<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cgoldsch</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cgoldsch"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Cgoldsch"/>
		<updated>2026-04-30T01:24:50Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=128743</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=128743"/>
				<updated>2012-04-28T16:11:00Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* OWASP LA Security Summit: April 25, 2012, 3:00PM - 8PM  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg] Donate funds to Los Angeles chapter via RegOnline. &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== OWASP LA Security Summit: April 25, 2012, 3:00PM - 8PM &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
''(Note different time and location)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jerry Hoff VP, Static Code Analysis Division at WhiteHat Security, will be speaking about Webgoat. Shakeel Tufail, Federal Practice Director for HP Enterprise Security Solutions, will be speaking on ''&amp;quot;Software (In)Security - Challenges to securing software&amp;quot;''. Noa Bar Yosef, Senior Security Strategist at Imperva, will be speaking on ''&amp;quot;De-Anonymizing Anonymous&amp;quot;''. A concluding panel, moderated by Richard Greenberg, Information Security Officer for LA County Public Health, will have the speakers joined by Adnan Masood, a Software Engineer and Architect.&lt;br /&gt;
&lt;br /&gt;
''Food and drinks will follow''.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt; &lt;br /&gt;
Location:&lt;br /&gt;
&lt;br /&gt;
Four Points by Sheraton Los Angeles &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
5990 Green Valley Cir&lt;br /&gt;
&lt;br /&gt;
Culver City, CA 90230 &lt;br /&gt;
&lt;br /&gt;
(310) 641-7740 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
RSVP at http://www.meetup.com/OWASP-Los-Angeles/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Thanks to Our Sponsors:'''&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
http://www-inst.eecs.berkeley.edu/~wicse/index.php/images/intellogo.gif&lt;br /&gt;
&lt;br /&gt;
Intel the world's largest semiconductor chip maker. We develop advanced integrated digital technology, primarily integrated circuits, for industries such as computing and communications. Integrated circuits are semiconductor chips etched with interconnected electronic switches. We also develop computing platforms, which we define as integrated hardware and software computing technologies that are designed to provide an optimized solution. Our goal is to be the preeminent computing solutions company that powers the worldwide digital economy. We are transforming from a company with a primary focus on the design and manufacture of semiconductor chips for PCs and servers to a computing company that delivers complete solutions in the form of hardware and software platforms and supporting services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://www.f5.com/flash/application-ready-network/f5-logo.jpg&lt;br /&gt;
&lt;br /&gt;
Internet threats are widely varied and multi-layered. As these threats evolve, organizations find that traditional firewalls lack the intelligence and the scalability needed to stay effective and responsive under DDoS and a whole range of other sophisticated attacks. The result is a failure to protect the business from loss of critical Internet data center services.&lt;br /&gt;
&lt;br /&gt;
F5 offers a native, high performance firewall solution that protects the entire infrastructure and scales to perform under the most demanding conditions. F5 provides the intelligence and flexibility you need to stay secure in the ever-changing and increasingly threatening landscape. You get a common platform to deliver applications and significantly improve responsiveness to rapidly evolving threats.&lt;br /&gt;
&lt;br /&gt;
In addition, F5 provides a flexible, certified web application firewall and comprehensive, policy-based web application security to address emerging threats at the application level. This combination significantly reduces the risk of damage to intellectual property, data, and web applications. With F5, you get a complete application protection solution on a certified network firewall platform that eliminates the need for multiple appliances. This lowers maintenance and management costs, and increases the confidentiality, availability, and integrity of your applications, network, and processes. F5 brings together the network, applications, data, and users under a single security strategy that traditional firewalls and point solutions don’t offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://www.genevatechnicalservices.com/images/partners/qualys-logo.gif&lt;br /&gt;
&lt;br /&gt;
Qualys, Inc. is the pioneer and leading provider of information security and compliance cloud solutions with 5,500+ customers in 85 countries, including 51 of the Forbes Global 100. The QualysGuard Cloud Platform and integrated suite of applications helps businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including BT, Dell SecureWorks, Fujitsu, IBM, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA).&lt;br /&gt;
&lt;br /&gt;
For more information, please visit www.qualys.com.&lt;br /&gt;
&lt;br /&gt;
== April message from OWASP Los Angeles &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt; 1. Participate in Projects &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
OWASP is about projects. Without projects, OWASP wouldn't exist, and projects need new blood. I would like to encourage your participation in the projects. There are many projects to choose from (link below) but  testing, development and code review guides are in urgent need of help. You don't need to be a coder to contribute. &lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project&lt;br /&gt;
&lt;br /&gt;
Please see what you can contribute and feel free to reach out to the project leaders directly, or send me an email if you want an introduction. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt; 2. Call for Local Speakers &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
We have a lot of security talent in LA area and we would love to hear from you. Edward Bonver is leading an initiative to have local speakers more involved and present at OWASP meetings. Please reach out to him at edward@owasp.org if you're interested. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
The leading InfoSec Professionals in SoCal will be Gathering at the Universal City Hilton May 16 for the '''ISSA-LA''' Information Security Summit. Visit: http://www.issala.org/summit/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=128159</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=128159"/>
				<updated>2012-04-19T18:34:46Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* OWASP LA Security Summit: April 25, 2012, 3:00PM - 8PM  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg] Donate funds to Los Angeles chapter via RegOnline. &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== OWASP LA Security Summit: April 25, 2012, 3:00PM - 8PM &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
''(Note different time and location)''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jerry Hoff VP, Static Code Analysis Division at WhiteHat Security, will be speaking about Webgoat. Shakeel Tufail, Federal Practice Director for HP Enterprise Security Solutions, will be speaking on ''&amp;quot;Software (In)Security - Challenges to securing software&amp;quot;''. Noa Bar Yosef, Senior Security Strategist at Imperva, will be speaking on ''&amp;quot;De-Anonymizing Anonymous&amp;quot;''. A concluding panel, moderated by Richard Greenberg, Information Security Officer for LA County Public Health, will have the speakers joined by Adnan Masood, a Software Engineer and Architect.&lt;br /&gt;
&lt;br /&gt;
''Food and drinks will follow''.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt; &lt;br /&gt;
Location:&lt;br /&gt;
&lt;br /&gt;
Four Points by Sheraton Los Angeles &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
5990 Green Valley Cir&lt;br /&gt;
&lt;br /&gt;
Culver City, CA 90230 &lt;br /&gt;
&lt;br /&gt;
(310) 641-7740 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
RSVP at http://www.meetup.com/OWASP-Los-Angeles/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Thanks to Our Sponsors:'''&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
http://www.f5.com/flash/application-ready-network/f5-logo.jpg&lt;br /&gt;
&lt;br /&gt;
Internet threats are widely varied and multi-layered. As these threats evolve, organizations find that traditional firewalls lack the intelligence and the scalability needed to stay effective and responsive under DDoS and a whole range of other sophisticated attacks. The result is a failure to protect the business from loss of critical Internet data center services.&lt;br /&gt;
&lt;br /&gt;
F5 offers a native, high performance firewall solution that protects the entire infrastructure and scales to perform under the most demanding conditions. F5 provides the intelligence and flexibility you need to stay secure in the ever-changing and increasingly threatening landscape. You get a common platform to deliver applications and significantly improve responsiveness to rapidly evolving threats.&lt;br /&gt;
&lt;br /&gt;
In addition, F5 provides a flexible, certified web application firewall and comprehensive, policy-based web application security to address emerging threats at the application level. This combination significantly reduces the risk of damage to intellectual property, data, and web applications. With F5, you get a complete application protection solution on a certified network firewall platform that eliminates the need for multiple appliances. This lowers maintenance and management costs, and increases the confidentiality, availability, and integrity of your applications, network, and processes. F5 brings together the network, applications, data, and users under a single security strategy that traditional firewalls and point solutions don’t offer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://www.genevatechnicalservices.com/images/partners/qualys-logo.gif&lt;br /&gt;
&lt;br /&gt;
Qualys, Inc. is the pioneer and leading provider of information security and compliance cloud solutions with 5,500+ customers in 85 countries, including 51 of the Forbes Global 100. The QualysGuard Cloud Platform and integrated suite of applications helps businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including BT, Dell SecureWorks, Fujitsu, IBM, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA).&lt;br /&gt;
&lt;br /&gt;
For more information, please visit www.qualys.com.&lt;br /&gt;
&lt;br /&gt;
== April message from OWASP Los Angeles &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt; 1. Participate in Projects &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
OWASP is about projects. Without projects, OWASP wouldn't exist, and projects need new blood. I would like to encourage your participation in the projects. There are many projects to choose from (link below) but  testing, development and code review guides are in urgent need of help. You don't need to be a coder to contribute. &lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_Project&lt;br /&gt;
&lt;br /&gt;
Please see what you can contribute and feel free to reach out to the project leaders directly, or send me an email if you want an introduction. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt; 2. Call for Local Speakers &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
We have a lot of security talent in LA area and we would love to hear from you. Edward Bonver is leading an initiative to have local speakers more involved and present at OWASP meetings. Please reach out to him at edward@owasp.org if you're interested. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
The leading InfoSec Professionals in SoCal will be Gathering at the Universal City Hilton May 16 for the '''ISSA-LA''' Information Security Summit. Visit: http://www.issala.org/summit/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=125557</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=125557"/>
				<updated>2012-03-05T02:09:33Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, February 22, 2012, 7:00 PM  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg]&lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Mar 21, 2012, 6:30 PM &amp;lt;br&amp;gt; ==&lt;br /&gt;
&amp;lt;!-- (Note different date, time and location)&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Luminaria's&amp;lt;br&amp;gt;&lt;br /&gt;
3500 Ramona Boulevard &amp;lt;br&amp;gt;&lt;br /&gt;
Monterey Park, CA 91754-2199&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Great talks and free catered dinner for all attendees.&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://www.meetup.com/OWASP-Los-Angeles/events/47403862/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Topic: Building The DEF CON Network, Making A Sandbox For 10,000 Hackers  ====&lt;br /&gt;
&lt;br /&gt;
We will cover on how the DEF CON network team builds a network from scratch, in three days with very little budget. How this network evolved, what worked for us, and what didn’t work over the last ten years. This network started as an idea, and after acquiring some kick butt hardware, has allowed us to support several thousand users concurrently. In addition I will cover the new WPA2 enterprise deployment, what worked, and what didn’t, and how the DEF CON team is has mad the Rio network rock!&lt;br /&gt;
&lt;br /&gt;
==== Speaker: Francis Brown, Stach &amp;amp; Liu ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;David M. N. Bryan&amp;lt;/b&amp;gt; has 10 years of computer security experience, including pentesting, consulting, engineering, and administration. As an active participant in the information security community, he volunteers at DEF CON, where he designs and implements the firewall and network for what is said to be the most hostile network environment in the world. This network allows speakers, press, vendors, and others to gain access to the Internet, without being hacked. In his spare time he runs the local DEF CON group, DC612, is the president of Twincities Makers group, and participates in the Minneapolis OWASP chapter.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsors:   ====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Aveksa&amp;lt;/b&amp;gt; provides the industry’s most comprehensive, purpose-built, enterprise-class, Access Governance automation platform. The Aveksa platform enables organizations to manage the complete lifecycle of user access to information resources through an automated, continuous process for access request, approval, fulfillment, review, certification and remediation. For more information, please go to [www.aveksa.com].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;IOActive&amp;lt;/b&amp;gt; - Having spoken at numerous OWASP and ISSA events around the globe, IOActive is excited to have the opportunity to continue to be a part of these communities by sponsoring drinks for the upcoming joint meeting. IOActive is a progressive force in the security community, defined by its participation in industry events and involvement with community initiatives. We work with a majority of Global 500 companies, including power and utility, hardware, retail, financial, media, aerospace, high-tech, and software development organizations. As a home for highly skilled and experienced professionals, IOActive attracts talented consultants who contribute to the growing body of security knowledge by speaking at such elite conferences as Black Hat, Ruxcon, Defcon, BlueHat, CanSec, and WhatTheHack. For more information, please visit www.ioactive.com.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles_Presentation_Archive&amp;diff=124093</id>
		<title>Los Angeles Presentation Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles_Presentation_Archive&amp;diff=124093"/>
				<updated>2012-02-11T19:47:04Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* 2011 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains slides from OWASP Los Angeles Chapter Meetings:&lt;br /&gt;
&lt;br /&gt;
==2012==&lt;br /&gt;
&lt;br /&gt;
* January - Robert Zigweid:  Security in the Cloud&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&lt;br /&gt;
==2011==&lt;br /&gt;
&lt;br /&gt;
* June - Brian Chess:  [[Media:Gray,_the_new_black.pptx‎|Gray, the new Black: Gray-Box Web Vulnerability Testing pptx]]&lt;br /&gt;
* May - Justin Collins:  [[Media:Justin_Collins-OWASPLA-Brakeman.pdf| Automated Detection of Security Flaws in Ruby on Rails Code]]&lt;br /&gt;
* April - Bryan Sullivan: NoSQL Security&lt;br /&gt;
* March -  Liam O Murchu: STUXNET&lt;br /&gt;
* February - Scott Sutherland: Database Security in the Real World&lt;br /&gt;
* January - Samy Kamkar: [http://samy.pl/evercookie/ Evercookie: the Persistent Cookie]&lt;br /&gt;
&lt;br /&gt;
==2010==&lt;br /&gt;
&lt;br /&gt;
* December - Brian Robison and Sven Schrecker: Deep Dive into Web Application Scanning&lt;br /&gt;
* November - Al Huizenga and Kyle Adams: Baking It In: Abuse-Resistant Web Applications&lt;br /&gt;
* October - Todd Calvert: Identity Management: federation and authorization&lt;br /&gt;
* October - Manoranjan (Mano) Paul: Sharks and Security&lt;br /&gt;
* September - Mike O. Villegas: Secure Coding Practices and Procedures, and Threat Modeling&lt;br /&gt;
* September - Edward Bonver: Threat Modeling at Symantec&lt;br /&gt;
* August - Dr. Jelena Mirkovic: DETER Project: Scientific, Safe and Simple&amp;amp;nbsp;CyberSecurity Research&lt;br /&gt;
* July - Samy Kamkar:  How I Met Your Girlfriend: Entirely New Classes of Web Attacks&lt;br /&gt;
* June -  Brendan Bellina: Shibboleth implementation at USC&lt;br /&gt;
* May - Neil Matatall: OWASP Top 10 and Enterprise Security API (ESAPI)&lt;br /&gt;
* April - Mike Bailey and Mike Murray:  The intersection of social and technical attacks in Web 2.0 applications&lt;br /&gt;
* March - Michael Schrenk: BOOK PREVIEW: Webbots, Spiders, and Screen Scrapers SECOND EDITION&lt;br /&gt;
* February - Alex Stamos: Cloud Computing Security: Raining on the Trendy New Parade&lt;br /&gt;
* January - David M. N. Bryan: Do VLANs allow for good application security?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==2009==&lt;br /&gt;
*December - Michael Sutton: [[Media:Sutton_-_Pulling_The_Plug-Security_Risks_in_Next_Generation_Offline_Web_Apps_-_OWASP_LA_OC.pdf|Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications PDF]]&lt;br /&gt;
*November - Brian Chess: [[Media:Watching_software_run_11.18.09.pptx| Watching Software Run pptx]]&lt;br /&gt;
* October - Shankar Subramaniyan: [[Media:ISO27001_OWASPLA_Shankar_10212009.pdf|Enabling Compliance Requirements using Information Security Management System (ISMS) Framework (ISO27001) PDF]]&lt;br /&gt;
* September - Marco Morana and Tony UcedaVelez: The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&lt;br /&gt;
* August - Matt Tesauro: OWASP Live CD Demo and Q&amp;amp;A&lt;br /&gt;
* August - Pravir Chandra: The Software Assurance Maturity Model (SAMM)&lt;br /&gt;
* July - David Bryan: Lock picks, BumpKeys, and Hackers oh my! How secure is your application?&lt;br /&gt;
* June - Mikhael Felker: Information Warfare: Past, Present and Future&lt;br /&gt;
* May - Jeremiah Grossman: [http://video.google.com/videoplay?docid=2875886330538461390 Top Ten Web Hacking Techniques of 2008]&lt;br /&gt;
* April - David Campbell: [[Media:DC_ED_OWASP_XSS_MAY2008_v1.0.pdf| XSS, Exploits and Defenses PDF]]&lt;br /&gt;
* March -  NETWORK SECURITY DINNER WITH ISSA - CISO'S Security Dashboard Panel&lt;br /&gt;
* February - Alex Stamos:  [[Media:Cloud_Computing_Security.pdf| Cloud Computing and Security PDF]]&lt;br /&gt;
* January -  Ben Walther: Building Security into the Test Organization&lt;br /&gt;
&lt;br /&gt;
==2008==&lt;br /&gt;
&lt;br /&gt;
* December - Samy Kamkar: [[Media:OWASP-WASCAppSec2007SanJose_SamyWorm.ppt| The MySpace Worm ppt]]&lt;br /&gt;
* November - Stephan Chenette: A new web attack vector: Script Fragmentation&lt;br /&gt;
* October - Jonathan Gershater: Entitlements Management: Security and policies for SOA using XML appliances&lt;br /&gt;
* September -  Ryan C. Barnett:  The Web Hacking Incident Database (WHID) 2007 Report&lt;br /&gt;
* August -  Jeff Williams: Don't Write Your Own Security Code&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=124092</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=124092"/>
				<updated>2012-02-11T19:44:22Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, February 22, 2012, 7:00 PM  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/owasp_membership https://www.owasp.org/images/2/2f/Donatenow.jpg]&lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday, February 22, 2012, 7:00 PM &amp;lt;br&amp;gt; ==&lt;br /&gt;
&amp;lt;!-- (Note different date, time and location)&amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''''Location:'''''&amp;lt;br&amp;gt;  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Symantec&amp;lt;br&amp;gt;900 Corporate Pointe (just off of Slauson)&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Great talks and free catered dinner for all attendees.&lt;br /&gt;
&lt;br /&gt;
Please RSVP: http://www.meetup.com/OWASP-Los-Angeles/events/47403862/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Topic: SharePoint Hacking Diggity Project  ====&lt;br /&gt;
&lt;br /&gt;
The SharePoint Hacking Diggity Project is a research and development initiative dedicated to investigating the latest tools and techniques in hacking Microsoft SharePoint technologies. This project page contains downloads and links to our latest SharePoint Hacking research and free security tools. Assessment strategies are designed to help SharePoint administrators and security professionals identify common insecure configurations and exposures introduced by vulnerable SharePoint deployments.&lt;br /&gt;
&lt;br /&gt;
==== Speaker: Francis Brown, Stach &amp;amp; Liu ====&lt;br /&gt;
&lt;br /&gt;
Francis Brown, MCSE, CISA, CISSP, is responsible for overseeing the company’s business operations as well as finance and administration functions. He also manages Stach &amp;amp; Liu’s 6sigma service quality program and leads internal practice development initiatives.&lt;br /&gt;
&lt;br /&gt;
Before joining Stach &amp;amp; Liu, Francis worked in the Global Risk Assessment team at Honeywell International where he performed network and application penetration testing, product security evaluations, incident response, and risk assessments of critical infrastructure. Prior to that, Francis was a consultant with the Ernst &amp;amp; Young Advanced Security Centers and conducted network, application, wireless, and remote access penetration tests for Fortune 500 clients.&lt;br /&gt;
&lt;br /&gt;
Francis has presented his research at leading conferences such as Black Hat USA, DEFCON, InfoSec World, and has been cited in numerous industry and academic publications.&lt;br /&gt;
&lt;br /&gt;
Francis holds a Bachelor of Science and Engineering from the University of Pennsylvania with a major in Computer Science and Engineering and a minor in Psychology.&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meeting Sponsors:   ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Other Events  ==&lt;br /&gt;
&lt;br /&gt;
'''ISSA-LA''' holds a lunch meeting on the 3rd Wed of each month, for more information visit [http://www.issa-la.org/ www.issa-la.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Kelly Fitzgerald, Yev Avidon, Mikhael Felker and Stuart Schwartz &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=117101</id>
		<title>OWASP Global AppSec Asia 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Global_AppSec_Asia_2011&amp;diff=117101"/>
				<updated>2011-09-10T18:03:57Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ [[Image:OWASP 2011 AppSec Asia.jpg|center|OWASP 2011 AppSec Asia.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP Global AppSec Asia Pacific 2011 - Beijing China  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter] will host '''OWASP Global AppSec Asia 2011''' in Beijing, China from Nov. 8 to Nov. 11, 2011. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from Asia and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities. &lt;br /&gt;
&lt;br /&gt;
==== 中文(Chinese)  ====&lt;br /&gt;
&lt;br /&gt;
=== 中文网站  ===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn OWASP 中国] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.cn/OWASP_Conference OWASP 2011亚太峰会] &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
请使用[http://www.regonline.com/appsecasia2011 RegOnline 链接]来注册(中文). &lt;br /&gt;
&lt;br /&gt;
Please use [http://www.regonline.com/owaspglobalappsecasia2011 RegOnline link] for your registration (English). &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP Global AppSec Asia 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/d/dd/Seba_reasonably_small.jpg &lt;br /&gt;
| [[:User:Sdeleersnyder|Seba Deleersnyder]], Managing Technical Consultant ICT Security at SAIT Zenitel. &lt;br /&gt;
As security project leader and information security officer for multiple customers Sebastien has build up extensive experience in Information Security related disciplines, both at strategic and tactical level. Sebastien specializes in (Web) Application Security,combining both his broad development and information security experience. &lt;br /&gt;
&lt;br /&gt;
Seba is the Belgian OWASP Chapter Leader, member of the influential OWASP Foundation Board and performed several public presentations on Web Application and Web Services Security. He also co-organizes the yearly security &amp;amp;amp; hacker BruCON conference and trainings in Brussels.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Manoranjan Paul  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/7/7c/Mano_Paul.jpg &lt;br /&gt;
| Manoranjan (Mano) Paul is founder and CEO of SecuRisk Solutions and Express Certifications, companies that specialize in security training, consulting and product development. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. &lt;br /&gt;
He is the author of the official (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; guide to the Certified Secure Software LifecycleProfessional (CSSLP) book (released June 2011) and has contributed to chapters in the Information Security Management Handbook. His has been interviewed and referenced in several articles including those in CIO.com. Mano has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering training, talks and keynotes in conferences such as the OWASP, ASIS, CSI, Catalyst, SC World Congress, (ISC)&amp;lt;sup&amp;gt;2&amp;lt;/sup&amp;gt; Security Congress, and TRISC.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Cassio Goldschmidt  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b4/Cassio.jpg &lt;br /&gt;
| [http://cassiogoldschmidt.com/Blog/default.html Cassio Goldschmidt] is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter). In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
Cassio's contribution to OWASP include: &lt;br /&gt;
&lt;br /&gt;
#Co-chair of OWASP AppSec USA 2010 &lt;br /&gt;
#Co-chair of OWASP AppSec Latin America 2011 &lt;br /&gt;
#Member of the conference committee &lt;br /&gt;
#Major contributions to the revamp of OWASP LA Chapter &lt;br /&gt;
#Honorary founder of OWASP Porto Alegre Chapter &lt;br /&gt;
#Board member of OWASP LA Chapter &lt;br /&gt;
#Speaking engagements at OWASP conferences&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Alexander Wang  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/f/fa/Wenjun.png&lt;br /&gt;
| Wenjun Wang is a tech lead and security architect in HP PPM R&amp;amp;amp;D with 10 years experience in software development and 4 years’ in security architecture. He used to work in the PPM integration team, took the tech lead for PPM-EDS project, now he acts as the tech lead and scrum master for PPM-Mobility project. He had been working in HP for 4 years. Before joining HP, he worked in Wuerth Phoenix as a Java developer for an ERP system. &lt;br /&gt;
As a team leader of the localization of AntiSamy Java in OWASP China, Wenjun organized the training of Antisamy Java and won welcome from students for his understandable style of speech and humor. He holds a master degree in EE and a bachelor degree in Accounting of Shanghai Jiaotong University. &lt;br /&gt;
