00 PM ==&lt;br /&gt;
&lt;br /&gt;
=== Advanced Application Security Testing ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Timothy Morgan''&lt;br /&gt;
&lt;br /&gt;
Abstract: This course takes students beyond the most basic web application exploitation scenarios, focusing on advanced SQL injection, XML eXternal Entities (XXE) and server-side request forgery (SSRF) attacks. The course also covers out-of-band detection and exfiltration using the DNS, which has recently become a popular technique used by penetration testers.&lt;br /&gt;
&lt;br /&gt;
=== AppSec Testing Beyond Pen Test ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Bhushan Gupta''&lt;br /&gt;
&lt;br /&gt;
Abstract: Most web application security testing efforts are concentrated around penetration testing, which is an art based on hackers’ psyche, thought process, and determination to exploit software vulnerabilities. However, does it yield a high level of confidence and sense of security in a developer’s mind? The web application developers must begin to think of building security throughout the software development life cycle (SDLC). This workshop paper focuses on an approach that aligns the web application security testing with the three basic principles of security; confidentiality, integrity, and availability (CIA). Using a simple approach, workshop teaches how to identify the most vulnerable processes in an application, highlighting the test-intensive areas. The students will learn:&lt;br /&gt;
# How to identify the security requirements for their business &lt;br /&gt;
# How to plan security testing using both statics and dynamic code analysis&lt;br /&gt;
# How to apply STRIDE model to evaluate critical web application components&lt;br /&gt;
# How to prioritizing vulnerabilities based upon DREAD model to minimize breech impact&lt;br /&gt;
&lt;br /&gt;
=== Applied Physical Attacks on Embedded Systems, Introductory Version ===&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joe FitzPatrick''&lt;br /&gt;
&lt;br /&gt;
Abstract: This workshop introduces several different relatively accessible interfaces on embedded systems. Attendees will get hands-on experience with UART, SPI, and JTAG interfaces on a MIPS-based wifi router. After a brief architectural overview of each interface, hands-on labs will guide through the process understanding, observing, interacting with, and exploiting the interface to potentially access a root shell on the target.&lt;br /&gt;
&lt;br /&gt;
=== Advanced Custom Network Protocol Fuzzing ===&lt;br /&gt;
&lt;br /&gt;
==== Sponsored by Oracle ====&lt;br /&gt;
&lt;br /&gt;
''Instructor: Joshua Pereyda''&lt;br /&gt;
&lt;br /&gt;
Abstract: Get hands on experience writing custom network protocol fuzzers. This class will cover the basics of network protocol &amp;quot;&amp;quot;smart fuzzing.&amp;quot;&amp;quot; Exercises will utilize the open source network protocol fuzzing framework, boofuzz. Attendees will gain practice reverse engineering a network protocol, implementing and iterating on a custom fuzzer, and identifying vulnerabilities. After the course:&lt;br /&gt;
&lt;br /&gt;
# You will know the basics of fuzzing.&lt;br /&gt;
# You will know how to write custom network protocol fuzzers using state of the art open source tools.&lt;br /&gt;
# You will have hands on experience with this widely-discussed but still largely mysterious test method.&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
&lt;br /&gt;
'''Interested in becoming a sponsor? Watch this space for 2018 sponsorship information!'''&lt;br /&gt;
&lt;br /&gt;
=== Mixer Sponsors===&lt;br /&gt;
&lt;br /&gt;
[[File:github.png|link=https://github.com/]]&lt;br /&gt;
&lt;br /&gt;
=== Training Session Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:newrelic.png|link=https://newrelic.com/]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
[[File:summit.png|link=http://summitinfosec.com/]]&lt;br /&gt;
&lt;br /&gt;
=== General Sponsors ===&lt;br /&gt;
&lt;br /&gt;
[[File:simple.png|link=https://simple.com/]]&lt;br /&gt;
&lt;br /&gt;
=Details=&lt;br /&gt;
OWASP Portland 2018 Training Day will be October 3, 2018. This year we'll be located at:&lt;br /&gt;
&lt;br /&gt;
 World Trade Center Portland&lt;br /&gt;
 121 SW Salmon St.&lt;br /&gt;
 Portland, OR 97204. &lt;br /&gt;
&lt;br /&gt;
Later in the evening, a social mixer will also be held at Rock Bottom Restaurant &amp;amp; Brewery, just a short walk away:&lt;br /&gt;
&lt;br /&gt;
 206 SW Morrison St&lt;br /&gt;
 Portland, OR 97204&lt;br /&gt;
&lt;br /&gt;
===Schedule===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! |Time&lt;br /&gt;
! colspan=&amp;quot;4&amp;quot; |Activity&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |8:00 AM - 9:00 AM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; |Morning Registration&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |9:00 AM - 12:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Hacking Web 3.0 &amp;lt;br&amp;gt;(Mick Ayzenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Introduction to Computer Forensics &amp;lt;br&amp;gt;(Kris Rosenberg)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Intro to Practical Internal Vulnerability Scanning &amp;lt;br&amp;gt;(Patterson Cake)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Incident Handling - a primer &amp;lt;br&amp;gt;(Derek Hill)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |12:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Lunch on your own - ''Meet a new friend and grab a bite!''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:00 PM - 1:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Afternoon Registration (for those attending only in the afternoon)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |1:30 PM - 5:00 PM&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Application Security Testing &amp;lt;br&amp;gt;(Timothy Morgan)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |AppSec Testing Beyond Pen Test &amp;lt;br&amp;gt;(Bhushan Gupta)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Applied Physical Attacks on Embedded Systems, Introductory Version &amp;lt;br&amp;gt;(Joe FitzPatrick)&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |Advanced Custom Network Protocol Fuzzing &amp;lt;br&amp;gt;(Joshua Pereyda)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;padding: 0.5em;&amp;quot; |5:00 PM - 7:30 PM&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; style=&amp;quot;padding: 0.5em;&amp;quot; | Evening Mixer @ Rogue Hall&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Lunch Ideas ===&lt;br /&gt;
&lt;br /&gt;
Lunch ideas for 2018 coming soon!&lt;br /&gt;
&lt;br /&gt;
=How to Register=&lt;br /&gt;
Registration information and dates coming soon!&lt;/div&gt;</summary>
		<author><name>Bzhao</name></author>	</entry>

	</feed>