|}&lt;br /&gt;
=== Marco M. Morana===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Marco Morana is leader of the OWASP (Open Web Application Security Project) Cincinnati&lt;br /&gt;
chapter, Ohio, USA and co-author of OWASP projects such as the secure coding guide and the testing guide. In his current position, Marco works as Sr. Technology Information Security Officer and Security Architect for Citigroup Global Consumer North America where his primary responsibility is security analysis and design review of financial based web applications including on-line banking. Prior to Citigroup, Marco worked for more than 15 years at different companies as software security consultant, security instructor, security application architect and security software engineer. Marco owns a Masters Degree in Computer Systems Engineering from Northwestern Polytechnic University and an Engineering Doctorate Degree (Dr. Ing.) in Mechanical Engineering from University of Padua. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Larry Man  ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/c/c0/Larryman.jpg &lt;br /&gt;
| Larry Man is a dynamic-leader in information security, with over 15 years experience in the field. He is Principle Consultant – SZBOWEB Company Limited which provides independent IT Security consulting to arrange of clients in China and Hong Kong. He is an expert in Data Security. He previously led a team in Ottawa Canada to create an embedded software system specialized in digital rights management. He is also the founder of Ironclad System, a software vendor in producing ERM systems. Larry used to work as a computer auditor of HSBC in HK. Larry was graduated from University of Manitoba with two degrees, one in Computer Science and one in Accounting &amp;amp;amp; Finance. He also had a Master Degree in Engineering from CUHK. Larry is based in Hong Kong and has previously lived in Canada, US and China.&lt;br /&gt;
|}&lt;br /&gt;
=== Daniel Ching Wa Ng===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
NG, CHING WA (Daniel) started the career as computer programmer in 1990, and then progressing towards ICT Security, Computer Forensics, Financial Accounting and Auditing after millennium. Recently, he starts his PhD (Security &amp;amp; Forensics) in a UK reputable institute and The Hong Kong Polytechnic University, after earning a good stock options as a corporate director in a listed entity. His interest is Cyber Security, Health Informatics, FaceBook investigation, Digital Evidence standard for forensics laboratory, and Network Forensics. Professionally, he is a committee member HTCIA Asia Pacifc, Chairperson of Professional Internet Security Professional (HK/China), Founder of China PIS Alliance (C-PISA), Director of ISACA China, and Expert Advisor to HKSAR Legco Councillor Samson Tam, ISC2 CSSLP evangelist and authorized trainer. Under the strong influence of knowledge intensive works, Daniel branches into the topic of e-learning, in particular, mobile learning. This research is working with Malaysia Government MIMOS, the national organization for ontology and semantic web. Academically, Daniel is strong in Knowledge Management with a master degree graduated at GPA 3.8.&lt;br /&gt;
&lt;br /&gt;
=== Frank Fan ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/b/b1/Frank_150.jpg&lt;br /&gt;
| Mr. Frank Fan was graduated from California State University as a Computer Science PhD.&lt;br /&gt;
With more than ten years of technical research and project management experience in world famous security companies, Mr. Frank Fan researched deeply about online security, database security and auditing and compliance( such as SOX, PCI, ISO17799/27001).&lt;br /&gt;
Because of his successful technological innovation in information security, he become the first Chinese who made a speech in the World’s top security conference BLACKHAT and he has certificates such as CISSP, CISA, GCIH, GCIA, etc. &lt;br /&gt;
Right now, Mr. Frank Fan is the vice president of OWASP China and member of 2008 Olympic Organizing Committee security group. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
=== Jonathan Werrett===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Jonathan Werrett is a Hong Kong based Senior Security Consultant with Trustwave's SpiderLabs. SpiderLabs is Trustwave's advanced security team focused on penetration testing,incident response, and application security. Over the past 10 years, Jonathan has worked in roles securing web infrastructure for a number of online start-ups, as well as providing web application testing and secure development consulting services to various international organizations. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
=== Noa Bar Yosef===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa writes a bi-weekly column on hacker trends and techniques for SecurityWeek.  Previously, she held the position of a senior security researcher for Imperva’s Application Defense Center. Noa holds a MSc degree (specializing in information security) from Tel-Aviv University. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== CFP and CFT  ====&lt;br /&gt;
&lt;br /&gt;
=== OWASP APPSEC ASIA 2011  ===&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Presentation  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia 2011 Conference will be a major international forum for the presentation of research results, cutting-edge ideas and in-depth discussions in the field of application security. OWASP AppSec Asia 2011 Conference invites application security researchers, thought leaders and developers worldwide to submit papers for the opportunity of presenting to 800+ expected participants. &lt;br /&gt;
&lt;br /&gt;
The topics we are seeking include, but are not limited to: &lt;br /&gt;
&lt;br /&gt;
#Web Application Security &lt;br /&gt;
#Mobile Application Security &lt;br /&gt;
#Cloud Application Security &lt;br /&gt;
#Software and Architecture Patterns for Application Security &lt;br /&gt;
#Metrics for Application Security &lt;br /&gt;
#OWASP Tools and Projects &lt;br /&gt;
#Secure Coding Practices (J2EE/.NET) &lt;br /&gt;
#Application Security Testing &lt;br /&gt;
#New Attacks and Defense &lt;br /&gt;
#Other subjects related to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission: &lt;br /&gt;
&lt;br /&gt;
#Download and fill out the form available at https://www.owasp.org/images/d/d3/OWASP_AppSec_Asia_2011_CFP_v2.zip &lt;br /&gt;
#Submit the form through the Easychair conference web site at http://www.easychair.org/conferences/?conf=GlobalAppSecAsia2011&lt;br /&gt;
&lt;br /&gt;
Each talk should be limited to 40 minutes, followed by a 10 minute question session. &lt;br /&gt;
&lt;br /&gt;
*Submission deadline: August 22, 2011. &lt;br /&gt;
*Notification of acceptance: September 9, 2011. &lt;br /&gt;
*Presentation slides due: October 21, 2011.&lt;br /&gt;
&lt;br /&gt;
=== CALL FOR Training  ===&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Asia will begin with two days of training sessions on November 10th and 11th, 2011. Proposals are solicited for the training of either a one-day (6 hours plus breaks) or two-day sessions on all topics of application security with focus on secure application design and development, threat modeling and defense strategy, and secure application testing. Each training session should cover a single topic in detail in order to allow trainees to grasp practical understanding and basic skill in the subject. Submissions should include a cover sheet and an extended abstract. The cover sheet should specify: &lt;br /&gt;
&lt;br /&gt;
#The title and length of the training; &lt;br /&gt;
#The intended audience and prerequisite knowledge or skills, if any; &lt;br /&gt;
#Complete contact information for the trainer; and &lt;br /&gt;
#Brief biography (max. 2 paragraphs) for the trainer. The extended abstract should be 1 to 2 pages, and should include an outline of the training plan, along with descriptions of the objectives and course materials.&lt;br /&gt;
&lt;br /&gt;
Training proposals in PDF or Word format must be sent via email by August 22, 2011 to Jack Li (jack.li@owasp.org). The submissions will undergo review and trainings will be selected by the OWASP AppSec Asia 2011 Conference Committee. Notifications will be sent out by September 9, 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;For more information, please see the following web pages: &lt;br /&gt;
&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/OWASP_Global_AppSec_Asia_2011&lt;br /&gt;
 OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
 OWASP Website: http://www.owasp.org&lt;br /&gt;
 Easychair conference site: https://www.easychair.org/account/signin.cgi?conf=apac2011 &lt;br /&gt;
 Presentation proposal form: https://www.owasp.org/images/b/b6/OWASP_AppSec_Asia_2011_CFP.zip &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&lt;br /&gt;
=== Preliminary Program  ===&lt;br /&gt;
&lt;br /&gt;
*Tue, November 8, 2011 - Conference. Exhibition(TBD).&lt;br /&gt;
&lt;br /&gt;
*Wed, November 9, 2011 - Conference. Exhibition(TBD)&lt;br /&gt;
&lt;br /&gt;
*Thu, November 10, 2011 - Training&lt;br /&gt;
&lt;br /&gt;
*Fri, November 11, 2011 - Training .&lt;br /&gt;
&lt;br /&gt;
=== Final Program  ===&lt;br /&gt;
&lt;br /&gt;
The final program will be available before October 2011. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US!  ===&lt;br /&gt;
&lt;br /&gt;
We are still soliciting sponsors for the OWASP Global AppSec Asia 2011. An exhibit hall will be held for vendor booths and presentations. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
More than 500 people attended the OWASP China conference last year. As a sponsor, you will gain exclusive access to companies in Asia through a limited number of expo floor slots. &lt;br /&gt;
&lt;br /&gt;
New in 2011, we are offering exclusive Global AppSec Sponsorships to provide additional benefits and streamline the planning process for our most supportive organizations. &lt;br /&gt;
&lt;br /&gt;
Please [mailto:heleng@owasp.org contact us] directly if you have any related question. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt;[https://www.owasp.org/images/2/24/OWASP_China2011_Sponsorship.pdf OWASP_China2011_Sponsorship.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Intented Sponsors:''' &lt;br /&gt;
&lt;br /&gt;
*[http://english.venustech.com.cn Venustech] &lt;br /&gt;
*[http://www.dumasoftware.com/about.asp?ArticleID=190 Duma Software Consulting Technology] &lt;br /&gt;
*[http://www.szboweb.com/?site_language=english SZBOWEB Company Limited] &lt;br /&gt;
*[http://www.dbappsecurity.com.cn DBAPPSecurity]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Partners ====&lt;br /&gt;
=== Media Partners  ===&lt;br /&gt;
&lt;br /&gt;
=== Personal Partners  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Contact us]&lt;br /&gt;
&lt;br /&gt;
=== Members (in alphabetical order)  ===&lt;br /&gt;
&lt;br /&gt;
*[mailto:frank.fan@dbappsecurity.com.cn Frank Fan 范渊] &lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao 高雯] &lt;br /&gt;
*[mailto:nsace2009@gmail.com Jianchun Jiang 蒋建春] &lt;br /&gt;
*[mailto:helen.gao@owasp.org Jack Li 李江宏] &lt;br /&gt;
*[mailto:rip@owasp.org.cn Rip Torn 万振華] &lt;br /&gt;
*[mailto:wangjie8578@yahoo.com.cn Jie Wang 王颉] &lt;br /&gt;
*[mailto:ivy@owasp.org.cn Ivy Zhang 张平] &lt;br /&gt;
*[mailto:zhendong.yu@owasp.org Zhendong Yu 于振东]&lt;br /&gt;
&lt;br /&gt;
==== Expense  ====&lt;br /&gt;
&lt;br /&gt;
=== Registration Fee  ===&lt;br /&gt;
&lt;br /&gt;
It it free for all OWASP members and all OWASP China chapter members. &lt;br /&gt;
&lt;br /&gt;
If you are neither an OWASP member nor an OWASP China chapter member, please feel free to join us! &lt;br /&gt;
&lt;br /&gt;
=== Accommodation  ===&lt;br /&gt;
&lt;br /&gt;
Please check the local hotel website for detail information. &lt;br /&gt;
&lt;br /&gt;
==== Logistics  ====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Beijing International Convention Center &lt;br /&gt;
&lt;br /&gt;
No 8 Beichen Dong Road Chaoyang District, Beijing China 100101 &lt;br /&gt;
&lt;br /&gt;
Tel: +86-10-84979768 &lt;br /&gt;
&lt;br /&gt;
website: http://www.bicc.com.cn &lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Attendees can enjoy preferred rates in following hotels. Please send email to [mailto:Ivy@owasp.org.cn Ivy] before Sep 30th, 2011 and reservation is subject to our confirmation. Hotels will not reserve rooms with preferential prices for us. &lt;br /&gt;
&lt;br /&gt;
1. [http://www.bicc.com.cn/English/jiudian/index.asp Beijing North Star Continental Grand Hotel] &lt;br /&gt;
&lt;br /&gt;
Add:No.8 Beichen Dong Road, Chaoyang District, Beijing P. R. China 100101 &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 580/day (include Chinese-style breakfast)(Four star) &lt;br /&gt;
&lt;br /&gt;
2. [http://www.huiyuangongyu.com.cn/en/main.html Huiyuan Service Apartment] &lt;br /&gt;
&lt;br /&gt;
Address: No. 8 North Star East Road, Chaoyang District, Beijing &lt;br /&gt;
&lt;br /&gt;
Price for Standard Rooms: RMB 390/day (Breakfast: RMB 30/person)--four star &lt;br /&gt;
&lt;br /&gt;
Price for standard Rooms: RMB 290/day (Breakfast: RMB 30/person)--three star &lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event &lt;br /&gt;
&lt;br /&gt;
*Invitation letter will be sent out for overseas attendees after registration. &lt;br /&gt;
*For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leader Workshop  ====&lt;br /&gt;
&lt;br /&gt;
== '''What is the Chapter Leader Workshop?'''  ==&lt;br /&gt;
&lt;br /&gt;
On '''Wednesday, November 9, 2011 at 2:30pm-5:30pm''' the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Items that will be discussed are:''' &lt;br /&gt;
&lt;br /&gt;
*How to improve the current Chapter Leader Handbook? &lt;br /&gt;
*How to start and support new chapters within the Asia/Pacific region? &lt;br /&gt;
*How to support inactive chapters in the Asia/Pacific region? &lt;br /&gt;
*What Governance model is required for OWASP chapters? &lt;br /&gt;
*How can the Global Chapters Committee facilitate the Asian OWASP chapters? &lt;br /&gt;
*...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Additionally we hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Funding to Attend the Workshop'''  ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Asia, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''September 15, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
#Ask your employer to fund your trip to AppSec Asia conference. &lt;br /&gt;
#Utilize your chapter funds. &lt;br /&gt;
#Ask the chapter committee for funding assistance.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After September 15, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''RSVP and Details'''  ==&lt;br /&gt;
&lt;br /&gt;
To RSVP and view more details about the Workshop, go to the '''[[OWASP Global AppSec Asia 2011 chapters workshop agenda]]'''. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Contact'''  ==&lt;br /&gt;
&lt;br /&gt;
Email [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] for more details. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_Asia_Summit_2011]] [[Category:China]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Cassio_Goldschmidt&amp;diff=117099</id>
		<title>User:Cassio Goldschmidt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Cassio_Goldschmidt&amp;diff=117099"/>
				<updated>2011-09-10T16:26:57Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cassio Goldschmidt is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter).  In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cassio's contribution to OWASP include:'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* Co-chair of OWASP AppSec USA 2010&lt;br /&gt;
* Co-chair of OWASP AppSec Latin America 2011&lt;br /&gt;
* Member of the conference committee&lt;br /&gt;
* Chapter Founder, OWASP Los Angeles&lt;br /&gt;
* Honorary founder of OWASP Porto Alegre Chapter&lt;br /&gt;
* Board member of OWASP LA Chapter&lt;br /&gt;
* Speaking engagements at OWASP conferences&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Cassio holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''More info:'''&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
* [http://www.cassiogoldschmidt.com Website]&lt;br /&gt;
* [http://www.linkedin.com/pub/cassio-goldschmidt/0/333/638 LinkedIn]&lt;br /&gt;
* Email: cassio 'at' owasp 'dot' org&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Cassio_Goldschmidt&amp;diff=117098</id>
		<title>User:Cassio Goldschmidt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Cassio_Goldschmidt&amp;diff=117098"/>
				<updated>2011-09-10T16:22:29Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cassio Goldschmidt is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter).  In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cassio's contribution to OWASP include:'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* Co-chair of OWASP AppSec USA 2010&lt;br /&gt;
* Co-chair of OWASP AppSec Latin America 2011&lt;br /&gt;
* Member of the conference committee&lt;br /&gt;
* Chapter Founder, OWASP Los Angeles&lt;br /&gt;
* Honorary founder of OWASP Porto Alegre Chapter&lt;br /&gt;
* Board member of OWASP LA Chapter&lt;br /&gt;
* Speaking engagements at OWASP conferences&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Cassio holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''More info:'''&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
* [http://www.linkedin.com/pub/cassio-goldschmidt/0/333/638 LinkedIn]&lt;br /&gt;
* [http://www.cassiogoldschmidt.com Website]&lt;br /&gt;
* Email: cassio 'at' owasp 'dot' org&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Cassio_Goldschmidt&amp;diff=117097</id>
		<title>User:Cassio Goldschmidt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Cassio_Goldschmidt&amp;diff=117097"/>
				<updated>2011-09-10T16:22:11Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cassio Goldschmidt is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter).  In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cassio's contribution to OWASP include:'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* Co-chair of OWASP AppSec USA 2010&lt;br /&gt;
* Co-chair of OWASP AppSec Latin America 2011&lt;br /&gt;
* Member of the conference committee&lt;br /&gt;
* Chapter Founder, OWASP Los Angeles&lt;br /&gt;
* Honorary founder of OWASP Porto Alegre Chapter&lt;br /&gt;
* Board member of OWASP LA Chapter&lt;br /&gt;
* Speaking engagements at OWASP conferences&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Cassio holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''More info:'''&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
* [http://www.linkedin.com/pub/cassio-goldschmidt/0/333/638 LinkedIn]&lt;br /&gt;
* [http://www.cassiogoldschmidt.com professional website]&lt;br /&gt;
* Email: cassio 'at' owasp 'dot' org&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecLatam2011_chapters_workshop_agenda&amp;diff=117096</id>
		<title>AppSecLatam2011 chapters workshop agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecLatam2011_chapters_workshop_agenda&amp;diff=117096"/>
				<updated>2011-09-10T16:18:26Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== General Information ==&lt;br /&gt;
&lt;br /&gt;
As part of [[AppSecLatam2011|AppSec Latin America 2011]], on '''Wednesday, October 5,2011 at 13:30h-16:30h''', the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.''&lt;br /&gt;
&lt;br /&gt;
'''Discussion topics include:'''&lt;br /&gt;
* How to improve the current Chapter Leader Handbook?&lt;br /&gt;
* How to start and support new chapters within Latin America?&lt;br /&gt;
* How to support inactive chapters within Latin America?&lt;br /&gt;
* What Governance model is required for OWASP chapters?&lt;br /&gt;
* How can the Global Chapters Committee facilitate the Latin American chapters?&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Funding to Attend Workshop ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec Latin America, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''August 22, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
# Ask your employer to fund your trip to AppSec USA conference.&lt;br /&gt;
# Utilize your chapter funds.&lt;br /&gt;
# Ask the chapter committee for funding assistance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After August 22, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
Proposed agenda (open for discussion): &lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Location - TBA&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 13:30 - 13:45&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Welcome and Introductions&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 13:45 - 14:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Handling chapter finances''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Sarah Baso, Participation: All '' &lt;br /&gt;
&lt;br /&gt;
Current chapter handbook [[:Chapter Handbook: Managing Money|section]] to be elaborated. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 14:30 - 14:45 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 14:45 - 15:30&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Top 10 advice for new and veteran chapter leaders''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Sarah Baso, Participation: All'' &lt;br /&gt;
&lt;br /&gt;
Create list [https://www.owasp.org/index.php/Talk:AppSecLatam_2011_chapters_workshop_agenda upfront and add action, impact and required support] from the Chapters Committee. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 15:30 - 15:40&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 15:40 - 16:25&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''How to cross-pollinate success between Latin American?''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Sarah Baso, Participation: All'' &lt;br /&gt;
&lt;br /&gt;
Look for good pollinator mechanisms and [https://www.owasp.org/index.php/Talk:AppSecLatam2011_chapters_workshop_agenda define 7 goals] to be accomplished by AppSec Latin America 2012 in Buenos Aires, Argentina.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Participants  ==&lt;br /&gt;
&lt;br /&gt;
'''If you plan to attend, please fill in your name and chapter below:'''&lt;br /&gt;
&lt;br /&gt;
*Sarah Baso (Global Chapters Committee Administrator)&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Magno_Logan Magno Rodrigues] ([https://www.owasp.org/index.php/Paraiba OWASP Paraiba Chapter Leader])&lt;br /&gt;
* Mauro Flores, Chapter Leader Uruguay&lt;br /&gt;
* Michael Hidalgo Fallas, Chapter Leader Costa Rica&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Leonardo_Francisco_Buonsanti_de_Andrade Leonardo F. Buonsanti de Andrade] ([https://www.owasp.org/index.php/Sao_Paulo OWASP São Paulo Chapter Leader])&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Cassio_Goldschmidt Cassio Goldschmidt], [https://www.owasp.org/index.php/Los_Angeles OWASP Los Angeles], Chapter Founder and Board Member&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Remote Participation  ==&lt;br /&gt;
&lt;br /&gt;
There will be WiFi, so we can set up a Skype or WebEx conference call for people who want to listen in or participate remotely. &lt;br /&gt;
&lt;br /&gt;
Contact [mailto:sarah.baso@owasp.org Sarah Baso] if you are interested in participating remotely.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapters Workshop at AppSec EU &amp;amp; USA ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/document/d/1PrGmwy1pxs2cb4LyewXS4TonbzAY7nORWvj-NJYaEnk/edit?hl=en_US Minutes from AppSec EU Chapter Workshop]&lt;br /&gt;
&lt;br /&gt;
[[AppSecEU 2011 chapters workshop agenda]]&lt;br /&gt;
&lt;br /&gt;
[[AppSec USA 2011 chapters workshop agenda]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Revising the Chapter Leader Handbook ==&lt;br /&gt;
&lt;br /&gt;
We hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Questions? ==&lt;br /&gt;
&lt;br /&gt;
Contact [mailto:sarah.baso@owasp.org Sarah Baso].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Global_Chapters_Committee]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecLatam2011_(es)&amp;diff=113585</id>
		<title>AppSecLatam2011 (es)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecLatam2011_(es)&amp;diff=113585"/>
				<updated>2011-07-07T22:09:29Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; width=&amp;quot;700&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; width=&amp;quot;500&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:AppSec Brasil 11 medio.png]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; '''Lenguaje:&amp;lt;br&amp;gt;[http://www.owasp.org/index.php?title=AppSecLatam2011 http://www.owasp.org/images/8/88/Bandeira_reino_unido.png]	&lt;br /&gt;
[http://www.owasp.org/index.php?title=AppSecLatam2011_(pt-br) http://www.owasp.org/images/4/49/Bandeira_brasil.png] [http://www.owasp.org/index.php?title=AppSecLatam2011_(es) http://www.owasp.org/images/1/1c/Bandeira_espanha.png]  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/1/19/AppSecLatam_2011_Announcement.pdf Comunicado de Prensa] &lt;br /&gt;
*[[AppSecLA2011/Media Mentions|Menciones de Medios]] &lt;br /&gt;
*[[AppSecLA2011/Archived|Archivos]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Síganos:&amp;lt;br&amp;gt;[http://www.twitter.com/AppSecLatam http://www.owasp.org/images/f/f7/Twitter.png]	&lt;br /&gt;
[http://www.facebook.com/event.php?eid=155195651207509 http://www.owasp.org/images/5/55/Facebook.png] [http://events.linkedin.com/OWASP-Global-AppSec-Latin-America-2011/pub/607738 http://www.owasp.org/images/1/1a/Linkedin.png]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Bienvenido  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
Nos complace en anunciar que el [http://www.owasp.org/index.php/Porto_Alegre Capítulo Local de OWASP Puerto Alegre] organizará '''Global AppSec Latín America 2011 Conference''' en Puerto Alegre-RS, Brasil. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
La Global AppSec Latín America 2011 Conference será un encuentro de líderes de América Latína en Seguridad de la Información, donde se presentarán ideas de vanguardia. Los eventos organizados por OWASP atraen a la audiencia interesada en las últimas novedades. Se espera la presencia de 200-250 personas de diferentes ámbitos, Gubernamentales, Servicios Financieros, Medios de Comunicación, Farmacia, Salud, Tecnología, entre otros.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
OWASP Global AppSec Latín América 2011 se realizará en la ciudad de Puerto Alegre, estado de Río Grande del Sur, Brasil [http://maps.google.es/maps?f=q&amp;amp;source=s_q&amp;amp;geocode=&amp;amp;q=Porto+Alegre&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=Porto+Alegre+-+Rio+Grande+do+Sul,+Brasil&amp;amp;z=11 mapa] del 4 a 7 de Octubre de 2011. Las capacitaciones serán 4 y 5, mientras que la conferencia será 6 y 7 de Octubre.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sí usted tiene alguna pregunta, por favor, envíe un email a la organización: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Quién debería asistir a Global AppSec Latín América 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Desarrolladores de Aplicaciones&lt;br /&gt;
*Probadores de Aplicación y Aseguradores de Calidad&lt;br /&gt;
*Administradores de Proyectos y Personal&lt;br /&gt;
*Directores de Seguridad de la Información, Jefes de Tecnología&lt;br /&gt;
*Directores de Finanzas, Auditores, Responsables de Seguridad&lt;br /&gt;
*Administradores de Seguridad&lt;br /&gt;
*Ejecutivos, Gerentes, personal responsable de Gobierno de Seguridad&lt;br /&gt;
*Profesionales de TI interesados en la mejora de la Seguridad&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
[[Image:Owasp-poa-eng.png]] &lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Utilice el siguiente hashtag '''[http://search.twitter.com/search?q=%23AppSecLatam #AppSecLatam]''' para twittear acerca de Global AppSec Latín América 2011 (Qué son los [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSecLatAm Twitter Feed ([http://twitter.com/AppSecLatam Síguenos en Twitter!])''' &amp;lt;twitter&amp;gt;262394051&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFT &amp;amp;amp; CFP  ====&lt;br /&gt;
&lt;br /&gt;
== CFT  ==&lt;br /&gt;
&lt;br /&gt;
Lea la LLamada a las Capacitaciones (Call for Trainings) en: [https://www.owasp.org/index.php/AppSecLatam2011/CFT_es https://www.owasp.org/index.php/AppSecLatam2011/CFT_es] &lt;br /&gt;
&lt;br /&gt;
Estamos realizando una investigación sobre los tópicos de las capacitaciones. Usted puede ayudarnos respondiendo las preguntas en la siguiente dirección: &lt;br /&gt;
&lt;br /&gt;
[http://www.surveymonkey.com/s/3RCZ9RR http://www.surveymonkey.com/s/3RCZ9RR] &lt;br /&gt;
&lt;br /&gt;
== CFP  ==&lt;br /&gt;
&lt;br /&gt;
Lea la Llamada a las Presentaciones en [https://www.owasp.org/index.php/AppSecLatam2011/CFP_es https://www.owasp.org/index.php/AppSecLatam2011/CFP_es] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Comité del Programa  ==&lt;br /&gt;
&lt;br /&gt;
*Kuai Hinojosa &lt;br /&gt;
*Leandro Gomes &lt;br /&gt;
*Leonardo Buonsanti &lt;br /&gt;
*Leonardo Lemes &lt;br /&gt;
*Luiz Eduardo &lt;br /&gt;
*Luiz Otávio Duarte &lt;br /&gt;
*Mateo Martinez &lt;br /&gt;
*Rodrigo Rubira&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Conferencias Destacadas  ====&lt;br /&gt;
&lt;br /&gt;
== '''Conferencias Destacadas'''  ==&lt;br /&gt;
&lt;br /&gt;
== Bryan Sullivan  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; width=&amp;quot;200&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; width=&amp;quot;1000&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/36/Bryan-sullivan.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/bryanjsullivan Bryan Sullivan ] es Investigador Señor de Seguridad en Adobe Systems, donde él está focalizado en cuestiones de seguridad en la nube. Antes de Abobe, trabajó como Director del equipo de Desarrollo Seguro de Microsoft (SDL), y Jefe de Desarrollo en HP, donde ha ayudado a diseñar los escáneres de vulnerabilidades WebInspect y DevInspect.&lt;br /&gt;
Bryan ha sido orador en conferencias de seguridad como Black Hat, RSA Conference, BlueHat y TechEd sobre diversos tópicos incluyendo NoSQL, RIA, REST, Criptografía, Defensa de DoS,  reescritura de URLs, y aplicación de desarrollo seguro a Proyectos Ágiles. Autor de la columna &amp;quot;Security Briefs&amp;quot; en MSDN Magazine, y es el coautor de los libros Ajax Security (Addison-Wesley, 2007) y el próximo a publicarse Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011). [http://www.linkedin.com/in/bryanjsullivan Linkedin] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Oradores Invitados'''  ==&lt;br /&gt;
&lt;br /&gt;
== Chris Evans  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; width=&amp;quot;200&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; width=&amp;quot;1000&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/4/48/ChrisEvans1.png &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/scarybeast Chris Evans] - Troublemaker, Google Inc. Chris Evans es conocido por varios trabajos en la comunidad de la seguridad. En particular, él es investigador de seguridad y autor de vsftpd. Los detalles de vsftpd pueden encontrarse en http://vsftpd.beasts.org/. Su trabajo incluye vulnerabilidades en los principales navegadores (Firefox, Safari, Internet Explorer, Opera, Chrome); los núcleos de los sistemas operativos Linux y OpenBSD; la JDK de Sun; y varios paquetes de código abierto. Él publica sus trabajos en el Blog [http://scarybeastsecurity.blogspot.com http://scarybeastsecurity.blogspot.com]. En Google, Chris actualmente lidera la seguridad de Google Chrome. Se ha presentado en varias conferencias (PacSec, HiTB Dubai, HiTB Malaysia, BlackHat Europe, HiTB Amsterdam, OWASP, etc.) mientras que en HiTB y WOOT forma parte del panel de selección de los trabajos. [http://www.linkedin.com/in/scarybeast Linkedin]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Michael Craigue  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; width=&amp;quot;200&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; width=&amp;quot;1000&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/0/0c/MichaelCraigue.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/craigue Michael Craigue] (CISSP/CSSLP) es Director del grupo de Consultoría en Seguridad de Dell, con 14 miembros del equipo en Brasil, India, Malasia, y Estados Unidos. Él y su equipo tienen la responsabilidad de los departamentos internos de Dell incluyendo TI, Grupo de Productos, Servicios, y Funciones y Adquisiciones, con un enfoque particular en el Ciclo de Vida de Desarrollo de Software Seguro. Ha sido profesor en Administración de Base de Datos e Inteligencia Artificial / Gestión del Conocimiento en St. Edward's University en los programas de MBA (Master in Business Administration) / MS CIS (Master of Science in Computer Information Systems). Antes de unirse al equipo de seguridad de la información de Dell, desarrolló por más de una década Aplicaciones Web y de Base de Datos. Tiene un doctorado en la Universidad de Texas en Austin, en Higher Education Administration / Finance. [http://www.linkedin.com/in/craigue Linkedin]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== 4-5 de Octubre (Capacitaciones)  ====&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
Será publicada a la brevedad.&lt;br /&gt;
&lt;br /&gt;
==== 6 de Octubre  ====&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
Será publicada a la brevedad.&lt;br /&gt;
&lt;br /&gt;
==== 7 de Octubre  ====&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
Será publicada a la brevedad.&lt;br /&gt;
&lt;br /&gt;
==== Registración  ====&lt;br /&gt;
&lt;br /&gt;
Será publicada a la brevedad.&lt;br /&gt;
&lt;br /&gt;
=== Costo de Registro  ===&lt;br /&gt;
&lt;br /&gt;
Será publicado a la brevedad.&lt;br /&gt;
&lt;br /&gt;
==== Información Útil  ====&lt;br /&gt;
&lt;br /&gt;
== Guía para Visitantes  ==&lt;br /&gt;
&lt;br /&gt;
Puerta para turistas en el estado de Rio Grande del Sur en Brasil, y a sólo 200 KM de la agradable Sierra Gaucha, Puerto Alegre tiene un centro de servicios y una infraestructura con calidad reconocida, y una base de grandes empresas nacionales e internacionales junto con una importante cantidad de eventos internacionales en Brasil.&lt;br /&gt;
&lt;br /&gt;
Enlaces útiles: &lt;br /&gt;
&lt;br /&gt;
[http://www2.portoalegre.rs.gov.br/turismo http://www2.portoalegre.rs.gov.br/turismo] &lt;br /&gt;
&lt;br /&gt;
[https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Informe sobre Brasil y su potencial desarrollo (60 Minutos): &amp;lt;br&amp;gt; {{#ev:youtube|DMM7OJ_Kj9I}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video Turístico sobre la Ciudad de Puerto Alegre:&amp;lt;br&amp;gt; {{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
== Corriente Eléctrica  ==&lt;br /&gt;
&lt;br /&gt;
[http://omegatek.blogspot.com/2010/05/novo-padrao-de-tomadas-brasileiras.html https://www.owasp.org/images/0/0f/Tomadas_diversas.jpg] &amp;lt;br&amp;gt;&lt;br /&gt;
Referencia: [http://omegatek.blogspot.com/2010/05/novo-padrao-de-tomadas-brasileiras.html http://omegatek.blogspot.com/2010/05/novo-padrao-de-tomadas-brasileiras.html]&lt;br /&gt;
&lt;br /&gt;
== Estado del Tiempo  ==&lt;br /&gt;
&lt;br /&gt;
== Viaje  ==&lt;br /&gt;
&lt;br /&gt;
== Alojamiento  ==&lt;br /&gt;
&lt;br /&gt;
'''NOVOTEL PORTO ALEGRE'''&amp;lt;br&amp;gt;&lt;br /&gt;
Av. Soledade, 575&amp;lt;br&amp;gt;&lt;br /&gt;
Três Figueiras&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: (51) 3327-9292&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Single / Double&amp;lt;br&amp;gt;&lt;br /&gt;
R$243,00 / R$289,00&amp;lt;br&amp;gt;&lt;br /&gt;
Cortesy breakfast&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
General Conditions&amp;lt;br&amp;gt;&lt;br /&gt;
. Diárias expressas em reais (R$), por dia e por apartamento; . Diárias iniciam e terminam às 12 horas; . Taxa de Turismo (opcional) - R$2,50 por dia/apartamento; . Imposto Municipal: acrescer 5% ISS; . O acesso à internet nas áreas sociais e nos apartamentos é cortesia; . Estacionamento: R$16,00 por carro ao dia (com manobrista); . Terceira pessoa no apartamento: Mediante disponibilidade. Cobrada taxa diária de R$47,00 + 5% ISS e será acomodada em cama extra ou sofá cama; . Forma de Pagamento: Depósito antecipado ou pagamento direto; . Garantia de No Show: Todas as reservas deverão ter garantia de no show. Em caso de não comparecimento, poderá ser cobrado o período integral reservado; . Não aceitamos cheques; . Duas crianças de até 16 anos no Novotel e uma criança de até 12 anos no Mercure acompanhadas dos pais/responsáveis no mesmo apartamento serão cortesia.&lt;br /&gt;
Necessária apresentação de documentação de identificação no check-in; . Valores pagos não serão reembolsáveis ou dados como créditos para próximas hospedagens;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Map link:&amp;lt;br&amp;gt;&lt;br /&gt;
http://maps.google.com.br/maps?hl=pt-BR&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;q=novotel+porto+alegre&amp;amp;fb=1&amp;amp;gl=br&amp;amp;hq=novotel&amp;amp;hnear=0x9519784e88e1007d:0xc7011777424f60bd,Porto+Alegre+-+RS&amp;amp;cid=0,0,11722004907679800889&amp;amp;ei=GKn4TfaHDIP20gGF9pXDCw&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=image&amp;amp;resnum=1&amp;amp;ved=0CDAQnwIwAA&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/3/33/Novohotel.jpg&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Eventos Sociales  ====&lt;br /&gt;
&lt;br /&gt;
La información será publicada aquí.&lt;br /&gt;
&lt;br /&gt;
==== Patrocinio  ====&lt;br /&gt;
&lt;br /&gt;
Estamos buscando patrocinadores para la edición de Global AppSec América Latína 2011. Ver más detalles sobre oportunidades de patrocinio.&lt;br /&gt;
&lt;br /&gt;
Sí usted está interesado en ser Patrocinador de Global AppSec Latín America 2011, por favor contáctese: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]. &lt;br /&gt;
&lt;br /&gt;
Para saber más sobre las oportunidades de patrocinio por favor consulte el siguiente documento: &amp;lt;br&amp;gt; [https://www.owasp.org/images/7/70/OWASP_AppSec_2011_Sponsorship_Spanish.pdf OWASP AppSec 2011 Patrocinio Español.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Patrocinio Diamante ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:elipse_logo3.png|link=http://www.elipse.com.br]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Patrocinio Platina ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Patrocinio Ouro ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:IT2S.png|link=http://www.it2s.com.br]] &lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Patrocinio Prata ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Adobe_logo5.png|link=http://www.adobe.com]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Promoción Local  ==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Logo-PoaSec2.png|Logo-PoaSec.png]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Equipo  ====&lt;br /&gt;
&lt;br /&gt;
[mailto:abc@elipse.com.br Alexandre Balestrin Correa]&amp;lt;br&amp;gt; [http://cassiogoldschmidt.com/ Cassio Goldschmidt]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Jeronimo_Zucco Jerônimo Zucco ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Gustavo_Barbato L. Gustavo C. Barbato ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Sapao Lucas C. Ferreira ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Rafael_Dreher Rafael Dreher ]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecLatam2011_(pt-br)&amp;diff=113584</id>
		<title>AppSecLatam2011 (pt-br)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecLatam2011_(pt-br)&amp;diff=113584"/>
				<updated>2011-07-07T22:09:09Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; width=&amp;quot;700&amp;quot; | &lt;br /&gt;
! align=&amp;quot;center&amp;quot; width=&amp;quot;500&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:AppSec Brasil 11 medio.png]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; '''Língua:&amp;lt;br&amp;gt;[http://www.owasp.org/index.php?title=AppSecLatam2011 http://www.owasp.org/images/8/88/Bandeira_reino_unido.png]	&lt;br /&gt;
[http://www.owasp.org/index.php?title=AppSecLatam2011_(pt-br) http://www.owasp.org/images/4/49/Bandeira_brasil.png] [http://www.owasp.org/index.php?title=AppSecLatam2011_(es) http://www.owasp.org/images/1/1c/Bandeira_espanha.png]  | &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/1/19/AppSecLatam_2011_Announcement.pdf Comunicado de Imprensa] &lt;br /&gt;
*[[AppSecLatam2011/Media Mentions|Menções na mídia]] &lt;br /&gt;
*[[AppSecLatam2011/Archived|Arquivos]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Siga-nos:&amp;lt;br&amp;gt;[http://www.twitter.com/AppSecLatam http://www.owasp.org/images/f/f7/Twitter.png]	&lt;br /&gt;
[http://www.facebook.com/event.php?eid=155195651207509 http://www.owasp.org/images/5/55/Facebook.png] [http://events.linkedin.com/OWASP-Global-AppSec-Latin-America-2011/pub/607738 http://www.owasp.org/images/1/1a/Linkedin.png] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Apresentação  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
Temos o prazer de anunciar que o [http://www.owasp.org/index.php/Porto_Alegre Capítulo OWASP de Porto Alegre] irá organizar a '''Conferência Global AppSec Latin America 2011''' em Porto Alegre-RS, Brasil. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A conferência Global AppSec Latin América 2011 será uma reunião de líderes latino-americanos na área de Segurança da Informação, e irá apresentar temas e idéias de vanguarda sobre o assunto. Eventos OWASP atraem público do mundo todo interessados nas tendências da área. A conferência espera atrair 200 a 250 tecnólogos do governo, serviços financeiros, mídia, indústria farmacêutica, saúde, tecnologia, e muitas outras áreas. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A OWASP Global AppSec Latin América 2011 irá acontecer no Brasil na cidade de Porto Alegre, estado do Rio Grande do Sul ([http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=pt-BR&amp;amp;geocode=&amp;amp;q=Porto+Alegre&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=Porto+Alegre+-+Rio+Grande+do+Sul,+Brasil&amp;amp;z=11 mapa]) nos dias 04 à 07 de outubro de 2011. Ocorrerão cursos no dias 4 e 5 de outubro, e as sessões plenárias nos dias 6 e 7 de outubro. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Se você tiver algum questionamento, por favor entre em contato com a organização do evento através do e-mail: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org].&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; '''Quem deve atender a Global AppSec Latin América 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Desenvolvedores de Aplicativos &lt;br /&gt;
*Testadores de Aplicativos e de Qualidade &lt;br /&gt;
*Gerentes de Projetos de Aplicativos e Funcionários &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputados, Associados and Membros &lt;br /&gt;
*Chief Financial Officers, Auditores, e Pessoas Responsáveis pela Segurança de TI e Compliance &lt;br /&gt;
*Gerentes de Segurança e Pessoal &lt;br /&gt;
*Executivos, Gerentes e Pessoas Responsáveis pela Governança de TI &lt;br /&gt;
*Profissionais de TI Interessados em Aprofundar seus Conhecimentos em Segurança&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
[[Image:Owasp-poa-eng.png]] &lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use o '''[http://search.twitter.com/search?q=%23AppSecLatam #AppSecLatam]''' hashtag para seus tweets para a Global AppSec Latin America 2011 (O que é [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSecLatAm Twitter Feed ([http://twitter.com/AppSecLatam Siga-nos no Twitter!])''' &amp;lt;twitter&amp;gt;262394051&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFT e CFP  ====&lt;br /&gt;
&lt;br /&gt;
== CFT  ==&lt;br /&gt;
Leia a chamada de mini-cursos completa em [https://www.owasp.org/index.php/AppSecLatam2011_(pt-br)/CFT https://www.owasp.org/index.php/AppSecLatam2011_(pt-br)/CFT].&lt;br /&gt;
&lt;br /&gt;
Estamos realizando uma pesquisa sobre os temas para treinamentos. Você pode ajudar, respondendo a pesquisa no seguinte endereço:&lt;br /&gt;
&lt;br /&gt;
[http://www.surveymonkey.com/s/3RCZ9RR http://www.surveymonkey.com/s/3RCZ9RR]&lt;br /&gt;
&lt;br /&gt;
== CFP  ==&lt;br /&gt;
&lt;br /&gt;
Leia a chamada de trabalhos para apresentações completa em [https://www.owasp.org/index.php/AppSecLatam2011_(pt-br)/CFP https://www.owasp.org/index.php/AppSecLatam2011_(pt-br)/CFP].&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Comitê de Programa  ==&lt;br /&gt;
&lt;br /&gt;
* Kuai Hinojosa&lt;br /&gt;
* Leandro Gomes&lt;br /&gt;
* Leonardo Buonsanti&lt;br /&gt;
* Leonardo Lemes&lt;br /&gt;
* Luiz Eduardo&lt;br /&gt;
* Luiz Otávio Duarte&lt;br /&gt;
* Mateo Martinez&lt;br /&gt;
* Rodrigo Rubira&lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
== '''Keynotes'''  ==&lt;br /&gt;
&lt;br /&gt;
== Bryan Sullivan  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/36/Bryan-sullivan.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/bryanjsullivan Bryan Sullivan ] is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect. &lt;br /&gt;
Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on a diverse range of topics including NoSQL, RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011). [http://www.linkedin.com/in/bryanjsullivan Linkedin] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Guest Speakers'''  ==&lt;br /&gt;
&lt;br /&gt;
== Chris Evans  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/4/48/ChrisEvans1.png &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/scarybeast Chris Evans] - Troublemaker, Google Inc. Chris Evan is known for various work in the security community. Most notably, he is the author of vsftpd and a vulnerability researcher. Details of vsftpd are at http://vsftpd.beasts.org/. His work includes vulnerabilities in all the major browsers (Firefox, Safari, Internet Explorer, Opera, Chrome); the Linux and OpenBSD kernels; Sun's JDK; and lots of open source packages. He blogs about some of his work at [http://scarybeastsecurity.blogspot.com http://scarybeastsecurity.blogspot.com]. At Google, Chris currently leads security for Google Chrome. He has presented at various conferences (PacSec, HiTB Dubai, HiTB Malaysia, BlackHat Europe, HiTB Amsterdam, OWASP, etc.) and is on the HiTB and WOOT paper selection panels. [http://www.linkedin.com/in/scarybeast Linkedin]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Michael Craigue  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/0/0c/MichaelCraigue.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/craigue Michael Craigue] (CISSP/CSSLP) is Director of the Security Consulting group at Dell, with 14 team members in Brazil, India, Malaysia, and the US. He and his team have responsibility for consulting with all of Dell’s internal organizations, including IT, Product Group, Services, and Mergers and Acquisitions, with a particular focus on the Secure Software Development Lifecycle. He has taught Database Management and Business Intelligence / Knowledge Management at St. Edward’s University in their MBA / MS CIS programs. Prior to joining Dell’s information security team, he spent a decade building Web and database applications. He has a PhD from the University of Texas at Austin in Higher Education Administration / Finance. [http://www.linkedin.com/in/craigue Linkedin]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== 04 à 05 de Outubro (Treinamentos)  ====&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
Será divulgada em breve. &lt;br /&gt;
&lt;br /&gt;
==== 06 de Outubro  ====&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
Será divulgada em breve. &lt;br /&gt;
&lt;br /&gt;
==== 07 de Outubro  ====&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
Será divulgada em breve. &lt;br /&gt;
&lt;br /&gt;
==== Inscrições  ====&lt;br /&gt;
&lt;br /&gt;
Será divulgada em breve. &lt;br /&gt;
&lt;br /&gt;
=== Preços ===&lt;br /&gt;
&lt;br /&gt;
Serão divulgados em breve. &lt;br /&gt;
&lt;br /&gt;
==== Informações  ====&lt;br /&gt;
&lt;br /&gt;
== Guia Turístico  ==&lt;br /&gt;
&lt;br /&gt;
Portão de entrada de turistas no Estado e a apenas 120 quilômetros da aprazível Serra Gaúcha, Porto Alegre é um movimentado pólo de serviços e de infraestrutura de qualidade reconhecidas, base de grandes empresas nacionais e internacionais e um dos principais destinos de eventos internacionais no Brasil. &lt;br /&gt;
&lt;br /&gt;
Links úteis: [http://www2.portoalegre.rs.gov.br/turismo http://www2.portoalegre.rs.gov.br/turismo] &lt;br /&gt;
&lt;br /&gt;
[https://secure.wikimedia.org/wikipedia/pt/wiki/Porto_Alegre https://secure.wikimedia.org/wikipedia/pt/wiki/Porto_Alegre] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Recente reportagem do programa americano 60 Minutes sobre o potencial de crescimento do Brasil: &amp;lt;br&amp;gt; &lt;br /&gt;
{{#ev:youtube|DMM7OJ_Kj9I}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Vídeo turístico sobre Porto Alegre:&amp;lt;br&amp;gt;&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
== Tomadas Elétricas  ==&lt;br /&gt;
&lt;br /&gt;
[http://omegatek.blogspot.com/2010/05/novo-padrao-de-tomadas-brasileiras.html https://www.owasp.org/images/0/0f/Tomadas_diversas.jpg] &amp;lt;br&amp;gt;&lt;br /&gt;
Referência: [http://omegatek.blogspot.com/2010/05/novo-padrao-de-tomadas-brasileiras.html http://omegatek.blogspot.com/2010/05/novo-padrao-de-tomadas-brasileiras.html]&lt;br /&gt;
&lt;br /&gt;
== Previsão do Tempo  ==&lt;br /&gt;
&lt;br /&gt;
== Viagem  ==&lt;br /&gt;
&lt;br /&gt;
== Acomodações  ==&lt;br /&gt;
&lt;br /&gt;
'''NOVOTEL PORTO ALEGRE'''&amp;lt;br&amp;gt;&lt;br /&gt;
Av. Soledade, 575&amp;lt;br&amp;gt;&lt;br /&gt;
Três Figueiras&amp;lt;br&amp;gt;&lt;br /&gt;
Fone: (51) 3327-9292&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Single / Double&amp;lt;br&amp;gt;&lt;br /&gt;
R$243,00 / R$289,00&amp;lt;br&amp;gt;&lt;br /&gt;
Café da manhã cortesia&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CONDIÇÕES GERAIS&amp;lt;br&amp;gt;&lt;br /&gt;
. Diárias expressas em reais (R$), por dia e por apartamento; . Diárias iniciam e terminam às 12 horas; . Taxa de Turismo (opcional) - R$2,50 por dia/apartamento; . Imposto Municipal: acrescer 5% ISS; . O acesso à internet nas áreas sociais e nos apartamentos é cortesia; . Estacionamento: R$16,00 por carro ao dia (com manobrista); . Terceira pessoa no apartamento: Mediante disponibilidade. Cobrada taxa diária de R$47,00 + 5% ISS e será acomodada em cama extra ou sofá cama; . Forma de Pagamento: Depósito antecipado ou pagamento direto; . Garantia de No Show: Todas as reservas deverão ter garantia de no show. Em caso de não comparecimento, poderá ser cobrado o período integral reservado; . Não aceitamos cheques; . Duas crianças de até 16 anos no Novotel e uma criança de até 12 anos no Mercure acompanhadas dos pais/responsáveis no mesmo apartamento serão cortesia.&lt;br /&gt;
Necessária apresentação de documentação de identificação no check-in; . Valores pagos não serão reembolsáveis ou dados como créditos para próximas hospedagens;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link do mapa:&amp;lt;br&amp;gt;&lt;br /&gt;
http://maps.google.com.br/maps?hl=pt-BR&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;q=novotel+porto+alegre&amp;amp;fb=1&amp;amp;gl=br&amp;amp;hq=novotel&amp;amp;hnear=0x9519784e88e1007d:0xc7011777424f60bd,Porto+Alegre+-+RS&amp;amp;cid=0,0,11722004907679800889&amp;amp;ei=GKn4TfaHDIP20gGF9pXDCw&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=image&amp;amp;resnum=1&amp;amp;ved=0CDAQnwIwAA&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/3/33/Novohotel.jpg&lt;br /&gt;
&lt;br /&gt;
==== Eventos Sociais  ====&lt;br /&gt;
&lt;br /&gt;
Serão divulgados em breve. &lt;br /&gt;
&lt;br /&gt;
==== Patrocínios  ====&lt;br /&gt;
&lt;br /&gt;
Estamos atualmente buscado patrocinadores para a edição 2011 da Global AppSec Latin América. Veja mais detalhes sobre as oportunidades de patrocínio. &lt;br /&gt;
&lt;br /&gt;
Se estiver interessado em patrocinar o Global AppSec Latin América 2011, por favor entre em contato com a equipe organizadora da conferência pelo email [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]. &lt;br /&gt;
&lt;br /&gt;
Para mais detalhes sobre diferentes oportunidades de patrocínio, por favor verifique o documento abaixo:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/c/cf/OWASP_AppSec_2011_Sponsorship_Portuguese.pdf OWASP AppSec 2011 Sponsorship Portuguese.pdf]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Patrocínio Diamante ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:elipse_logo3.png|link=http://www.elipse.com.br]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Patrocínio Platina ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Patrocínio Ouro ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:IT2S.png|link=http://www.it2s.com.br]] &lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Patrocínio Prata ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Adobe_logo5.png|link=http://www.adobe.com]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Organização Local ==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Logo-PoaSec2.png|link=http://www.poasec.org]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Organizadores  ====&lt;br /&gt;
&lt;br /&gt;
[mailto:abc@elipse.com.br Alexandre Balestrin Correa]&amp;lt;br&amp;gt; &lt;br /&gt;
[http://cassiogoldschmidt.com/ Cassio Goldschmidt]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Jeronimo_Zucco Jerônimo Zucco ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Gustavo_Barbato L. Gustavo C. Barbato ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Sapao Lucas C. Ferreira ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Rafael_Dreher Rafael Dreher ]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecLatam2011&amp;diff=113583</id>
		<title>AppSecLatam2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecLatam2011&amp;diff=113583"/>
				<updated>2011-07-07T22:08:35Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:AppSec Brasil 11 medio.png]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; '''Language:&amp;lt;br&amp;gt;[http://www.owasp.org/index.php?title=AppSecLatam2011 http://www.owasp.org/images/8/88/Bandeira_reino_unido.png]	&lt;br /&gt;
[http://www.owasp.org/index.php?title=AppSecLatam2011_(pt-br) http://www.owasp.org/images/4/49/Bandeira_brasil.png] [http://www.owasp.org/index.php?title=AppSecLatam2011_(es) http://www.owasp.org/images/1/1c/Bandeira_espanha.png]  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/1/19/AppSecLatam_2011_Announcement.pdf Press Release] &lt;br /&gt;
*[[AppSecLA2011/Media Mentions|Media Mentions]] &lt;br /&gt;
*[[AppSecLA2011/Archived|Archived]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Follow us:&amp;lt;br&amp;gt;[http://www.twitter.com/AppSecLatam http://www.owasp.org/images/f/f7/Twitter.png]	&lt;br /&gt;
[http://www.facebook.com/event.php?eid=155195651207509 http://www.owasp.org/images/5/55/Facebook.png] [http://events.linkedin.com/OWASP-Global-AppSec-Latin-America-2011/pub/607738 http://www.owasp.org/images/1/1a/Linkedin.png]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
We are pleased to announce that the [http://www.owasp.org/index.php/Porto_Alegre OWASP Porto Alegre Local Chapter] will organize the '''Global AppSec Latin America 2011 Conference''' in Porto Alegre-RS, Brazil. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The Global AppSec Latin America 2011 Conference will be a reunion of Information Security latin american leaders, and will present cutting-edge ideas. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 200-250 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many other verticals.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A OWASP Global AppSec Latin América 2011 will be happens in Brazil at Porto Alegre city, Rio Grande do Sul state [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=pt-BR&amp;amp;geocode=&amp;amp;q=Porto+Alegre&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=Porto+Alegre+-+Rio+Grande+do+Sul,+Brasil&amp;amp;z=11 map] in October 4th to 7th 2011. The trainings will be in October 04 and 05, and the presentations will be in October 06 and 07.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; If you have any questions, please email the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who Should Attend Global AppSec Latin América 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
[[Image:Owasp-poa-eng.png]] &lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23AppSecLatam #AppSecLatam]''' hashtag for your tweets for Global AppSec Latin America 2011 (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSecLatAm Twitter Feed ([http://twitter.com/AppSecLatam Follow us on Twitter!])''' &amp;lt;twitter&amp;gt;262394051&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFT &amp;amp;amp; CFP  ====&lt;br /&gt;
&lt;br /&gt;
== CFT  ==&lt;br /&gt;
&lt;br /&gt;
Read the Call for Trainings in: [https://www.owasp.org/index.php/AppSecLatam2011/CFT https://www.owasp.org/index.php/AppSecLatam2011/CFT] &lt;br /&gt;
&lt;br /&gt;
We are doing a research about subjects of the trainings. You can help us, answering the questions in the follow address: &lt;br /&gt;
&lt;br /&gt;
[http://www.surveymonkey.com/s/3RCZ9RR http://www.surveymonkey.com/s/3RCZ9RR] &lt;br /&gt;
&lt;br /&gt;
== CFP  ==&lt;br /&gt;
&lt;br /&gt;
Read the Call for Presentations in: [https://www.owasp.org/index.php/AppSecLatam2011/CFP https://www.owasp.org/index.php/AppSecLatam2011/CFP] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Program Committee  ==&lt;br /&gt;
&lt;br /&gt;
*Kuai Hinojosa &lt;br /&gt;
*Leandro Gomes &lt;br /&gt;
*Leonardo Buonsanti &lt;br /&gt;
*Leonardo Lemes &lt;br /&gt;
*Luiz Eduardo &lt;br /&gt;
*Luiz Otávio Duarte &lt;br /&gt;
*Mateo Martinez &lt;br /&gt;
*Rodrigo Rubira&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
== '''Keynotes'''  ==&lt;br /&gt;
&lt;br /&gt;
== Bryan Sullivan  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/36/Bryan-sullivan.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/bryanjsullivan Bryan Sullivan ] is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect. &lt;br /&gt;
Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on a diverse range of topics including NoSQL, RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011). [http://www.linkedin.com/in/bryanjsullivan Linkedin] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Guest Speakers'''  ==&lt;br /&gt;
&lt;br /&gt;
== Chris Evans  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/4/48/ChrisEvans1.png &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/scarybeast Chris Evans] - Troublemaker, Google Inc. Chris Evan is known for various work in the security community. Most notably, he is the author of vsftpd and a vulnerability researcher. Details of vsftpd are at http://vsftpd.beasts.org/. His work includes vulnerabilities in all the major browsers (Firefox, Safari, Internet Explorer, Opera, Chrome); the Linux and OpenBSD kernels; Sun's JDK; and lots of open source packages. He blogs about some of his work at [http://scarybeastsecurity.blogspot.com http://scarybeastsecurity.blogspot.com]. At Google, Chris currently leads security for Google Chrome. He has presented at various conferences (PacSec, HiTB Dubai, HiTB Malaysia, BlackHat Europe, HiTB Amsterdam, OWASP, etc.) and is on the HiTB and WOOT paper selection panels. [http://www.linkedin.com/in/scarybeast Linkedin]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Michael Craigue  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/0/0c/MichaelCraigue.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/craigue Michael Craigue] (CISSP/CSSLP) is Director of the Security Consulting group at Dell, with 14 team members in Brazil, India, Malaysia, and the US. He and his team have responsibility for consulting with all of Dell’s internal organizations, including IT, Product Group, Services, and Mergers and Acquisitions, with a particular focus on the Secure Software Development Lifecycle. He has taught Database Management and Business Intelligence / Knowledge Management at St. Edward’s University in their MBA / MS CIS programs. Prior to joining Dell’s information security team, he spent a decade building Web and database applications. He has a PhD from the University of Texas at Austin in Higher Education Administration / Finance. [http://www.linkedin.com/in/craigue Linkedin]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== October 4th-5th (Training)  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== October 6th  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== October 7th  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
=== Registration Fees  ===&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== Practical Info  ====&lt;br /&gt;
&lt;br /&gt;
== Visitors' Guide  ==&lt;br /&gt;
&lt;br /&gt;
Gate for tourists in the state of Rio Grande do Sul in Brazil, and only 120 miles from the pleasant Serra Gaucha, Porto Alegre is a bustling hub of services and infrastructure with quality recognized, and a base of large national and international companies and a major destination for international events in Brazil. &lt;br /&gt;
&lt;br /&gt;
Usefull links: &lt;br /&gt;
&lt;br /&gt;
[http://www2.portoalegre.rs.gov.br/turismo http://www2.portoalegre.rs.gov.br/turismo] &lt;br /&gt;
&lt;br /&gt;
[https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; 60 Minutes recent report about Brazil and his development potencial: &amp;lt;br&amp;gt; {{#ev:youtube|DMM7OJ_Kj9I}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Tourist video about Porto Alegre City:&amp;lt;br&amp;gt; {{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
== Eletric Outlet  ==&lt;br /&gt;
&lt;br /&gt;
[http://omegatek.blogspot.com/2010/05/novo-padrao-de-tomadas-brasileiras.html https://www.owasp.org/images/0/0f/Tomadas_diversas.jpg] &amp;lt;br&amp;gt;&lt;br /&gt;
Reference: [http://omegatek.blogspot.com/2010/05/novo-padrao-de-tomadas-brasileiras.html http://omegatek.blogspot.com/2010/05/novo-padrao-de-tomadas-brasileiras.html]&lt;br /&gt;
&lt;br /&gt;
== Wheather  ==&lt;br /&gt;
&lt;br /&gt;
== Trip  ==&lt;br /&gt;
&lt;br /&gt;
== Acommodation  ==&lt;br /&gt;
&lt;br /&gt;
'''NOVOTEL PORTO ALEGRE'''&amp;lt;br&amp;gt;&lt;br /&gt;
Av. Soledade, 575&amp;lt;br&amp;gt;&lt;br /&gt;
Três Figueiras&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: (51) 3327-9292&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Single / Double&amp;lt;br&amp;gt;&lt;br /&gt;
R$243,00 / R$289,00&amp;lt;br&amp;gt;&lt;br /&gt;
Cortesy breakfast&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
General Conditions&amp;lt;br&amp;gt;&lt;br /&gt;
. Diárias expressas em reais (R$), por dia e por apartamento; . Diárias iniciam e terminam às 12 horas; . Taxa de Turismo (opcional) - R$2,50 por dia/apartamento; . Imposto Municipal: acrescer 5% ISS; . O acesso à internet nas áreas sociais e nos apartamentos é cortesia; . Estacionamento: R$16,00 por carro ao dia (com manobrista); . Terceira pessoa no apartamento: Mediante disponibilidade. Cobrada taxa diária de R$47,00 + 5% ISS e será acomodada em cama extra ou sofá cama; . Forma de Pagamento: Depósito antecipado ou pagamento direto; . Garantia de No Show: Todas as reservas deverão ter garantia de no show. Em caso de não comparecimento, poderá ser cobrado o período integral reservado; . Não aceitamos cheques; . Duas crianças de até 16 anos no Novotel e uma criança de até 12 anos no Mercure acompanhadas dos pais/responsáveis no mesmo apartamento serão cortesia.&lt;br /&gt;
Necessária apresentação de documentação de identificação no check-in; . Valores pagos não serão reembolsáveis ou dados como créditos para próximas hospedagens;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Map link:&amp;lt;br&amp;gt;&lt;br /&gt;
http://maps.google.com.br/maps?hl=pt-BR&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;q=novotel+porto+alegre&amp;amp;fb=1&amp;amp;gl=br&amp;amp;hq=novotel&amp;amp;hnear=0x9519784e88e1007d:0xc7011777424f60bd,Porto+Alegre+-+RS&amp;amp;cid=0,0,11722004907679800889&amp;amp;ei=GKn4TfaHDIP20gGF9pXDCw&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=image&amp;amp;resnum=1&amp;amp;ved=0CDAQnwIwAA&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/3/33/Novohotel.jpg&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Social Events  ====&lt;br /&gt;
&lt;br /&gt;
Information will be published here. &lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We are looking for sponsors for 2011 edition of Global AppSec Latin America. See more details about sponsor opportunities. &lt;br /&gt;
&lt;br /&gt;
If you are interested to sponsor Global AppSec Latin America 2011, please contact the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt; [http://www.owasp.org/images/4/4f/OWASP_AppSec_2011_Sponsorship_English.pdf OWASP AppSec 2011 Sponsorship English.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Diamond Sponsors ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:elipse_logo3.png|link=http://www.elipse.com.br]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Gold Sponsors ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:IT2S.png|link=http://www.it2s.com.br]] &lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Silver Sponsors ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Adobe_logo5.png|link=http://www.adobe.com]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Local Promotion ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Logo-PoaSec2.png|link=http://www.poasec.org]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
[mailto:abc@elipse.com.br Alexandre Balestrin Correa]&amp;lt;br&amp;gt; &lt;br /&gt;
[http://cassiogoldschmidt.com/ Cassio Goldschmidt]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Jeronimo_Zucco Jerônimo Zucco ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Gustavo_Barbato L. Gustavo C. Barbato ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Sapao Lucas C. Ferreira ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Rafael_Dreher Rafael Dreher ]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecLatam2011&amp;diff=113419</id>
		<title>AppSecLatam2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecLatam2011&amp;diff=113419"/>
				<updated>2011-07-05T21:57:09Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Bruce Schneier */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:AppSec Brasil 11 medio.png]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; '''Language:&amp;lt;br&amp;gt;[http://www.owasp.org/index.php?title=AppSecLatam2011 http://www.owasp.org/images/8/88/Bandeira_reino_unido.png]	&lt;br /&gt;
[http://www.owasp.org/index.php?title=AppSecLatam2011_(pt-br) http://www.owasp.org/images/4/49/Bandeira_brasil.png] [http://www.owasp.org/index.php?title=AppSecLatam2011_(es) http://www.owasp.org/images/1/1c/Bandeira_espanha.png]  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/1/19/AppSecLatam_2011_Announcement.pdf Press Release] &lt;br /&gt;
*[[AppSecLA2011/Media Mentions|Media Mentions]] &lt;br /&gt;
*[[AppSecLA2011/Archived|Archived]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Follow us:&amp;lt;br&amp;gt;[http://www.twitter.com/AppSecLatam http://www.owasp.org/images/f/f7/Twitter.png]	&lt;br /&gt;
[http://www.facebook.com/event.php?eid=155195651207509 http://www.owasp.org/images/5/55/Facebook.png] [http://events.linkedin.com/OWASP-Global-AppSec-Latin-America-2011/pub/607738 http://www.owasp.org/images/1/1a/Linkedin.png]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
We are pleased to announce that the [http://www.owasp.org/index.php/Porto_Alegre OWASP Porto Alegre Local Chapter] will organize the '''Global AppSec Latin America 2011 Conference''' in Porto Alegre-RS, Brazil. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The Global AppSec Latin America 2011 Conference will be a reunion of Information Security latin american leaders, and will present cutting-edge ideas. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 200-250 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many other verticals.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A OWASP Global AppSec Latin América 2011 will be happens in Brazil at Porto Alegre city, Rio Grande do Sul state [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=pt-BR&amp;amp;geocode=&amp;amp;q=Porto+Alegre&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=Porto+Alegre+-+Rio+Grande+do+Sul,+Brasil&amp;amp;z=11 map] in October 4th to 7th 2011. The trainings will be in October 04 and 05, and the presentations will be in October 06 and 07.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; If you have any questions, please email the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who Should Attend Global AppSec Latin América 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
[[Image:Owasp-poa-eng.png]] &lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23AppSecLatam #AppSecLatam]''' hashtag for your tweets for Global AppSec Latin America 2011 (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSecLatAm Twitter Feed ([http://twitter.com/AppSecLatam Follow us on Twitter!])''' &amp;lt;twitter&amp;gt;262394051&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFT &amp;amp;amp; CFP  ====&lt;br /&gt;
&lt;br /&gt;
== CFT  ==&lt;br /&gt;
&lt;br /&gt;
Read the Call for Trainings in: [https://www.owasp.org/index.php/AppSecLatam2011/CFT https://www.owasp.org/index.php/AppSecLatam2011/CFT] &lt;br /&gt;
&lt;br /&gt;
We are doing a research about subjects of the trainings. You can help us, answering the questions in the follow address: &lt;br /&gt;
&lt;br /&gt;
[http://www.surveymonkey.com/s/3RCZ9RR http://www.surveymonkey.com/s/3RCZ9RR] &lt;br /&gt;
&lt;br /&gt;
== CFP  ==&lt;br /&gt;
&lt;br /&gt;
Read the Call for Presentations in: [https://www.owasp.org/index.php/AppSecLatam2011/CFP https://www.owasp.org/index.php/AppSecLatam2011/CFP] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Program Committee  ==&lt;br /&gt;
&lt;br /&gt;
*Kuai Hinojosa &lt;br /&gt;
*Leandro Gomes &lt;br /&gt;
*Leonardo Buonsanti &lt;br /&gt;
*Leonardo Lemes &lt;br /&gt;
*Luiz Eduardo &lt;br /&gt;
*Luiz Otávio Duarte &lt;br /&gt;
*Mateo Martinez &lt;br /&gt;
*Rodrigo Rubira&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
== '''Keynotes'''  ==&lt;br /&gt;
&lt;br /&gt;
== Bryan Sullivan  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/36/Bryan-sullivan.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/bryanjsullivan Bryan Sullivan ] is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect. &lt;br /&gt;
Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on a diverse range of topics including NoSQL, RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011). [http://www.linkedin.com/in/bryanjsullivan Linkedin] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Guest Speakers'''  ==&lt;br /&gt;
&lt;br /&gt;
== Chris Evans  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/4/48/ChrisEvans1.png &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/scarybeast Chris Evans] - Troublemaker, Google Inc. Chris Evan is known for various work in the security community. Most notably, he is the author of vsftpd and a vulnerability researcher. Details of vsftpd are at http://vsftpd.beasts.org/. His work includes vulnerabilities in all the major browsers (Firefox, Safari, Internet Explorer, Opera, Chrome); the Linux and OpenBSD kernels; Sun's JDK; and lots of open source packages. He blogs about some of his work at [http://scarybeastsecurity.blogspot.com http://scarybeastsecurity.blogspot.com]. At Google, Chris currently leads security for Google Chrome. He has presented at various conferences (PacSec, HiTB Dubai, HiTB Malaysia, BlackHat Europe, HiTB Amsterdam, OWASP, etc.) and is on the HiTB and WOOT paper selection panels. [http://www.linkedin.com/in/scarybeast Linkedin]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Michael Craigue  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/0/0c/MichaelCraigue.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/craigue Michael Craigue] (CISSP/CSSLP) is Director of the Security Consulting group at Dell, with 14 team members in Brazil, India, Malaysia, and the US. He and his team have responsibility for consulting with all of Dell’s internal organizations, including IT, Product Group, Services, and Mergers and Acquisitions, with a particular focus on the Secure Software Development Lifecycle. He has taught Database Management and Business Intelligence / Knowledge Management at St. Edward’s University in their MBA / MS CIS programs. Prior to joining Dell’s information security team, he spent a decade building Web and database applications. He has a PhD from the University of Texas at Austin in Higher Education Administration / Finance. [http://www.linkedin.com/in/craigue Linkedin]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== October 4th-5th (Training)  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== October 6th  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== October 7th  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
=== Registration Fees  ===&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== Practical Info  ====&lt;br /&gt;
&lt;br /&gt;
== Visitors' Guide  ==&lt;br /&gt;
&lt;br /&gt;
Gate for tourists in the state of Rio Grande do Sul in Brazil, and only 120 miles from the pleasant Serra Gaucha, Porto Alegre is a bustling hub of services and infrastructure with quality recognized, and a base of large national and international companies and a major destination for international events in Brazil. &lt;br /&gt;
&lt;br /&gt;
Usefull links: &lt;br /&gt;
&lt;br /&gt;
[http://www2.portoalegre.rs.gov.br/turismo http://www2.portoalegre.rs.gov.br/turismo] &lt;br /&gt;
&lt;br /&gt;
[https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; 60 Minutes recent report about Brazil and his development potencial: &amp;lt;br&amp;gt; {{#ev:youtube|DMM7OJ_Kj9I}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Tourist video about Porto Alegre City:&amp;lt;br&amp;gt; {{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
== Eletric Outlet  ==&lt;br /&gt;
&lt;br /&gt;
[http://omegatek.blogspot.com/2010/05/novo-padrao-de-tomadas-brasileiras.html https://www.owasp.org/images/0/0f/Tomadas_diversas.jpg] &amp;lt;br&amp;gt;&lt;br /&gt;
Reference: [http://omegatek.blogspot.com/2010/05/novo-padrao-de-tomadas-brasileiras.html http://omegatek.blogspot.com/2010/05/novo-padrao-de-tomadas-brasileiras.html]&lt;br /&gt;
&lt;br /&gt;
== Wheather  ==&lt;br /&gt;
&lt;br /&gt;
== Trip  ==&lt;br /&gt;
&lt;br /&gt;
== Acommodation  ==&lt;br /&gt;
&lt;br /&gt;
'''NOVOTEL PORTO ALEGRE'''&amp;lt;br&amp;gt;&lt;br /&gt;
Av. Soledade, 575&amp;lt;br&amp;gt;&lt;br /&gt;
Três Figueiras&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: (51) 3327-9292&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Single / Double&amp;lt;br&amp;gt;&lt;br /&gt;
R$243,00 / R$289,00&amp;lt;br&amp;gt;&lt;br /&gt;
Cortesy breakfast&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
General Conditions&amp;lt;br&amp;gt;&lt;br /&gt;
. Diárias expressas em reais (R$), por dia e por apartamento; . Diárias iniciam e terminam às 12 horas; . Taxa de Turismo (opcional) - R$2,50 por dia/apartamento; . Imposto Municipal: acrescer 5% ISS; . O acesso à internet nas áreas sociais e nos apartamentos é cortesia; . Estacionamento: R$16,00 por carro ao dia (com manobrista); . Terceira pessoa no apartamento: Mediante disponibilidade. Cobrada taxa diária de R$47,00 + 5% ISS e será acomodada em cama extra ou sofá cama; . Forma de Pagamento: Depósito antecipado ou pagamento direto; . Garantia de No Show: Todas as reservas deverão ter garantia de no show. Em caso de não comparecimento, poderá ser cobrado o período integral reservado; . Não aceitamos cheques; . Duas crianças de até 16 anos no Novotel e uma criança de até 12 anos no Mercure acompanhadas dos pais/responsáveis no mesmo apartamento serão cortesia.&lt;br /&gt;
Necessária apresentação de documentação de identificação no check-in; . Valores pagos não serão reembolsáveis ou dados como créditos para próximas hospedagens;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Map link:&amp;lt;br&amp;gt;&lt;br /&gt;
http://maps.google.com.br/maps?hl=pt-BR&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;q=novotel+porto+alegre&amp;amp;fb=1&amp;amp;gl=br&amp;amp;hq=novotel&amp;amp;hnear=0x9519784e88e1007d:0xc7011777424f60bd,Porto+Alegre+-+RS&amp;amp;cid=0,0,11722004907679800889&amp;amp;ei=GKn4TfaHDIP20gGF9pXDCw&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=image&amp;amp;resnum=1&amp;amp;ved=0CDAQnwIwAA&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/3/33/Novohotel.jpg&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Social Events  ====&lt;br /&gt;
&lt;br /&gt;
Information will be published here. &lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We are looking for sponsors for 2011 edition of Global AppSec Latin America. See more details about sponsor opportunities. &lt;br /&gt;
&lt;br /&gt;
If you are interested to sponsor Global AppSec Latin America 2011, please contact the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt; [http://www.owasp.org/images/4/4f/OWASP_AppSec_2011_Sponsorship_English.pdf OWASP AppSec 2011 Sponsorship English.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Diamond Sponsors ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:elipse_logo3.png|link=http://www.elipse.com.br]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Gold Sponsors ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:IT2S.png|link=http://www.it2s.com.br]] &lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Silver Sponsors ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Adobe_logo5.png|link=http://www.adobe.com]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Local Promotion ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Logo-PoaSec2.png|link=http://www.poasec.org]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
[mailto:abc@elipse.com.br Alexandre Balestrin Correa]&amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/index.php/User:Cassio_Goldschmidt Cassio Goldschmidt]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Jeronimo_Zucco Jerônimo Zucco ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Gustavo_Barbato L. Gustavo C. Barbato ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Sapao Lucas C. Ferreira ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Rafael_Dreher Rafael Dreher ]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecLatam2011_(es)&amp;diff=110976</id>
		<title>AppSecLatam2011 (es)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecLatam2011_(es)&amp;diff=110976"/>
				<updated>2011-05-23T18:03:25Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:AppSec Brasil 11 medio.png]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; '''Language:&amp;lt;br&amp;gt;[http://www.owasp.org/index.php?title=AppSecLatam2011 http://www.owasp.org/images/8/88/Bandeira_reino_unido.png]	&lt;br /&gt;
[http://www.owasp.org/index.php?title=AppSecLatam2011_(pt-br) http://www.owasp.org/images/4/49/Bandeira_brasil.png] [http://www.owasp.org/index.php?title=AppSecLatam2011_(es) http://www.owasp.org/images/1/1c/Bandeira_espanha.png]  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/1/19/AppSecLatam_2011_Announcement.pdf Press Release] &lt;br /&gt;
*[[AppSecLA2011/Media Mentions|Media Mentions]] &lt;br /&gt;
*[[AppSecLA2011/Archived|Archived]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Follow us:&amp;lt;br&amp;gt;[http://www.twitter.com/AppSecLatam http://www.owasp.org/images/f/f7/Twitter.png]	&lt;br /&gt;
[http://www.facebook.com/event.php?eid=155195651207509 http://www.owasp.org/images/5/55/Facebook.png] [http://events.linkedin.com/OWASP-Global-AppSec-Latin-America-2011/pub/607738 http://www.owasp.org/images/1/1a/Linkedin.png]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
We are pleased to announce that the [http://www.owasp.org/index.php/Porto_Alegre OWASP Porto Alegre Local Chapter] will organize the '''Global AppSec Latin America 2011 Conference''' in Porto Alegre-RS, Brazil. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The Global AppSec Latin America 2011 Conference will be a reunion of Information Security latin american leaders, and will present cutting-edge ideas. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 200-250 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many other verticals.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A OWASP Global AppSec Latin América 2011 will be happens in Brazil at Porto Alegre city, Rio Grande do Sul state [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=pt-BR&amp;amp;geocode=&amp;amp;q=Porto+Alegre&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=Porto+Alegre+-+Rio+Grande+do+Sul,+Brasil&amp;amp;z=11 map] in October 4th to 7th 2011. The trainings will be in October 04 and 05, and the presentations will be in October 06 and 07.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; If you have any questions, please email the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who Should Attend Global AppSec Latin América 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
[[Image:Owasp-poa-eng.png]] &lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23AppSecLatam #AppSecLatam]''' hashtag for your tweets for Global AppSec Latin America 2011 (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSecLatAm Twitter Feed ([http://twitter.com/AppSecLatam Follow us on Twitter!])''' &amp;lt;twitter&amp;gt;262394051&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFT &amp;amp;amp; CFP  ====&lt;br /&gt;
&lt;br /&gt;
== CFT  ==&lt;br /&gt;
&lt;br /&gt;
Read the Call for Trainings in: [https://www.owasp.org/index.php/AppSecLatam2011/CFT https://www.owasp.org/index.php/AppSecLatam2011/CFT] &lt;br /&gt;
&lt;br /&gt;
We are doing a research about subjects of the trainings. You can help us, answering the questions in the follow address: &lt;br /&gt;
&lt;br /&gt;
[http://www.surveymonkey.com/s/3RCZ9RR http://www.surveymonkey.com/s/3RCZ9RR] &lt;br /&gt;
&lt;br /&gt;
== CFP  ==&lt;br /&gt;
&lt;br /&gt;
Read the Call for Presentations in: [https://www.owasp.org/index.php/AppSecLatam2011/CFP https://www.owasp.org/index.php/AppSecLatam2011/CFP] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Program Committee  ==&lt;br /&gt;
&lt;br /&gt;
*Kuai Hinojosa &lt;br /&gt;
*Leandro Gomes &lt;br /&gt;
*Leonardo Buonsanti &lt;br /&gt;
*Leonardo Lemes &lt;br /&gt;
*Luiz Eduardo &lt;br /&gt;
*Luiz Otávio Duarte &lt;br /&gt;
*Mateo Martinez &lt;br /&gt;
*Rodrigo Rubira&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
== '''Keynotes'''  ==&lt;br /&gt;
&lt;br /&gt;
== Bruce Schneier  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/3f/Bruce2.png &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.schneier.com Bruce Schneier] is an internationally renowned security technologist, referred to by The Economist as a &amp;quot;security guru.&amp;quot; He is the author of eleven books -- including the best sellers Beyond Fear, Secrets and Lies, and Applied Cryptography – as well as hundreds of articles and essays, and many more academic papers. His influential newsletter &amp;quot;Crypto-Gram,&amp;quot; and his blog &amp;quot;Schneier on Security,&amp;quot; are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, served on several government technical committees, and is regularly quoted in the press. Schneier is the Chief Security Technology Officer of BT.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Bryan Sullivan  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/36/Bryan-sullivan.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/bryanjsullivan Bryan Sullivan ] is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect. &lt;br /&gt;
Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on a diverse range of topics including NoSQL, RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011). [http://www.linkedin.com/in/bryanjsullivan Linkedin] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Guest Speakers'''  ==&lt;br /&gt;
&lt;br /&gt;
== Michael Craigue  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/0/0c/MichaelCraigue.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/craigue Michael Craigue] (CISSP/CSSLP) is Director of the Security Consulting group at Dell, with 14 team members in Brazil, India, Malaysia, and the US. He and his team have responsibility for consulting with all of Dell’s internal organizations, including IT, Product Group, Services, and Mergers and Acquisitions, with a particular focus on the Secure Software Development Lifecycle. He has taught Database Management and Business Intelligence / Knowledge Management at St. Edward’s University in their MBA / MS CIS programs. Prior to joining Dell’s information security team, he spent a decade building Web and database applications. He has a PhD from the University of Texas at Austin in Higher Education Administration / Finance. [http://www.linkedin.com/in/craigue Linkedin]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== October 4th-5th (Training)  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== October 6th  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== October 7th  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
=== Registration Fees  ===&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== Practical Info  ====&lt;br /&gt;
&lt;br /&gt;
== Visitors' Guide  ==&lt;br /&gt;
&lt;br /&gt;
Gate for tourists in the state of Rio Grande do Sul in Brazil, and only 120 miles from the pleasant Serra Gaucha, Porto Alegre is a bustling hub of services and infrastructure with quality recognized, and a base of large national and international companies and a major destination for international events in Brazil. &lt;br /&gt;
&lt;br /&gt;
Usefull links: &lt;br /&gt;
&lt;br /&gt;
[http://www2.portoalegre.rs.gov.br/turismo http://www2.portoalegre.rs.gov.br/turismo] &lt;br /&gt;
&lt;br /&gt;
[https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; 60 Minutes recent report about Brazil and his development potencial: &amp;lt;br&amp;gt; {{#ev:youtube|DMM7OJ_Kj9I}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Tourist video about Porto Alegre City:&amp;lt;br&amp;gt; {{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
== Eletric Outlet  ==&lt;br /&gt;
&lt;br /&gt;
== Wheather  ==&lt;br /&gt;
&lt;br /&gt;
== Trip  ==&lt;br /&gt;
&lt;br /&gt;
== Acommodation  ==&lt;br /&gt;
&lt;br /&gt;
==== Social Events  ====&lt;br /&gt;
&lt;br /&gt;
Information will be published here. &lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We are looking for sponsors for 2011 edition of Global AppSec Latin America. See more details about sponsor opportunities. &lt;br /&gt;
&lt;br /&gt;
If you are interested to sponsor Global AppSec Latin America 2011, please contact the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt; [http://www.owasp.org/images/4/4f/OWASP_AppSec_2011_Sponsorship_English.pdf OWASP AppSec 2011 Sponsorship English.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local Promotion ==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Logo-PoaSec.png|link=http://www.poasec.org]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
[mailto:abc@elipse.com.br Alexandre Balestrin Correa]&amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/index.php/User:Cassio_Goldschmidt Cassio Goldschmidt]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Jeronimo_Zucco Jerônimo Zucco ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Gustavo_Barbato L. Gustavo C. Barbato ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Sapao Lucas C. Ferreira ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Rafael_Dreher Rafael Dreher ]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecLatam2011_(pt-br)&amp;diff=110975</id>
		<title>AppSecLatam2011 (pt-br)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecLatam2011_(pt-br)&amp;diff=110975"/>
				<updated>2011-05-23T18:02:52Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; width=&amp;quot;700&amp;quot; | &lt;br /&gt;
! align=&amp;quot;center&amp;quot; width=&amp;quot;500&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:AppSec Brasil 11 medio.png]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; '''Língua:&amp;lt;br&amp;gt;[http://www.owasp.org/index.php?title=AppSecLatam2011 http://www.owasp.org/images/8/88/Bandeira_reino_unido.png]	&lt;br /&gt;
[http://www.owasp.org/index.php?title=AppSecLatam2011_(pt-br) http://www.owasp.org/images/4/49/Bandeira_brasil.png] [http://www.owasp.org/index.php?title=AppSecLatam2011_(es) http://www.owasp.org/images/1/1c/Bandeira_espanha.png]  | &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/1/19/AppSecLatam_2011_Announcement.pdf Comunicado de Imprensa] &lt;br /&gt;
*[[AppSecLatam2011/Media Mentions|Menções na mídia]] &lt;br /&gt;
*[[AppSecLatam2011/Archived|Arquivos]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Siga-nos:&amp;lt;br&amp;gt;[http://www.twitter.com/AppSecLatam http://www.owasp.org/images/f/f7/Twitter.png]	&lt;br /&gt;
[http://www.facebook.com/event.php?eid=155195651207509 http://www.owasp.org/images/5/55/Facebook.png] [http://events.linkedin.com/OWASP-Global-AppSec-Latin-America-2011/pub/607738 http://www.owasp.org/images/1/1a/Linkedin.png] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Apresentação  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
Temos o prazer de anunciar que o [http://www.owasp.org/index.php/Porto_Alegre Capítulo OWASP de Porto Alegre] irá organizar a '''Conferência Global AppSec Latin America 2011''' em Porto Alegre-RS, Brasil. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A conferência Global AppSec Latin América 2011 será uma reunião de líderes latino-americanos na área de Segurança da Informação, e irá apresentar temas e idéias de vanguarda sobre o assunto. Eventos OWASP atraem público do mundo todo interessados nas tendências da área. A conferência espera atrair 200 a 250 tecnólogos do governo, serviços financeiros, mídia, indústria farmacêutica, saúde, tecnologia, e muitas outras áreas. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A OWASP Global AppSec Latin América 2011 irá acontecer no Brasil na cidade de Porto Alegre, estado do Rio Grande do Sul ([http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=pt-BR&amp;amp;geocode=&amp;amp;q=Porto+Alegre&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=Porto+Alegre+-+Rio+Grande+do+Sul,+Brasil&amp;amp;z=11 mapa]) nos dias 04 à 07 de outubro de 2011. Ocorrerão cursos no dias 4 e 5 de outubro, e as sessões plenárias nos dias 6 e 7 de outubro. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Se você tiver algum questionamento, por favor entre em contato com a organização do evento através do e-mail: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org].&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; '''Quem deve atender a Global AppSec Latin América 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Desenvolvedores de Aplicativos &lt;br /&gt;
*Testadores de Aplicativos e de Qualidade &lt;br /&gt;
*Gerentes de Projetos de Aplicativos e Funcionários &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputados, Associados and Membros &lt;br /&gt;
*Chief Financial Officers, Auditores, e Pessoas Responsáveis pela Segurança de TI e Compliance &lt;br /&gt;
*Gerentes de Segurança e Pessoal &lt;br /&gt;
*Executivos, Gerentes e Pessoas Responsáveis pela Governança de TI &lt;br /&gt;
*Profissionais de TI Interessados em Aprofundar seus Conhecimentos em Segurança&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
[[Image:Owasp-poa-eng.png]] &lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use o '''[http://search.twitter.com/search?q=%23AppSecLatam #AppSecLatam]''' hashtag para seus tweets para a Global AppSec Latin America 2011 (O que é [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSecLatAm Twitter Feed ([http://twitter.com/AppSecLatam Siga-nos no Twitter!])''' &amp;lt;twitter&amp;gt;262394051&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFT e CFP  ====&lt;br /&gt;
&lt;br /&gt;
== CFT  ==&lt;br /&gt;
Leia a chamada de mini-cursos completa em [https://www.owasp.org/index.php/AppSecLatam2011_(pt-br)/CFT https://www.owasp.org/index.php/AppSecLatam2011_(pt-br)/CFT].&lt;br /&gt;
&lt;br /&gt;
Estamos realizando uma pesquisa sobre os temas para treinamentos. Você pode ajudar, respondendo a pesquisa no seguinte endereço:&lt;br /&gt;
&lt;br /&gt;
[http://www.surveymonkey.com/s/3RCZ9RR http://www.surveymonkey.com/s/3RCZ9RR]&lt;br /&gt;
&lt;br /&gt;
== CFP  ==&lt;br /&gt;
&lt;br /&gt;
Leia a chamada de trabalhos para apresentações completa em [https://www.owasp.org/index.php/AppSecLatam2011_(pt-br)/CFP https://www.owasp.org/index.php/AppSecLatam2011_(pt-br)/CFP].&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Comitê de Programa  ==&lt;br /&gt;
&lt;br /&gt;
* Kuai Hinojosa&lt;br /&gt;
* Leandro Gomes&lt;br /&gt;
* Leonardo Buonsanti&lt;br /&gt;
* Leonardo Lemes&lt;br /&gt;
* Luiz Eduardo&lt;br /&gt;
* Luiz Otávio Duarte&lt;br /&gt;
* Mateo Martinez&lt;br /&gt;
* Rodrigo Rubira&lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
== '''Keynotes'''  ==&lt;br /&gt;
&lt;br /&gt;
== Bruce Schneier  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/3f/Bruce2.png &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.schneier.com Bruce Schneier] is an internationally renowned security technologist, referred to by The Economist as a &amp;quot;security guru.&amp;quot; He is the author of eleven books -- including the best sellers Beyond Fear, Secrets and Lies, and Applied Cryptography – as well as hundreds of articles and essays, and many more academic papers. His influential newsletter &amp;quot;Crypto-Gram,&amp;quot; and his blog &amp;quot;Schneier on Security,&amp;quot; are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, served on several government technical committees, and is regularly quoted in the press. Schneier is the Chief Security Technology Officer of BT.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Bryan Sullivan  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/36/Bryan-sullivan.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/bryanjsullivan Bryan Sullivan ] is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect. &lt;br /&gt;
Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on a diverse range of topics including NoSQL, RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011). [http://www.linkedin.com/in/bryanjsullivan Linkedin] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Guest Speakers'''  ==&lt;br /&gt;
&lt;br /&gt;
== Michael Craigue  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/0/0c/MichaelCraigue.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/craigue Michael Craigue] (CISSP/CSSLP) is Director of the Security Consulting group at Dell, with 14 team members in Brazil, India, Malaysia, and the US. He and his team have responsibility for consulting with all of Dell’s internal organizations, including IT, Product Group, Services, and Mergers and Acquisitions, with a particular focus on the Secure Software Development Lifecycle. He has taught Database Management and Business Intelligence / Knowledge Management at St. Edward’s University in their MBA / MS CIS programs. Prior to joining Dell’s information security team, he spent a decade building Web and database applications. He has a PhD from the University of Texas at Austin in Higher Education Administration / Finance. [http://www.linkedin.com/in/craigue Linkedin]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== 04 à 05 de Outubro (Treinamentos)  ====&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
Será divulgada em breve. &lt;br /&gt;
&lt;br /&gt;
==== 06 de Outubro  ====&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
Será divulgada em breve. &lt;br /&gt;
&lt;br /&gt;
==== 07 de Outubro  ====&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
Será divulgada em breve. &lt;br /&gt;
&lt;br /&gt;
==== Inscrições  ====&lt;br /&gt;
&lt;br /&gt;
Será divulgada em breve. &lt;br /&gt;
&lt;br /&gt;
=== Preços ===&lt;br /&gt;
&lt;br /&gt;
Serão divulgados em breve. &lt;br /&gt;
&lt;br /&gt;
==== Informações  ====&lt;br /&gt;
&lt;br /&gt;
== Guia Turístico  ==&lt;br /&gt;
&lt;br /&gt;
Portão de entrada de turistas no Estado e a apenas 120 quilômetros da aprazível Serra Gaúcha, Porto Alegre é um movimentado pólo de serviços e de infraestrutura de qualidade reconhecidas, base de grandes empresas nacionais e internacionais e um dos principais destinos de eventos internacionais no Brasil. &lt;br /&gt;
&lt;br /&gt;
Links úteis: [http://www2.portoalegre.rs.gov.br/turismo http://www2.portoalegre.rs.gov.br/turismo] &lt;br /&gt;
&lt;br /&gt;
[https://secure.wikimedia.org/wikipedia/pt/wiki/Porto_Alegre https://secure.wikimedia.org/wikipedia/pt/wiki/Porto_Alegre] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Recente reportagem do programa americano 60 Minutes sobre o potencial de crescimento do Brasil: &amp;lt;br&amp;gt; &lt;br /&gt;
{{#ev:youtube|DMM7OJ_Kj9I}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Vídeo turístico sobre Porto Alegre:&amp;lt;br&amp;gt;&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
== Tomadas Elétricas  ==&lt;br /&gt;
&lt;br /&gt;
== Previsão do Tempo  ==&lt;br /&gt;
&lt;br /&gt;
== Viagem  ==&lt;br /&gt;
&lt;br /&gt;
== Acomodações  ==&lt;br /&gt;
&lt;br /&gt;
==== Eventos Sociais  ====&lt;br /&gt;
&lt;br /&gt;
Serão divulgados em breve. &lt;br /&gt;
&lt;br /&gt;
==== Patrocínios  ====&lt;br /&gt;
&lt;br /&gt;
Estamos atualmente buscado patrocinadores para a edição 2011 da Global AppSec Latin América. Veja mais detalhes sobre as oportunidades de patrocínio. &lt;br /&gt;
&lt;br /&gt;
Se estiver interessado em patrocinar o Global AppSec Latin América 2011, por favor entre em contato com a equipe organizadora da conferência pelo email [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]. &lt;br /&gt;
&lt;br /&gt;
Para mais detalhes sobre diferentes oportunidades de patrocínio, por favor verifique o documento abaixo:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/c/cf/OWASP_AppSec_2011_Sponsorship_Portuguese.pdf OWASP AppSec 2011 Sponsorship Portuguese.pdf]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Organização Local ==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Logo-PoaSec.png|link=http://www.poasec.org]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==== Organizadores  ====&lt;br /&gt;
&lt;br /&gt;
[mailto:abc@elipse.com.br Alexandre Balestrin Correa]&amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/index.php/User:Cassio_Goldschmidt Cassio Goldschmidt]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Jeronimo_Zucco Jerônimo Zucco ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Gustavo_Barbato L. Gustavo C. Barbato ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Sapao Lucas C. Ferreira ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Rafael_Dreher Rafael Dreher ]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecLatam2011&amp;diff=110974</id>
		<title>AppSecLatam2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecLatam2011&amp;diff=110974"/>
				<updated>2011-05-23T18:00:48Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:AppSec Brasil 11 medio.png]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; '''Language:&amp;lt;br&amp;gt;[http://www.owasp.org/index.php?title=AppSecLatam2011 http://www.owasp.org/images/8/88/Bandeira_reino_unido.png]	&lt;br /&gt;
[http://www.owasp.org/index.php?title=AppSecLatam2011_(pt-br) http://www.owasp.org/images/4/49/Bandeira_brasil.png] [http://www.owasp.org/index.php?title=AppSecLatam2011_(es) http://www.owasp.org/images/1/1c/Bandeira_espanha.png]  &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/1/19/AppSecLatam_2011_Announcement.pdf Press Release] &lt;br /&gt;
*[[AppSecLA2011/Media Mentions|Media Mentions]] &lt;br /&gt;
*[[AppSecLA2011/Archived|Archived]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Follow us:&amp;lt;br&amp;gt;[http://www.twitter.com/AppSecLatam http://www.owasp.org/images/f/f7/Twitter.png]	&lt;br /&gt;
[http://www.facebook.com/event.php?eid=155195651207509 http://www.owasp.org/images/5/55/Facebook.png] [http://events.linkedin.com/OWASP-Global-AppSec-Latin-America-2011/pub/607738 http://www.owasp.org/images/1/1a/Linkedin.png]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
We are pleased to announce that the [http://www.owasp.org/index.php/Porto_Alegre OWASP Porto Alegre Local Chapter] will organize the '''Global AppSec Latin America 2011 Conference''' in Porto Alegre-RS, Brazil. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The Global AppSec Latin America 2011 Conference will be a reunion of Information Security latin american leaders, and will present cutting-edge ideas. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 200-250 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many other verticals.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A OWASP Global AppSec Latin América 2011 will be happens in Brazil at Porto Alegre city, Rio Grande do Sul state [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=pt-BR&amp;amp;geocode=&amp;amp;q=Porto+Alegre&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=Porto+Alegre+-+Rio+Grande+do+Sul,+Brasil&amp;amp;z=11 map] in October 4th to 7th 2011. The trainings will be in October 04 and 05, and the presentations will be in October 06 and 07.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; If you have any questions, please email the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who Should Attend Global AppSec Latin América 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
[[Image:Owasp-poa-eng.png]] &lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23AppSecLatam #AppSecLatam]''' hashtag for your tweets for Global AppSec Latin America 2011 (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSecLatAm Twitter Feed ([http://twitter.com/AppSecLatam Follow us on Twitter!])''' &amp;lt;twitter&amp;gt;262394051&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFT &amp;amp;amp; CFP  ====&lt;br /&gt;
&lt;br /&gt;
== CFT  ==&lt;br /&gt;
&lt;br /&gt;
Read the Call for Trainings in: [https://www.owasp.org/index.php/AppSecLatam2011/CFT https://www.owasp.org/index.php/AppSecLatam2011/CFT] &lt;br /&gt;
&lt;br /&gt;
We are doing a research about subjects of the trainings. You can help us, answering the questions in the follow address: &lt;br /&gt;
&lt;br /&gt;
[http://www.surveymonkey.com/s/3RCZ9RR http://www.surveymonkey.com/s/3RCZ9RR] &lt;br /&gt;
&lt;br /&gt;
== CFP  ==&lt;br /&gt;
&lt;br /&gt;
Read the Call for Presentations in: [https://www.owasp.org/index.php/AppSecLatam2011/CFP https://www.owasp.org/index.php/AppSecLatam2011/CFP] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Program Committee  ==&lt;br /&gt;
&lt;br /&gt;
*Kuai Hinojosa &lt;br /&gt;
*Leandro Gomes &lt;br /&gt;
*Leonardo Buonsanti &lt;br /&gt;
*Leonardo Lemes &lt;br /&gt;
*Luiz Eduardo &lt;br /&gt;
*Luiz Otávio Duarte &lt;br /&gt;
*Mateo Martinez &lt;br /&gt;
*Rodrigo Rubira&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
== '''Keynotes'''  ==&lt;br /&gt;
&lt;br /&gt;
== Bruce Schneier  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/3f/Bruce2.png &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.schneier.com Bruce Schneier] is an internationally renowned security technologist, referred to by The Economist as a &amp;quot;security guru.&amp;quot; He is the author of eleven books -- including the best sellers Beyond Fear, Secrets and Lies, and Applied Cryptography – as well as hundreds of articles and essays, and many more academic papers. His influential newsletter &amp;quot;Crypto-Gram,&amp;quot; and his blog &amp;quot;Schneier on Security,&amp;quot; are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, served on several government technical committees, and is regularly quoted in the press. Schneier is the Chief Security Technology Officer of BT.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Bryan Sullivan  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/36/Bryan-sullivan.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/bryanjsullivan Bryan Sullivan ] is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect. &lt;br /&gt;
Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on a diverse range of topics including NoSQL, RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011). [http://www.linkedin.com/in/bryanjsullivan Linkedin] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''Guest Speakers'''  ==&lt;br /&gt;
&lt;br /&gt;
== Michael Craigue  ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/0/0c/MichaelCraigue.jpg &lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.linkedin.com/in/craigue Michael Craigue] (CISSP/CSSLP) is Director of the Security Consulting group at Dell, with 14 team members in Brazil, India, Malaysia, and the US. He and his team have responsibility for consulting with all of Dell’s internal organizations, including IT, Product Group, Services, and Mergers and Acquisitions, with a particular focus on the Secure Software Development Lifecycle. He has taught Database Management and Business Intelligence / Knowledge Management at St. Edward’s University in their MBA / MS CIS programs. Prior to joining Dell’s information security team, he spent a decade building Web and database applications. He has a PhD from the University of Texas at Austin in Higher Education Administration / Finance. [http://www.linkedin.com/in/craigue Linkedin]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== October 4th-5th (Training)  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== October 6th  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== October 7th  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
=== Registration Fees  ===&lt;br /&gt;
&lt;br /&gt;
To be published soon. &lt;br /&gt;
&lt;br /&gt;
==== Practical Info  ====&lt;br /&gt;
&lt;br /&gt;
== Visitors' Guide  ==&lt;br /&gt;
&lt;br /&gt;
Gate for tourists in the state of Rio Grande do Sul in Brazil, and only 120 miles from the pleasant Serra Gaucha, Porto Alegre is a bustling hub of services and infrastructure with quality recognized, and a base of large national and international companies and a major destination for international events in Brazil. &lt;br /&gt;
&lt;br /&gt;
Usefull links: &lt;br /&gt;
&lt;br /&gt;
[http://www2.portoalegre.rs.gov.br/turismo http://www2.portoalegre.rs.gov.br/turismo] &lt;br /&gt;
&lt;br /&gt;
[https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; 60 Minutes recent report about Brazil and his development potencial: &amp;lt;br&amp;gt; {{#ev:youtube|DMM7OJ_Kj9I}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Tourist video about Porto Alegre City:&amp;lt;br&amp;gt; {{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
== Eletric Outlet  ==&lt;br /&gt;
&lt;br /&gt;
== Wheather  ==&lt;br /&gt;
&lt;br /&gt;
== Trip  ==&lt;br /&gt;
&lt;br /&gt;
== Acommodation  ==&lt;br /&gt;
&lt;br /&gt;
==== Social Events  ====&lt;br /&gt;
&lt;br /&gt;
Information will be published here. &lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We are looking for sponsors for 2011 edition of Global AppSec Latin America. See more details about sponsor opportunities. &lt;br /&gt;
&lt;br /&gt;
If you are interested to sponsor Global AppSec Latin America 2011, please contact the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]. &lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below: &amp;lt;br&amp;gt; [http://www.owasp.org/images/4/4f/OWASP_AppSec_2011_Sponsorship_English.pdf OWASP AppSec 2011 Sponsorship English.pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local Promotion ==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Logo-PoaSec.png|link=http://www.poasec.org]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
[mailto:abc@elipse.com.br Alexandre Balestrin Correa]&amp;lt;br&amp;gt; &lt;br /&gt;
[https://www.owasp.org/index.php/User:Cassio_Goldschmidt Cassio Goldschmidt]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Jeronimo_Zucco Jerônimo Zucco ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Gustavo_Barbato L. Gustavo C. Barbato ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Sapao Lucas C. Ferreira ]&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/User:Rafael_Dreher Rafael Dreher ]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecLatam2011&amp;diff=110048</id>
		<title>AppSecLatam2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecLatam2011&amp;diff=110048"/>
				<updated>2011-05-05T19:56:38Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:AppSec Brasil 11 medio.png]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; '''Language:&amp;lt;br&amp;gt;[http://www.owasp.org/index.php?title=AppSecLatam2011 http://www.owasp.org/images/8/88/Bandeira_reino_unido.png]	&lt;br /&gt;
[http://www.owasp.org/index.php?title=AppSecLatam2011_(pt-br) http://www.owasp.org/images/4/49/Bandeira_brasil.png] [http://www.owasp.org/index.php?title=AppSecLatam2011_(es) http://www.owasp.org/images/1/1c/Bandeira_espanha.png]  | &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*[http://www.owasp.org/images/1/19/AppSecLatam_2011_Announcement.pdf Press Release]&lt;br /&gt;
*[[AppSecLA2011/Media Mentions|Media Mentions]]&lt;br /&gt;
*[[AppSecLA2011/Archived|Archived]]&lt;br /&gt;
&amp;lt;br&amp;gt; '''Follow us:&amp;lt;br&amp;gt;[http://www.twitter.com/AppSecLatam http://www.owasp.org/images/f/f7/Twitter.png]	&lt;br /&gt;
[http://www.facebook.com/event.php?eid=155195651207509 http://www.owasp.org/images/5/55/Facebook.png] [http://events.linkedin.com/OWASP-Global-AppSec-Latin-America-2011/pub/607738 http://www.owasp.org/images/1/1a/Linkedin.png] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
We are pleased to announce that the [http://www.owasp.org/index.php/Porto_Alegre OWASP Porto Alegre Local Chapter] will organize the '''Global AppSec Latin America 2011 Conference''' in Porto Alegre-RS, Brazil. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Global AppSec Latin America 2011 Conference will be a reunion of Information Security latin american leaders, and will present cutting-edge ideas. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 200-250 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many other verticals.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please email the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Global AppSec Latin América 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
[[Image:Owasp-poa-eng.png]] &lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23AppSecLatam #AppSecLatam]''' hashtag for your tweets for Global AppSec Latin America 2011 (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSecLatAm Twitter Feed ([http://twitter.com/AppSecLatam Follow us on Twitter!])''' &amp;lt;twitter&amp;gt;262394051&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFT &amp;amp; CFP  ====&lt;br /&gt;
&lt;br /&gt;
== CFT  ==&lt;br /&gt;
Read the Call for Trainings in: [https://www.owasp.org/index.php/AppSecLatam2011/CFT https://www.owasp.org/index.php/AppSecLatam2011/CFT]&lt;br /&gt;
&lt;br /&gt;
We are doing a research about subjects of the trainings. You can help us, answering the questions in the follow address:  &lt;br /&gt;
&lt;br /&gt;
[http://www.surveymonkey.com/s/3RCZ9RR http://www.surveymonkey.com/s/3RCZ9RR]&lt;br /&gt;
&lt;br /&gt;
== CFP  ==&lt;br /&gt;
&lt;br /&gt;
Read the Call for Presentations in: [https://www.owasp.org/index.php/AppSecLatam2011/CFP https://www.owasp.org/index.php/AppSecLatam2011/CFP]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Program Committee  ==&lt;br /&gt;
&lt;br /&gt;
* Kuai Hinojosa&lt;br /&gt;
* Leandro Gomes&lt;br /&gt;
* Leonardo Buonsanti&lt;br /&gt;
* Leonardo Lemes&lt;br /&gt;
* Luiz Eduardo&lt;br /&gt;
* Luiz Otávio Duarte&lt;br /&gt;
* Mateo Martinez&lt;br /&gt;
* Rodrigo Rubira&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
== '''Keynotes'''  ==&lt;br /&gt;
== Bruce Schneier  ==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/3/3f/Bruce2.png&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; | [http://www.schneier.com Bruce Schneier] is an internationally renowned security technologist, referred to by The Economist as a &amp;quot;security guru.&amp;quot;  He is the author of eleven books -- including the best sellers Beyond Fear, Secrets and Lies, and Applied Cryptography – as well as hundreds of articles and essays, and many more academic papers.  His influential newsletter &amp;quot;Crypto-Gram,&amp;quot; and his blog &amp;quot;Schneier on Security,&amp;quot; are read by over 250,000 people.  He has testified before Congress, is a frequent guest on television and radio, served on several government technical committees, and is regularly quoted in the press.  Schneier is the Chief Security Technology Officer of BT.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Bryan Sullivan  ==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |https://www.owasp.org/images/3/36/Bryan-sullivan.jpg&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |[http://www.linkedin.com/in/bryanjsullivan Bryan Sullivan ] is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect.&lt;br /&gt;
&lt;br /&gt;
Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on a diverse range of topics including NoSQL, RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011). [http://www.linkedin.com/in/bryanjsullivan Linkedin]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Guest Speakers'''  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Michael Craigue  ==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | https://www.owasp.org/images/0/0c/MichaelCraigue.jpg&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |[http://www.linkedin.com/in/craigue Michael Craigue] (CISSP/CSSLP) is Director of the Security Consulting group at Dell, with 14 team members in Brazil, India, Malaysia, and the US. He and his team have responsibility for consulting with all of Dell’s internal organizations, including IT, Product Group, Services, and Mergers and Acquisitions, with a particular focus on the Secure Software Development Lifecycle. He has taught Database Management and Business Intelligence / Knowledge Management at St. Edward’s University in their MBA / MS CIS programs. Prior to joining Dell’s information security team, he spent a decade building Web and database applications. He has a PhD from the University of Texas at Austin in Higher Education Administration / Finance. [http://www.linkedin.com/in/craigue Linkedin]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== October 4th-5th (Training)  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
==== October 6th  ====&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
==== October 7th  ====&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
===Registration Fees===&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
==== Practical Info  ====&lt;br /&gt;
&lt;br /&gt;
== Visitors' Guide ==&lt;br /&gt;
&lt;br /&gt;
Gate for tourists in the state of Rio Grande do Sul in Brazil, and only 120 miles from the pleasant Serra Gaucha, Porto Alegre is a bustling hub of services and infrastructure with quality recognized, and a base of large national and international companies and a major destination for international events in Brazil.&lt;br /&gt;
&lt;br /&gt;
Usefull links: &lt;br /&gt;
&lt;br /&gt;
[http://www2.portoalegre.rs.gov.br/turismo http://www2.portoalegre.rs.gov.br/turismo] &lt;br /&gt;
&lt;br /&gt;
[https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; 60 Minutes recent report about Brazil and his development potencial: &amp;lt;br&amp;gt; &lt;br /&gt;
{{#ev:youtube|DMM7OJ_Kj9I}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Tourist video about Porto Alegre City:&amp;lt;br&amp;gt;&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
==== Social Events ====&lt;br /&gt;
&lt;br /&gt;
Information will be published here.&lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We are looking for sponsors for 2011 edition of Global AppSec Latin America. See more details about sponsor opportunities.&lt;br /&gt;
&lt;br /&gt;
If you are interested to sponsor Global AppSec Latin America 2011, please contact the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org].&lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below:  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/4/4f/OWASP_AppSec_2011_Sponsorship_English.pdf OWASP AppSec 2011 Sponsorship English.pdf]&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Cassio_Goldschmidt Cassio Goldschmidt]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/User:Jeronimo_Zucco Jerônimo Zucco ]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/User:Gustavo_Barbato L. Gustavo C. Barbato ]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/User:Sapao Lucas C. Ferreira ]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/User:Rafael_Dreher Rafael Dreher ]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecLatam2011_(es)&amp;diff=109007</id>
		<title>AppSecLatam2011 (es)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecLatam2011_(es)&amp;diff=109007"/>
				<updated>2011-04-18T03:31:50Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:AppSec Brasil 11 medio.png]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; '''Language:&amp;lt;br&amp;gt;[http://www.owasp.org/index.php?title=AppSecLatam2011 http://www.owasp.org/images/8/88/Bandeira_reino_unido.png]	&lt;br /&gt;
[http://www.owasp.org/index.php?title=AppSecLatam2011_(pt-br) http://www.owasp.org/images/4/49/Bandeira_brasil.png] [http://www.owasp.org/index.php?title=AppSecLatam2011_(es) http://www.owasp.org/images/1/1c/Bandeira_espanha.png]  | &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*[http://www.owasp.org/images/1/19/AppSecLatam_2011_Announcement.pdf Press Release]&lt;br /&gt;
*[[AppSecLA2011/Media Mentions|Media Mentions]]&lt;br /&gt;
*[[AppSecLA2011/Archived|Archived]]&lt;br /&gt;
&amp;lt;br&amp;gt; '''Follow us:&amp;lt;br&amp;gt;[http://www.twitter.com/AppSecLatam http://www.owasp.org/images/f/f7/Twitter.png]	&lt;br /&gt;
[http://www.facebook.com/event.php?eid=155195651207509 http://www.owasp.org/images/5/55/Facebook.png] [http://events.linkedin.com/OWASP-Global-AppSec-Latin-America-2011/pub/607738 http://www.owasp.org/images/1/1a/Linkedin.png] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
We are pleased to announce that the [http://www.owasp.org/index.php/Porto_Alegre OWASP Porto Alegre Local Chapter] will organize the '''Global AppSec Latin America 2011 Conference''' in Porto Alegre-RS, Brazil. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Global AppSec Latin America 2011 Conference will be a reunion of Information Security latin american leaders, and will present cutting-edge ideas. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 200-250 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many other verticals.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please email the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Global AppSec Latin America 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
[[Image:Owasp-poa-eng.png]] &lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23AppSecLatam #AppSecLatam]''' hashtag for your tweets for Global AppSec Latin America 2011 (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSecLatAm Twitter Feed ([http://twitter.com/AppSecLatam Follow us on Twitter!])''' &amp;lt;twitter&amp;gt;262394051&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFT &amp;amp; CFP  ====&lt;br /&gt;
&lt;br /&gt;
== CFT  ==&lt;br /&gt;
The Call for Trainings will be released soon.&lt;br /&gt;
&lt;br /&gt;
We are doing a research about subjects of the trainings. You can help us, answering the questions in the follow address:  &lt;br /&gt;
&lt;br /&gt;
[http://www.surveymonkey.com/s/3RCZ9RR http://www.surveymonkey.com/s/3RCZ9RR]&lt;br /&gt;
&lt;br /&gt;
== CFP  ==&lt;br /&gt;
&lt;br /&gt;
The Call for Papers will be released soon. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== October 4th-5th (Training)  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
==== October 6th  ====&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
==== October 7th  ====&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
===Registration Fees===&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
==== Practical Info  ====&lt;br /&gt;
&lt;br /&gt;
== Visitors' Guide ==&lt;br /&gt;
&lt;br /&gt;
Gate for tourists in the state of Rio Grande do Sul in Brazil, and only 120 miles from the pleasant Serra Gaucha, Porto Alegre is a bustling hub of services and infrastructure with quality recognized, and a base of large national and international companies and a major destination for international events in Brazil.&lt;br /&gt;
&lt;br /&gt;
Usefull links: &lt;br /&gt;
&lt;br /&gt;
[http://www2.portoalegre.rs.gov.br/turismo http://www2.portoalegre.rs.gov.br/turismo] &lt;br /&gt;
&lt;br /&gt;
[https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; 60 Minutes recent report about Brazil and his development potencial: &amp;lt;br&amp;gt; &lt;br /&gt;
{{#ev:youtube|DMM7OJ_Kj9I}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Tourist video about Porto Alegre City:&amp;lt;br&amp;gt;&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
==== Social Events ====&lt;br /&gt;
&lt;br /&gt;
Information will be published here.&lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We are looking for sponsors for 2011 edition of Global AppSec Latin America. See more details about sponsor opportunities.&lt;br /&gt;
&lt;br /&gt;
If you are interested to sponsor Global AppSec Latin America 2011, please contact the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org].&lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below:  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/4/4f/OWASP_AppSec_2011_Sponsorship_English.pdf OWASP AppSec 2011 Sponsorship English.pdf]&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Cassio_Goldschmidt Cassio Goldschmidt]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/User:Jeronimo_Zucco Jerônimo Zucco ]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/User:Gustavo_Barbato L. Gustavo C. Barbato ]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/User:Sapao Lucas C. Ferreira ]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/User:Rafael_Dreher Rafael Dreher ]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA/Attending_Owasp_Leaders&amp;diff=109006</id>
		<title>AppSec US 2010, CA/Attending Owasp Leaders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA/Attending_Owasp_Leaders&amp;diff=109006"/>
				<updated>2011-04-18T03:29:39Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Page to manage the participation of the OWASP leaders at the [[AppSec US 2010, CA|AppSec USA in Irvine USA]] &lt;br /&gt;
&lt;br /&gt;
=== Attending Leaders - Confirmed  ===&lt;br /&gt;
&lt;br /&gt;
#[[User:Dancornell|Dan Cornell]]- ''San Antonio Chapter and Global Membership Committee'' &lt;br /&gt;
#Tony UV - ''Atlanta Chapter'' &lt;br /&gt;
#[[User:Jmanico|Jim Manico]] - ''Podcast Project'' &lt;br /&gt;
#[[User:MichaelCoates|Michael Coates]] - ''AppSensor project and Global Membership Committee'' &lt;br /&gt;
#[[User:Knoblochmartin|Martin Knobloch]] - ''Education and Connections Committee'' &lt;br /&gt;
#[[User:Rsnake|Robert Hansen]] - ''Connections Committee'' &lt;br /&gt;
#[[User:Mtesauro|Matt Tesauro]] - ''Live CD project, Board Member'' &lt;br /&gt;
#[[User:Wichers|Dave Wichers]] - ''Top 10 project, Board Member'' &lt;br /&gt;
#[[User:Brennan|Tom Brennan]] - ''NYC Chapter Leader, RFP Criteria project, OWASP-CRM, Board Member'' &lt;br /&gt;
#[[User:Jeff Williams|Jeff Williams]] - ''ESAPI project, Board Member'' &lt;br /&gt;
#[[User:Dinis.cruz|Dinis Cruz]] - ''O2 Platform project, Board Member'' &lt;br /&gt;
#[[User:Dc|David Campbell]] - ''Denver Chapter, Industry Committee'' &lt;br /&gt;
#[[User:Eduprey|Eric Duprey]] - ''Denver Chapter'' &lt;br /&gt;
#[[User:Justin42|Justin Clarke]] - ''London Chapter and Connections Committee'' &lt;br /&gt;
#Roman Hustad - ''Sacramento Chapter'' &lt;br /&gt;
#Peter Dean - ''NYC Chapter Leader'' &lt;br /&gt;
#Georg Hess - ''German Chapter, Industry Committee'' &lt;br /&gt;
#John Steven - ''NoVA Chapter Lead'' &lt;br /&gt;
#[[User:Lorna Alamri|Lorna Alamri]] - ''Connections Committee'' &lt;br /&gt;
#[[User:Chris Schmidt|Chris Schmidt]] - ''ESAPI Project'' &lt;br /&gt;
#David Bryan - ''MSP Chapter Leader'' &lt;br /&gt;
#Eric Duprey - ''Denver Chapter Leader'' &lt;br /&gt;
#Mandeep Khera -&lt;br /&gt;
&lt;br /&gt;
'''Part of the conference organization''' &lt;br /&gt;
&lt;br /&gt;
#[https://www.owasp.org/index.php/User:Cassio_Goldschmidt Cassio Goldschmidt] - ''Los Angeles Chapter'' &lt;br /&gt;
#[[:User:Tin Zaw|Tin Zaw]] - ''Los Angeles Chapter'' &lt;br /&gt;
#[[User:Richard greenberg|Richard Greenberg]] - ''Los Angeles Chapter'' &lt;br /&gt;
#[http://www.owasp.org/index.php/User:Nmatatal Neil Matatall] - ''[[http://www.owasp.org/index.php/Orange_County Orange County Chapter]]'' &lt;br /&gt;
#Kate Hartmann - OWASP Foundation &lt;br /&gt;
#Alison McNamee - OWASP Foundation (remote support)&lt;br /&gt;
&lt;br /&gt;
=== Also attending (part of OWASP community)  ===&lt;br /&gt;
&lt;br /&gt;
#Joseph Dawson &lt;br /&gt;
#Howard Fore - ''Atlanta Chapter (Bring a Developer Attendee)'' &lt;br /&gt;
#Jon Bango - ''Atlanta Chapter (Bring a Developer Attendee)'' &lt;br /&gt;
#August Detlefsen - ''(Bring a Developer Attendee)''&lt;br /&gt;
&lt;br /&gt;
=== Key WebAppSec players  ===&lt;br /&gt;
&lt;br /&gt;
objective: identfy potential synergies between WebAppSec industry players and OWASP leaders (for example too meet and have a meeting) &lt;br /&gt;
&lt;br /&gt;
*Firefox Browser &lt;br /&gt;
**There are a number of Firefox employees participating and they have shown interest in talking to OWASP about how we can work together &lt;br /&gt;
***Michael Coates (Owasp Leader) &lt;br /&gt;
***Sid Stamm &lt;br /&gt;
***Brandon Sterne &lt;br /&gt;
***Dan Veditz&lt;br /&gt;
&lt;br /&gt;
=== Developers and QA participating  ===&lt;br /&gt;
&lt;br /&gt;
'''Sponsored by the Atlanta Chapter''' &lt;br /&gt;
&lt;br /&gt;
#''Howard Fore (Atlanta Developer)'' - Howard Fore is a senior web developer in Atlanta, Georgia. He's involved in some high-visibility web projects at the Federal Reserve Bank of Atlanta. Increasing awareness of secure software development practices is an departmental objective for 2010 and he's a member of the security workgroup, which is leading the way in that endeavor. Other practices the security workgroup are implementing include static code analysis and code inspection. &lt;br /&gt;
#''Jon Bango (Atlanta Developer)'' - Jon Bango is an Information Technology professional with over 13 years experience in the education, financial services and retail industries. Primarily working at the enterprise level, Jon has utilized the J2EE stack in building web applications for the largest home improvement retailer in the world. Most recently he has branched out into RIA technologies working in Adobe Flex and Microsoft Silverlight. Currently, Jon has transitioned into the dark arts at his company’s Information Assurance department in which the groundwork has been laid to utilize his developer talents to create a company wide secure coding initiative. &lt;br /&gt;
#''August Detlefsen (Oakland Developer)'' - August Detlefsen is a 13+ year Java web architect veteran. As an independent contractor he has developed solutions for such companies as Sun Microsystems, Oracle, VMware, NetApp and others, managing all phases of the software development lifecycle from initial specification to final disposal. August recently began focusing on web application security and has worked on projects for WhiteHat Security, Security Compass, and AppSec Consulting and donated time on the OWASP ESAPI and AppSensor projects.&lt;br /&gt;
&lt;br /&gt;
=== Meetings and sessions  ===&lt;br /&gt;
&lt;br /&gt;
So far we have identified 6 slots were there will be an event happening around this group &lt;br /&gt;
&lt;br /&gt;
*'''Wed Lunch Break'''&amp;amp;nbsp;: 'ESAPI4JS: Where do we go from here?' &lt;br /&gt;
*'''Wed Night'''&amp;amp;nbsp;: 9PM-12PM Drinks at TDB &lt;br /&gt;
*'''Thursday Lunch Break'''&amp;amp;nbsp;: 'OWASP and the Browsers: How can we work together?' &lt;br /&gt;
*'''Thursday After the conference'''&amp;amp;nbsp;: OWASP Leaders meeting &lt;br /&gt;
*'''Thursday Night'''&amp;amp;nbsp;: TBD ''(and maybe the OWASP band?)'' &lt;br /&gt;
*'''Friday Lunch Break'''&amp;amp;nbsp;: OWASP Summit 2011 &lt;br /&gt;
*'''Friday After the conference'''&amp;amp;nbsp;: AppSec Soccer Tournament &lt;br /&gt;
*'''Friday Night'''&amp;amp;nbsp;: TDB&lt;br /&gt;
&lt;br /&gt;
Note that there are meeting facilities available, so if you need a quite space to meet and talk about OWASP let us know. &lt;br /&gt;
&lt;br /&gt;
=== How to track an OWASP Leader  ===&lt;br /&gt;
&lt;br /&gt;
Ideally we should be able to track OWASP leaders, the question is how? &lt;br /&gt;
&lt;br /&gt;
What could we give the leaders that would easily identify them (in practical and usable way): &lt;br /&gt;
&lt;br /&gt;
*a special wristband &lt;br /&gt;
**with a particular color? &lt;br /&gt;
**with a particular logo or message? &lt;br /&gt;
**wth a GPC tag? (or auto-location-tweet) &lt;br /&gt;
*an armband &lt;br /&gt;
*a hat &lt;br /&gt;
*a scarf &lt;br /&gt;
*a t-shirt &lt;br /&gt;
*a bag &lt;br /&gt;
*with a paintball gun?&lt;br /&gt;
&lt;br /&gt;
=== AppSec Soccer Tournament  ===&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday after the conference&amp;lt;br&amp;gt; '''Where:''' TBC&amp;lt;br&amp;gt; '''Participants:'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Dinis Cruz &lt;br /&gt;
*Kate Hartmann (can also be a referre)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== To do (tasks)  ===&lt;br /&gt;
&lt;br /&gt;
*for each each participant &lt;br /&gt;
**link to MediaWiki user page &lt;br /&gt;
**add twitter accounts &lt;br /&gt;
*Travel arrangements &lt;br /&gt;
**map travel dates &lt;br /&gt;
**when/where they are arriving &lt;br /&gt;
**where are they staying &lt;br /&gt;
*figure out what to do with the leaders when they are there &lt;br /&gt;
*should we create a welcome pack for these leaders? &lt;br /&gt;
*should we see if they need help in their travel arrangements? &lt;br /&gt;
*should we see if its possible to find a local host for the accomodation (it is always better than going into an hotel)? &lt;br /&gt;
*do we need a budget? if so, how much?&lt;br /&gt;
&lt;br /&gt;
[[Category:Connections_Committee]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecLatam2011&amp;diff=109005</id>
		<title>AppSecLatam2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecLatam2011&amp;diff=109005"/>
				<updated>2011-04-18T03:27:41Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:AppSec Brasil 11 medio.png]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; '''Language:&amp;lt;br&amp;gt;[http://www.owasp.org/index.php?title=AppSecLatam2011 http://www.owasp.org/images/8/88/Bandeira_reino_unido.png]	&lt;br /&gt;
[http://www.owasp.org/index.php?title=AppSecLatam2011_(pt-br) http://www.owasp.org/images/4/49/Bandeira_brasil.png] [http://www.owasp.org/index.php?title=AppSecLatam2011_(es) http://www.owasp.org/images/1/1c/Bandeira_espanha.png]  | &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*[http://www.owasp.org/images/1/19/AppSecLatam_2011_Announcement.pdf Press Release]&lt;br /&gt;
*[[AppSecLA2011/Media Mentions|Media Mentions]]&lt;br /&gt;
*[[AppSecLA2011/Archived|Archived]]&lt;br /&gt;
&amp;lt;br&amp;gt; '''Follow us:&amp;lt;br&amp;gt;[http://www.twitter.com/AppSecLatam http://www.owasp.org/images/f/f7/Twitter.png]	&lt;br /&gt;
[http://www.facebook.com/event.php?eid=155195651207509 http://www.owasp.org/images/5/55/Facebook.png] [http://events.linkedin.com/OWASP-Global-AppSec-Latin-America-2011/pub/607738 http://www.owasp.org/images/1/1a/Linkedin.png] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
We are pleased to announce that the [http://www.owasp.org/index.php/Porto_Alegre OWASP Porto Alegre Local Chapter] will organize the '''Global AppSec Latin America 2011 Conference''' in Porto Alegre-RS, Brazil. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Global AppSec Latin America 2011 Conference will be a reunion of Information Security latin american leaders, and will present cutting-edge ideas. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 200-250 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many other verticals.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please email the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend Global AppSec Latin América 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
[[Image:Owasp-poa-eng.png]] &lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23AppSecLatam #AppSecLatam]''' hashtag for your tweets for Global AppSec Latin America 2011 (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSecLatAm Twitter Feed ([http://twitter.com/AppSecLatam Follow us on Twitter!])''' &amp;lt;twitter&amp;gt;262394051&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== CFT &amp;amp; CFP  ====&lt;br /&gt;
&lt;br /&gt;
== CFT  ==&lt;br /&gt;
The Call for Trainings will be released soon.&lt;br /&gt;
&lt;br /&gt;
We are doing a research about subjects of the trainings. You can help us, answering the questions in the follow address:  &lt;br /&gt;
&lt;br /&gt;
[http://www.surveymonkey.com/s/3RCZ9RR http://www.surveymonkey.com/s/3RCZ9RR]&lt;br /&gt;
&lt;br /&gt;
== CFP  ==&lt;br /&gt;
&lt;br /&gt;
The Call for Papers will be released soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CFT  ==&lt;br /&gt;
A chamada de trabalhos para treinamentos será divulgada em breve.&lt;br /&gt;
&lt;br /&gt;
Estamos realizando uma pesquisa sobre os temas para treinamentos. Você pode ajudar, respondendo a pesquisa no seguinte endereço:&lt;br /&gt;
&lt;br /&gt;
[http://www.surveymonkey.com/s/3RCZ9RR http://www.surveymonkey.com/s/3RCZ9RR]&lt;br /&gt;
&lt;br /&gt;
== CFP  ==&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
==== October 4th-5th (Training)  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
==== October 6th  ====&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
==== October 7th  ====&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
===Registration Fees===&lt;br /&gt;
&lt;br /&gt;
To be published soon.&lt;br /&gt;
&lt;br /&gt;
==== Practical Info  ====&lt;br /&gt;
&lt;br /&gt;
== Visitors' Guide ==&lt;br /&gt;
&lt;br /&gt;
Gate for tourists in the state of Rio Grande do Sul in Brazil, and only 120 miles from the pleasant Serra Gaucha, Porto Alegre is a bustling hub of services and infrastructure with quality recognized, and a base of large national and international companies and a major destination for international events in Brazil.&lt;br /&gt;
&lt;br /&gt;
Usefull links: &lt;br /&gt;
&lt;br /&gt;
[http://www2.portoalegre.rs.gov.br/turismo http://www2.portoalegre.rs.gov.br/turismo] &lt;br /&gt;
&lt;br /&gt;
[https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre https://secure.wikimedia.org/wikipedia/en/wiki/Porto_Alegre] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; 60 Minutes recent report about Brazil and his development potencial: &amp;lt;br&amp;gt; &lt;br /&gt;
{{#ev:youtube|DMM7OJ_Kj9I}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Tourist video about Porto Alegre City:&amp;lt;br&amp;gt;&lt;br /&gt;
{{#ev:youtube|pXQ9z8sPcHI}} &lt;br /&gt;
&lt;br /&gt;
==== Social Events ====&lt;br /&gt;
&lt;br /&gt;
Information will be published here.&lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We are looking for sponsors for 2011 edition of Global AppSec Latin America. See more details about sponsor opportunities.&lt;br /&gt;
&lt;br /&gt;
If you are interested to sponsor Global AppSec Latin America 2011, please contact the conference chair: [mailto:AppSec2011@AppSecLatam.org AppSec2011@AppSecLatam.org].&lt;br /&gt;
&lt;br /&gt;
To find out more about the different sponsorship opportunities please check the document below:  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/4/4f/OWASP_AppSec_2011_Sponsorship_English.pdf OWASP AppSec 2011 Sponsorship English.pdf]&lt;br /&gt;
&lt;br /&gt;
==== Team  ====&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Cassio_Goldschmidt Cassio Goldschmidt]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/User:Jeronimo_Zucco Jerônimo Zucco ]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/User:Gustavo_Barbato L. Gustavo C. Barbato ]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/User:Sapao Lucas C. Ferreira ]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/User:Rafael_Dreher Rafael Dreher ]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Cassio_Goldschmidt&amp;diff=109004</id>
		<title>User:Cassio Goldschmidt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Cassio_Goldschmidt&amp;diff=109004"/>
				<updated>2011-04-18T03:26:01Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: Created page with &amp;quot;Cassio Goldschmidt is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter).  I...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cassio Goldschmidt is a globally recognized application security leader, and senior manager of the product security team at Symantec Corporation (a long time OWASP supporter).  In this role Cassio leads the Symantec Product Security team with company-wide responsibility for product security assurance, vulnerability management, security development lifecycle implementation, and oversees the coordination of security certifications and training. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cassio's contribution to OWASP include:'''&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* Co-chair of OWASP AppSec USA 2010&lt;br /&gt;
* Co-chair of OWASP AppSec Latin America 2011&lt;br /&gt;
* Member of the conference committee&lt;br /&gt;
* Major contributions to the revamp of OWASP LA Chapter&lt;br /&gt;
* Honorary founder of OWASP Porto Alegre Chapter&lt;br /&gt;
* Board member of OWASP LA Chapter&lt;br /&gt;
* Speaking engagements at OWASP conferences&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Cassio holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''More info:'''&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
*[http://www.linkedin.com/pub/cassio-goldschmidt/0/333/638 LinkedIn]&lt;br /&gt;
*Email: cassio 'at' owasp 'dot' org&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_5&amp;diff=93801</id>
		<title>Global Chapter Committee - Application 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_5&amp;diff=93801"/>
				<updated>2010-11-24T19:18:42Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%; background: rgb(123,138,189)&amp;quot; align=&amp;quot;center&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| style=&amp;quot;width: 85%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/User:Gustavo_Barbato L. Gustavo C. Barbato]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%; background: rgb(123,138,189)&amp;quot; align=&amp;quot;center&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| style=&amp;quot;width: 85%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;left&amp;quot; | Chapter Leader, OWASP Porto Alegre / Brazil&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%; background: rgb(123,138,189)&amp;quot; align=&amp;quot;center&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| style=&amp;quot;width: 85%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Global Chapters Committee.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: white; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
! style=&amp;quot;background: rgb(123,138,189); color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! style=&amp;quot;background: rgb(123,138,189); color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! style=&amp;quot;background: rgb(123,138,189); color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | '''1''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | Cassio Goldschmidt&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 20%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | OWASP LA Chapter founder, LA chapter board member, AppSec USA 2010 co-chair&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 57%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | In a very short period of time, Gustavo demonstrated ability to walk the talk and establish relations with other community members. Gustavo brings to the table passion, new perspectives and firsthand experience starting a chapter from the ground up. Without a doubt, Gustavo has great potential to bring a lot of value to the committee.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | '''2''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | Michael Craigue&lt;br /&gt;
| style=&amp;quot;width: 20%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | OWASP member and occasional presenter at OWASP meetings/conferences&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 57%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | Gustavo is passionate about information security in general, and about web application security in particular. He has volunteered to serve as Technical Application Security Lead for our Security Consulting team, and I&amp;amp;nbsp;have no doubt he will make great contributions in this area for our company. He's also motivated to build OWASP membership in Brazil and around the globe.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | '''3''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 20%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 57%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | '''4''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 20%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 57%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 3%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | '''5''' &lt;br /&gt;
| style=&amp;quot;width: 20%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 20%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 57%; background: rgb(204,204,204)&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_5&amp;diff=93799</id>
		<title>Global Chapter Committee - Application 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_5&amp;diff=93799"/>
				<updated>2010-11-24T19:06:10Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; colspan=&amp;quot;1&amp;quot; | [http://www.owasp.org/index.php/User:Gustavo_Barbato L. Gustavo C. Barbato]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; colspan=&amp;quot;1&amp;quot; | Chapter Leader, OWASP Porto Alegre / Brazil&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; colspan=&amp;quot;1&amp;quot; | OWASP Global Chapters Committee.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;8&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% white; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Cassio Goldschmidt&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP LA Chapter founder, LA chapter board member, AppSec USA 2010 co-chair&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | In a very short period of time, Gustavo demonstrated ability to walk the talk and establish relations  with other community members. Gustavo brings to the table passion, new perspectives and firsthand experience starting a chapter from the ground up.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_4&amp;diff=92835</id>
		<title>Global Chapter Committee - Application 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_4&amp;diff=92835"/>
				<updated>2010-11-12T18:44:31Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Tin Zaw.&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP Los Angeles chapter leader, AppSec USA 2010 co-chair.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP Global Chapters Committee.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% white; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | richard greenberg &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Los Angeles Board/Global Conf Committee &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Tin is a visionary leader, and a very dedicated and hard worker. His leadership and perseverance were key in making AppSec SoCal such a sucess. He always had great ideas and spoke his mind during the planning meetings, but was always considerate of other ideas and points of view.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Cassio Goldschmidt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP LA Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Tin brought a lot of much needed structure and consistency to the Los Angeles chapter. During his tenure the chapter was able to find dinner sponsors, have a good line up of monthly speakers annnounced well in advance and host AppSec 2010 USA. I highly recommend Tin for the position.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_6&amp;diff=92465</id>
		<title>Global Conferences Committee - Application 6</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_6&amp;diff=92465"/>
				<updated>2010-11-06T15:04:24Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Cassio Goldschmidt&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP LA Chapter Founder, former OWASP LA Chapter Leader, OWASP LA Chapter Board Member, OWASP AppSec USA Co-chair, Regular Presenter at OWASP Conferences around the globe.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Conferences Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''6'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''7'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''8'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_6&amp;diff=92457</id>
		<title>Global Conferences Committee - Application 6</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_6&amp;diff=92457"/>
				<updated>2010-11-06T04:53:39Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Cassio Goldschmidt&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP LA Chapter Founder, former OWASP LA Chaprer Leader, OWASP LA Chapter Board Member, OWASP AppSec USA Co-chair, Regular Presenter at OWASP Conferences around the globe.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Conferences Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''6'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''7'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''8'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_6&amp;diff=92456</id>
		<title>Global Conferences Committee - Application 6</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_6&amp;diff=92456"/>
				<updated>2010-11-06T04:44:18Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Cassio Goldschmidt&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP LA Chapter Founder, former OWASP LA Chaprer Leader, OWASP LA Chapter Board Member, OWASP AppSec USA Co-chair, Regular Presenter at OWASP Conferences around the globe.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Conferences Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_6&amp;diff=92455</id>
		<title>Global Conferences Committee - Application 6</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_6&amp;diff=92455"/>
				<updated>2010-11-06T04:41:21Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: Created page with 'Click here to return to 'How to Join a Committee' page  ---- {| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;  ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;back…'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Add here.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|List here.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Conferences Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=How_to_Join_a_Committee&amp;diff=92454</id>
		<title>How to Join a Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_to_Join_a_Committee&amp;diff=92454"/>
				<updated>2010-11-06T04:37:05Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Global Committee Pages|Click here to return to the Global Committee Pages]]. &lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project (OWASP) is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Many individuals start with OWASP as a user of a tool/guide or attending a local chapter. From that they may become a individual project leader on a new tool/guide or may serve on the board of a local OWASP chapter. Becoming a member of one of the Global Committees is not only a great achievement in the technical community, but is an opportunity to directly impact the future of OWASP Foundation. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Global Committees are designed to develop a committee plan and then work on a global effort with your peers from around the world. Ideally you nominate a peer as a regional spokesperson and he/she is the conduit for global issues that has approx., 10 hrs per month to volunteer time to OWASP Foundation. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This NEW ROLE was announced at the OWASP Portugal Summit and several individuals were nominated from the floor of the event and a motion was approved at the public board meeting in November 2008. There is still time.... If you were not at the event and would like to get involved with a global role and are either a project leader or chapter leader and it must be supported by 5 endorsements of you regional peers*. We are calling this the &amp;quot;2009 2nd wave applicants&amp;quot; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Note that to prevent conflict of interest, Board members cannot endorse candidates for any committee nor can a committee member endorse a candidate for their own committee. Committee members may endorse candidates for other committees to which they do not belong.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Fill in one of the below application forms. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Current Committee MEMBERS UNDER ELECTION - APPLICATION FORMS  ===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 90%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); -moz-background-inline-policy: continuous; color: white;&amp;quot; | '''OWASP GLOBAL COMMITTEES - UNDER ELECTION'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | OWASP GLOBAL COMMITTEES &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | '''Projects''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | '''Membership''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | '''Education''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | '''Conferences''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | '''Industry''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | '''Chapters''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | '''Connections'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | '''Applications -&amp;amp;gt;''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | '''[[Global Projects and Tools Committee - Application 1|Aryavalli Gandhi]]'''&amp;lt;br&amp;gt;'''[[Global Projects and Tools Committee - Application 2|Brad Causey]]'''&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 3|Applicant 3]]&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global Projects and Tools Committee - Template|more]], if needed &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Membership Committee - Application 1|Applicant 1]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 2|Applicant 2]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 3|Applicant 3]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global Membership - Template|more]], if needed &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;br&amp;gt;[[Global Education Committee - Application 2|'''Carlos Serrão''']]&amp;lt;br&amp;gt;[[Global Education Committee - Application 3|'''Sébastien Gioria''']]&amp;lt;br&amp;gt;[[Global Education Committee - Application 4|Nishi Kumar]]&amp;lt;br&amp;gt;[[Global Education Committee - Application 5|Marc Chisinevski]]&amp;lt;br&amp;gt;add [[Global Education Committee - Template|more]], if needed &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 2|'''Lucas C. Ferreira''']]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 3|'''John Wilander''']] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Neil_matatall '''Neil Matatall''']&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/Global_Conferences_Committee_-_Application_5 Ralph Durkee]&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/Global_Conferences_Committee_-_Application_6 Cassio Goldschmidt]&amp;lt;br&amp;gt;add [[Global Conferences Committee - Template|more]], if needed &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Industry Committee - Application 1|'''Colin Watson''']]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 2|'''Alexander Fry''']]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 3|'''Yiannis Pavlosoglou''']]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 4|'''Joe Bernik''']]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 5|'''Lorna Alamri''']]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 6|Applicant 6]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 7|Applicant 7]]&amp;lt;br&amp;gt;add [[Global Industry Committee - Template|more]], if needed &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;br&amp;gt;'''[[Global Chapter Committee - Application 2|Matthew Chalmers]]'''&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 3|Applicant 3]]&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global Chpaters Committee - Template|more]], if needed &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;br&amp;gt;'''[[OWASP Connections Committee - Application 1|Lorna Alamri]]'''&amp;lt;br&amp;gt;[[OWASP Connections Committee - Application 2|'''Robert Hansen''']]&amp;lt;br&amp;gt;[[OWASP Connections Committee - Application 3|'''Justin Clarke''']]&amp;lt;br&amp;gt;[[OWASP Connections Committee - Application 4|'''Jim Manico''']]&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/Neil_matatall '''Neil Matatall''']&amp;lt;br&amp;gt;[[OWASP Connections Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[OWASP Connections Committee - Template|more]], if needed&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== MEMBERS WITH OWASP SUMMIT'S APPROVAL  ===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 90%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); -moz-background-inline-policy: continuous; color: white;&amp;quot; colspan=&amp;quot;7&amp;quot; | '''OWASP GLOBAL COMMITTEES - ELECTED AT THE OWASP SUMMIT 08'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | OWASP GLOBAL COMMITTEES &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Projects Committee|'''Projects''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Membership Committee|'''Membership''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Education Committee|'''Education''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Conferences Committee|'''Conferences''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Industry Committee|'''Industry''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Chapter Committee|'''Chapters''']]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | Current committee members &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[:User:Dinis.cruz|Dinis Cruz]] &lt;br /&gt;
*[[:Image:Image021-Jason Li.jpg|Jason Li]] &lt;br /&gt;
*[[:Image:Image019-Matt Tesauro.jpg|Matt Tesauro]] &lt;br /&gt;
*[[:Image:Image022-Leo Cavallari.jpg|Leo Cavallari]] &lt;br /&gt;
*[[:Image:Image020-Pravir Chandra.jpg|Pravir Chandra]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[:User:Brennan|Tom Brennan]] &lt;br /&gt;
*[[:Image:Image018-Dan Cornell.jpg|Dan Cornell]] &lt;br /&gt;
*[[:Image:Image017-Michael Coates.jpg|Michael Coates]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[User:Sdeleersnyder|Seba Deleersnyder]] &lt;br /&gt;
*[[:Image:Image007-Martin Knobloch.jpg|Martin Knobloch]] &lt;br /&gt;
*[[:Image:Image012-Mano Paul.jpg|Mano Paul]] &lt;br /&gt;
*[[:Image:Image008-Eduardo Neves.jpg|Eduardo Neves]] &lt;br /&gt;
*[[:Image:Image010-Kuai Hinjosa.jpg|Kuai Hinjosa]] &lt;br /&gt;
*[[:Image:Image011-Cecil Su.jpg|Cecil Su]] &lt;br /&gt;
*[[:Image:Image009-Fabio Cerullo.jpg|Fabio Cerullo]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[:User:Wichers|Dave Wichers]] &lt;br /&gt;
*[[:Image:Image005-Wayne Huang.jpg|Wayne Huang]] &lt;br /&gt;
*[[:Image:Image003-Steve Antoniewicz.jpg|Steve Antoniewicz]] &lt;br /&gt;
*[[:Image:Image004-Dhruv Soi.jpg|Dhruv Soi]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[:User:Brennan|Tom Brennan]] &lt;br /&gt;
*[[:Image:Image014 Rex Booth.jpg|Rex Booth]] &lt;br /&gt;
*[[:Image:Image016-Georg Hess.jpg|Georg Hess]] &lt;br /&gt;
*[[:Image:Image013-Eoin Keary.jpg|Eoin Keary]] &lt;br /&gt;
*[[:Image:Image015-David Campbell.jpg|David Campbell]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[User:Sdeleersnyder|Seba Deleersnyder]] &lt;br /&gt;
*[[:Image:Image002-Puneet Mehta.jpg|Puneet Mehta]] &lt;br /&gt;
*[[:Image:Image001-Wayne Huang.jpg|Wayne Huang]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Neil_matatall&amp;diff=91036</id>
		<title>Neil matatall</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Neil_matatall&amp;diff=91036"/>
				<updated>2010-10-08T00:15:40Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Neil Matatall&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | AppSecUS 2010 Conference Committee and founding member, OC&amp;amp;nbsp;Chapter Lead, ESAPI&amp;amp;nbsp;Contributor&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Global Conferences Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% white; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Mark Bristow &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | GCC Chair &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Niel did a great job with AppSec US 2010, his energy and commitment to OWASP would be a great addition to the committee.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Richard Greenberg &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | GCC&amp;amp;nbsp;Member &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | I worked together with Neil on the AppSec SoCal 2010 Global Conference Sept 2010. He did a great job, displaying excellent vision and delivery. His dedication was instrumental in the conference's sucess.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Cassio Goldschmidt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | LA chapter founder and AppSec USA 2010 co-chair.&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Because of the great job Neil did organizing AppSec academia, I approached him to organize AppSec USA 2010 with me. Later we added Tin and Richard to the team. Working with Neal was a great experience from begining to end. By now he is possibly one of the most experience conference organizers at OWASP.  Neil is definitely the right person to be part of this committee.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_5&amp;diff=89710</id>
		<title>Global Industry Committee - Application 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_5&amp;diff=89710"/>
				<updated>2010-09-21T05:49:05Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%&amp;quot; align=&amp;quot;center&amp;quot; border=&amp;quot;0&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #4058a0; color: white&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: #7b8abd; width: 25%&amp;quot; align=&amp;quot;center&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 85%&amp;quot; align=&amp;quot;left&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;Lorna Alamri&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: #7b8abd; width: 25%&amp;quot; align=&amp;quot;center&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 85%&amp;quot; align=&amp;quot;left&amp;quot; | OWASP MSP board, Connections&amp;amp;nbsp;Committee, Newsletter Editor&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: #7b8abd; width: 25%&amp;quot; align=&amp;quot;center&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 85%&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Global Industry Committee.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%&amp;quot; align=&amp;quot;center&amp;quot; border=&amp;quot;0&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: #4058a0; color: white&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: white; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
! style=&amp;quot;background: #7b8abd; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! style=&amp;quot;background: #7b8abd; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! style=&amp;quot;background: #7b8abd; color: white&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 3%&amp;quot; align=&amp;quot;center&amp;quot; | '''1''' &lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 20%&amp;quot; align=&amp;quot;center&amp;quot; | Konstantinos Papapanagiotou&lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 20%&amp;quot; align=&amp;quot;center&amp;quot; | Greek Chapter Leader&lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 57%&amp;quot; align=&amp;quot;center&amp;quot; | Excellent work editing the newsletter and also coordinating the translation teams.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 3%&amp;quot; align=&amp;quot;center&amp;quot; | '''2''' &lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 20%&amp;quot; align=&amp;quot;center&amp;quot; | Neil Matatall&lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 20%&amp;quot; align=&amp;quot;center&amp;quot; | OC Chapter Leader&lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 57%&amp;quot; align=&amp;quot;center&amp;quot; | good work with the newsletter, very personable, go getter, takes initiative, good marketing skills.  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 3%&amp;quot; align=&amp;quot;center&amp;quot; | '''3''' &lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 20%&amp;quot; align=&amp;quot;center&amp;quot; | Tin Zaw&lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 20%&amp;quot; align=&amp;quot;center&amp;quot; | Los Angeles Chapter Leader&lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 57%&amp;quot; align=&amp;quot;center&amp;quot; | Lorna has been very helpful to us, AppSec conference committee. She took initiative &lt;br /&gt;
and did a great job in promoting AppSec USA in the newsletters. She is a great communicator and an excellent people-person.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 3%&amp;quot; align=&amp;quot;center&amp;quot; | '''4''' &lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 20%&amp;quot; align=&amp;quot;center&amp;quot; | Cassio Goldschmidt&lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 20%&amp;quot; align=&amp;quot;center&amp;quot; | Los Angeles Chapter Founder, AppSec USA 2010 co-chair&lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 57%&amp;quot; align=&amp;quot;center&amp;quot; | As an OWASP MSP board member, Lorna helped to create one of the most well run chapters in the country. Lorna is dedicated, personable and passionate about OWASP. She makes me have high expectations about OWASP AppSec USA 2011.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 3%&amp;quot; align=&amp;quot;center&amp;quot; | '''5''' &lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 20%&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 20%&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;background: #cccccc; width: 57%&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88828</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88828"/>
				<updated>2010-09-07T22:00:27Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Welcome to AppSec&amp;amp;nbsp;USA 2010 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|598x79px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(238, 235, 226); color: black;&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang.'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Dave Wichers: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn how to use the latest Samurai-WTF open source tools and the be shown the latest techniques to perform web application assessments. After a quick overview of pen testing methodology, the instructor will lead you through the penetration and exploitation of three different web applications, and the browsers connecting to them. Different sets of open source tools will be used on each web application, allow you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a fourth web application that contains keys you must find and collect. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence necessary to perform web application assessments and expose you to the wealth of freely available open source tools. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Instructor: Justin Searle: InGuardians [[Image:InGuardians.png|36x39px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Jeff Williams: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class will will cover the full range of tools and documentation that OWASP provides under free and open licenses. When the class is complete, students will be familiar with a wide range of tools and techniques to test web applications. &lt;br /&gt;
The class will include a DVD of OWASP tools and documentation for testing web applications. Additionally, the DVD will include the OWASP Web Testing Environment. OWASP WTE is a collection of tools and documentation for testing web applications available both as a bootable Live CD and virtual machines. Attendees to this class will receive a customized version of OWASP WTE. It will be provided as a virtual machine which includes the tools, documentation and the applications tested during class. It is a self-contained environment to learn web application testing the students can take from class to further hone their testing skills. &lt;br /&gt;
&lt;br /&gt;
Students are encouraged to bring a laptop to class. The virtualization software for OWASP WTE runs on Windows, OS X and Linux. Students with a laptop can follow along with the in class demonstrations to get hands on testing experience &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Instructors: Matt Tesauro and Charles Henderson: [[Image:TrustwaveLogo.jpg]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 07:30-08:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-08:45 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:45-9:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 9:30-10:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:15-10:35 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF kick-off (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:35-11:20 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Panel Discussion: Characterizing Software Security as a Mainstream Business Risk – How to talk to other CXO’s about Software Security&amp;lt;br&amp;gt;John Dickson - Principal, Denim Group (moderator)&amp;lt;br&amp;gt;Tom Brennan - CEO Proactive Risk, OWASP Board Member&amp;lt;br&amp;gt;Ed Pagett, CISO, Lender Processing Services&amp;lt;br&amp;gt;Richard Greenberg, Information Security Officer, Los Angeles County Department of Public Health&amp;lt;br&amp;gt; John Sapp - IT Governance, Risk &amp;amp;amp; Compliance Manager, McKesson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:20-11:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:15-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:15-14:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:25-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs &amp;amp;amp; Michael Anderson, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:30-16:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Tour of OWASP Projects,&amp;lt;br&amp;gt; ''Dinis Cruz, OWASP'' &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Using the OWASP O2 Platform, &amp;lt;br&amp;gt;''Dinis Cruz, OWASP'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:15-16:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:25-17:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen. Moderator: Stuart Schwartz&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 17:10-17:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Mozilla Announcment: Content Security Policy&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 17:30-18:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 18:00-21:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Networking Event (Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:15-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:00-10:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:55-11:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:15-12:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:15-14:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:05-14:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | ''Panel Discussion: Vulnerability Lifecycle for Software Vendors&amp;lt;br&amp;gt;&lt;br /&gt;
Edward Bonver - Principal Software Engineer, Symantec (moderator)&amp;lt;br&amp;gt;&lt;br /&gt;
Kelly FitzGerald, Senior Vulnerability Analyst, Symantec&amp;lt;br&amp;gt;&lt;br /&gt;
Katie Moussouris, Senior Security Strategist, Microsoft&amp;lt;br&amp;gt;&lt;br /&gt;
John Steven, Senior Director, Cigital &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Holden,  Director, DVLabs, HP, TippingPoint&amp;lt;br&amp;gt;&lt;br /&gt;
'' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:50-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Panel Discussion: Defining the Identity Management Framework, ''&lt;br /&gt;
Barbara Danzi, Garda Cash Logistics (moderator)&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Tychansky, Lockheed Martin&amp;lt;br&amp;gt;&lt;br /&gt;
Jeff Williams, Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
Hord Tipton, (ISC)²&amp;lt;br&amp;gt;&lt;br /&gt;
Mano Paul, SecuRisk Solutions&amp;lt;br&amp;gt;&lt;br /&gt;
''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:55-16:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:05-16:50 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&amp;amp;nbsp;(Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Gold Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Ibmneg blurgb.jpg|140x65px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Fortify logo AppSec Research 2010.png|139x43px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:TrustwaveLogo.jpg]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Veracode.gif|140x65px]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Silver Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Fishnet Logo AppSec.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Acunetix logo 200.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Barracuda Color Logo.jpg]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Cenziclogo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Cigital-hor-color.JPG|120x65px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fujitsu-red-opt-b-150x56.gif|150x56px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Netspi logo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Whitehat security logo.gif]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Imperva Logo.gif]]&amp;lt;br&amp;gt;[[Image:Aspect logo owasp.jpg|153x44px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:AppSecDC2009-Sponsor-aod.gif]]&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Mavituna.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Sponsors-radware.jpg]] &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Denim Group Logo.gif|133x61px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:Rapid7.png|229x40px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Organizational Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Eccouncil.jpg|759x59px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:ISSA-LA icon.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;[[Image:ISSA-OC.jpg|179x57px]] &lt;br /&gt;
&lt;br /&gt;
===  ===&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88821</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88821"/>
				<updated>2010-09-07T19:00:03Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Welcome to AppSec&amp;amp;nbsp;USA 2010 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|598x79px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(238, 235, 226); color: black;&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang.'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Dave Wichers: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn how to use the latest Samurai-WTF open source tools and the be shown the latest techniques to perform web application assessments. After a quick overview of pen testing methodology, the instructor will lead you through the penetration and exploitation of three different web applications, and the browsers connecting to them. Different sets of open source tools will be used on each web application, allow you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a fourth web application that contains keys you must find and collect. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence necessary to perform web application assessments and expose you to the wealth of freely available open source tools. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Instructor: Justin Searle: InGuardians [[Image:InGuardians.png|36x39px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Jeff Williams: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class will will cover the full range of tools and documentation that OWASP provides under free and open licenses. When the class is complete, students will be familiar with a wide range of tools and techniques to test web applications. &lt;br /&gt;
The class will include a DVD of OWASP tools and documentation for testing web applications. Additionally, the DVD will include the OWASP Web Testing Environment. OWASP WTE is a collection of tools and documentation for testing web applications available both as a bootable Live CD and virtual machines. Attendees to this class will receive a customized version of OWASP WTE. It will be provided as a virtual machine which includes the tools, documentation and the applications tested during class. It is a self-contained environment to learn web application testing the students can take from class to further hone their testing skills. &lt;br /&gt;
&lt;br /&gt;
Students are encouraged to bring a laptop to class. The virtualization software for OWASP WTE runs on Windows, OS X and Linux. Students with a laptop can follow along with the in class demonstrations to get hands on testing experience &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Instructors: Matt Tesauro and Charles Henderson: [[Image:TrustwaveLogo.jpg]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 07:30-08:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-08:45 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:45-9:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 9:30-10:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:15-10:35 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF kick-off (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:35-11:20 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Panel Discussion: Characterizing Software Security as a Mainstream Business Risk – How to talk to other CXO’s about Software Security&amp;lt;br&amp;gt;John Dickson - Principal, Denim Group (moderator)&amp;lt;br&amp;gt;Tom Brennan - CEO Proactive Risk, OWASP Board Member&amp;lt;br&amp;gt;Ed Pagett, CISO, Lender Processing Services&amp;lt;br&amp;gt;Richard Greenberg, Information Security Officer, Los Angeles County Department of Public Health&amp;lt;br&amp;gt; John Sapp - IT Governance, Risk &amp;amp;amp; Compliance Manager, McKesson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:20-11:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:15-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:15-14:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:25-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs &amp;amp;amp; Michael Anderson, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:30-16:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Tour of OWASP Projects,&amp;lt;br&amp;gt; ''Dinis Cruz, OWASP'' &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Using the OWASP O2 Platform, &amp;lt;br&amp;gt;''Dinis Cruz, OWASP'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:15-16:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:25-17:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen. Moderator: Stuart Schwartz&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 17:10-17:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Mozilla Announcent: Content Security Policy&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 17:30-18:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 18:00-21:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Networking Event (Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:15-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:00-10:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:55-11:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:15-12:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:15-14:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:05-14:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | ''Panel Discussion: Vulnerability Lifecycle for Software Vendors&amp;lt;br&amp;gt;&lt;br /&gt;
Edward Bonver - Principal Software Engineer, Symantec (moderator)&amp;lt;br&amp;gt;&lt;br /&gt;
Kelly FitzGerald, Senior Vulnerability Analyst, Symantec&amp;lt;br&amp;gt;&lt;br /&gt;
Katie Moussouris, Senior Security Strategist, Microsoft&amp;lt;br&amp;gt;&lt;br /&gt;
John Steven, Senior Director, Cigital &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Holden,  Director, DVLabs, HP, TippingPoint&amp;lt;br&amp;gt;&lt;br /&gt;
'' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:50-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Panel Discussion: Defining the Identity Management Framework, ''&lt;br /&gt;
Barbara Danzi, Garda Cash Logistics (moderator)&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Tychansky, Lockheed Martin&amp;lt;br&amp;gt;&lt;br /&gt;
Jeff Williams, Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
Hord Tipton, (ISC)²&amp;lt;br&amp;gt;&lt;br /&gt;
''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:55-16:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:05-16:50 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&amp;amp;nbsp;(Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Gold Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Ibmneg blurgb.jpg|140x65px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Fortify logo AppSec Research 2010.png|139x43px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:TrustwaveLogo.jpg]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Veracode.gif|140x65px]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Silver Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Fishnet Logo AppSec.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Acunetix logo 200.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Barracuda Color Logo.jpg]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Cenziclogo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Cigital-hor-color.JPG|120x65px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fujitsu-red-opt-b-150x56.gif|150x56px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Netspi logo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Whitehat security logo.gif]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Imperva Logo.gif]]&amp;lt;br&amp;gt;[[Image:Aspect logo owasp.jpg|153x44px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:AppSecDC2009-Sponsor-aod.gif]]&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Mavituna.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Sponsors-radware.jpg]] &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Denim Group Logo.gif|133x61px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:Rapid7.png|229x40px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Organizational Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Eccouncil.jpg|759x59px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:ISSA-LA icon.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;[[Image:ISSA-OC.jpg|179x57px]] &lt;br /&gt;
&lt;br /&gt;
===  ===&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88820</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88820"/>
				<updated>2010-09-07T18:54:13Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Welcome to AppSec&amp;amp;nbsp;USA 2010 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|598x79px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(238, 235, 226); color: black;&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang.'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Dave Wichers: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn how to use the latest Samurai-WTF open source tools and the be shown the latest techniques to perform web application assessments. After a quick overview of pen testing methodology, the instructor will lead you through the penetration and exploitation of three different web applications, and the browsers connecting to them. Different sets of open source tools will be used on each web application, allow you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a fourth web application that contains keys you must find and collect. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence necessary to perform web application assessments and expose you to the wealth of freely available open source tools. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Instructor: Justin Searle: InGuardians [[Image:InGuardians.png|36x39px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Jeff Williams: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class will will cover the full range of tools and documentation that OWASP provides under free and open licenses. When the class is complete, students will be familiar with a wide range of tools and techniques to test web applications. &lt;br /&gt;
The class will include a DVD of OWASP tools and documentation for testing web applications. Additionally, the DVD will include the OWASP Web Testing Environment. OWASP WTE is a collection of tools and documentation for testing web applications available both as a bootable Live CD and virtual machines. Attendees to this class will receive a customized version of OWASP WTE. It will be provided as a virtual machine which includes the tools, documentation and the applications tested during class. It is a self-contained environment to learn web application testing the students can take from class to further hone their testing skills. &lt;br /&gt;
&lt;br /&gt;
Students are encouraged to bring a laptop to class. The virtualization software for OWASP WTE runs on Windows, OS X and Linux. Students with a laptop can follow along with the in class demonstrations to get hands on testing experience &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Instructors: Matt Tesauro and Charles Henderson: [[Image:TrustwaveLogo.jpg]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 07:30-08:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-08:45 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:45-9:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 9:30-10:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:15-10:35 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF kick-off (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:35-11:20 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Panel Discussion: Characterizing Software Security as a Mainstream Business Risk – How to talk to other CXO’s about Software Security&amp;lt;br&amp;gt;John Dickson - Principal, Denim Group (moderator)&amp;lt;br&amp;gt;Tom Brennan - CEO Proactive Risk, OWASP Board Member&amp;lt;br&amp;gt;Ed Pagett, CISO, Lender Processing Services&amp;lt;br&amp;gt;Richard Greenberg, Information Security Officer, Los Angeles County Department of Public Health&amp;lt;br&amp;gt; John Sapp - IT Governance, Risk &amp;amp;amp; Compliance Manager, McKesson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:20-11:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:15-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:15-14:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:25-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs &amp;amp;amp; Michael Anderson, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:30-16:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Tour of OWASP Projects,&amp;lt;br&amp;gt; ''Dinis Cruz, OWASP'' &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Using the OWASP O2 Platform, &amp;lt;br&amp;gt;''Dinis Cruz, OWASP'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:15-16:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:25-17:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen. Moderator: Stuart Schwartz&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 17:10-17:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Mozilla Announcent: Content Security Policy&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 17:30-18:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 18:00-21:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Networking Event (Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:15-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:00-10:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:55-11:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:15-12:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:15-14:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:05-14:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | ''Panel Discussion: Vulnerability Lifecycle for Software Vendors&amp;lt;br&amp;gt;&lt;br /&gt;
Edward Bonver - Principal Software Engineer, Symantec (moderator)&amp;lt;br&amp;gt;&lt;br /&gt;
Kelly FitzGerald, Senior Vulnerability Analyst, Symantec&amp;lt;br&amp;gt;&lt;br /&gt;
Katie Moussouris, Senior Security Strategist, Microsoft&amp;lt;br&amp;gt;&lt;br /&gt;
John Steven, Senior Director, Cigital &amp;lt;br&amp;gt;&lt;br /&gt;
Daniel Holden,  Director, DVLabs, HP, TippingPoint&amp;lt;br&amp;gt;&lt;br /&gt;
'' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:50-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Defining the Identity Management Framework, ''Moderator: Barbara Danzi, Garda Cash Logistics, Richard Tychansky, Lockheed Martin, Jeff Williams,&amp;amp;nbsp;Aspect Security, and Hord Tipton, (ISC)². ''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:55-16:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:05-16:50 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&amp;amp;nbsp;(Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Gold Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Ibmneg blurgb.jpg|140x65px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Fortify logo AppSec Research 2010.png|139x43px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:TrustwaveLogo.jpg]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Veracode.gif|140x65px]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Silver Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Fishnet Logo AppSec.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Acunetix logo 200.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Barracuda Color Logo.jpg]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Cenziclogo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Cigital-hor-color.JPG|120x65px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fujitsu-red-opt-b-150x56.gif|150x56px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Netspi logo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Whitehat security logo.gif]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Imperva Logo.gif]]&amp;lt;br&amp;gt;[[Image:Aspect logo owasp.jpg|153x44px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:AppSecDC2009-Sponsor-aod.gif]]&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Mavituna.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Sponsors-radware.jpg]] &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Denim Group Logo.gif|133x61px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:Rapid7.png|229x40px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Organizational Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Eccouncil.jpg|759x59px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:ISSA-LA icon.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;[[Image:ISSA-OC.jpg|179x57px]] &lt;br /&gt;
&lt;br /&gt;
===  ===&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88819</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88819"/>
				<updated>2010-09-07T18:38:51Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Welcome to AppSec&amp;amp;nbsp;USA 2010 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|598x79px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(238, 235, 226); color: black;&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang.'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Dave Wichers: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn how to use the latest Samurai-WTF open source tools and the be shown the latest techniques to perform web application assessments. After a quick overview of pen testing methodology, the instructor will lead you through the penetration and exploitation of three different web applications, and the browsers connecting to them. Different sets of open source tools will be used on each web application, allow you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a fourth web application that contains keys you must find and collect. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence necessary to perform web application assessments and expose you to the wealth of freely available open source tools. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Instructor: Justin Searle: InGuardians [[Image:InGuardians.png|36x39px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Jeff Williams: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class will will cover the full range of tools and documentation that OWASP provides under free and open licenses. When the class is complete, students will be familiar with a wide range of tools and techniques to test web applications. &lt;br /&gt;
The class will include a DVD of OWASP tools and documentation for testing web applications. Additionally, the DVD will include the OWASP Web Testing Environment. OWASP WTE is a collection of tools and documentation for testing web applications available both as a bootable Live CD and virtual machines. Attendees to this class will receive a customized version of OWASP WTE. It will be provided as a virtual machine which includes the tools, documentation and the applications tested during class. It is a self-contained environment to learn web application testing the students can take from class to further hone their testing skills. &lt;br /&gt;
&lt;br /&gt;
Students are encouraged to bring a laptop to class. The virtualization software for OWASP WTE runs on Windows, OS X and Linux. Students with a laptop can follow along with the in class demonstrations to get hands on testing experience &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Instructors: Matt Tesauro and Charles Henderson: [[Image:TrustwaveLogo.jpg]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 07:30-08:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-08:45 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:45-9:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 9:30-10:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:15-10:35 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF kick-off (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:35-11:20 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Panel Discussion: Characterizing Software Security as a Mainstream Business Risk – How to talk to other CXO’s about Software Security&amp;lt;br&amp;gt;John Dickson - Principal, Denim Group (moderator)&amp;lt;br&amp;gt;Tom Brennan - CEO Proactive Risk, OWASP Board Member&amp;lt;br&amp;gt;Ed Pagett, CISO, Lender Processing Services&amp;lt;br&amp;gt;Richard Greenberg, Information Security Officer, Los Angeles County Department of Public Health&amp;lt;br&amp;gt; John Sapp - IT Governance, Risk &amp;amp;amp; Compliance Manager, McKesson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:20-11:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:15-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:15-14:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:25-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs &amp;amp;amp; Michael Anderson, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:30-16:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Tour of OWASP Projects,&amp;lt;br&amp;gt; ''Dinis Cruz, OWASP'' &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Using the OWASP O2 Platform, &amp;lt;br&amp;gt;''Dinis Cruz, OWASP'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:15-16:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:25-17:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen. Moderator: Stuart Schwartz&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 17:10-17:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Mozilla Announcent: Content Security Policy&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 17:30-18:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 18:00-21:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Networking Event (Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:15-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:00-10:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:55-11:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:15-12:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:15-14:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:05-14:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | ''Panel Discussion: Vulnerability Lifecycle for Software Vendors&amp;lt;br&amp;gt;Symantec – Kelly FitzGerald&amp;lt;br&amp;gt;Senior Vulnerability Analyst&amp;lt;br&amp;gt;Microsoft – Katie Moussouris&amp;lt;br&amp;gt;Senior Security Strategist&amp;lt;br&amp;gt;Cigital – John Steven&amp;lt;br&amp;gt;Senior Director&amp;lt;br&amp;gt;HP, TippingPoint -Daniel Holden&amp;lt;br&amp;gt;Director, DVLabs&amp;lt;br&amp;gt;Symantec – Edward Bonver''&amp;lt;br&amp;gt;''Principal Software Engineer (moderator)'' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:50-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Defining the Identity Management Framework, ''Moderator: Barbara Danzi, Garda Cash Logistics, Richard Tychansky, Lockheed Martin, Jeff Williams,&amp;amp;nbsp;Aspect Security, and Hord Tipton, (ISC)². ''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:55-16:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:05-16:50 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&amp;amp;nbsp;(Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Gold Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Ibmneg blurgb.jpg|140x65px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Fortify logo AppSec Research 2010.png|139x43px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:TrustwaveLogo.jpg]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Veracode.gif|140x65px]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Silver Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Fishnet Logo AppSec.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Acunetix logo 200.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Barracuda Color Logo.jpg]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Cenziclogo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Cigital-hor-color.JPG|120x65px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fujitsu-red-opt-b-150x56.gif|150x56px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Netspi logo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Whitehat security logo.gif]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Imperva Logo.gif]]&amp;lt;br&amp;gt;[[Image:Aspect logo owasp.jpg|153x44px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:AppSecDC2009-Sponsor-aod.gif]]&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Mavituna.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Sponsors-radware.jpg]] &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Denim Group Logo.gif|133x61px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:Rapid7.png|229x40px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Organizational Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Eccouncil.jpg|759x59px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:ISSA-LA icon.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;[[Image:ISSA-OC.jpg|179x57px]] &lt;br /&gt;
&lt;br /&gt;
===  ===&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88818</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88818"/>
				<updated>2010-09-07T18:36:58Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Welcome to AppSec&amp;amp;nbsp;USA 2010 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|598x79px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(238, 235, 226); color: black;&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang.'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Dave Wichers: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn how to use the latest Samurai-WTF open source tools and the be shown the latest techniques to perform web application assessments. After a quick overview of pen testing methodology, the instructor will lead you through the penetration and exploitation of three different web applications, and the browsers connecting to them. Different sets of open source tools will be used on each web application, allow you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a fourth web application that contains keys you must find and collect. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence necessary to perform web application assessments and expose you to the wealth of freely available open source tools. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Instructor: Justin Searle: InGuardians [[Image:InGuardians.png|36x39px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Jeff Williams: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class will will cover the full range of tools and documentation that OWASP provides under free and open licenses. When the class is complete, students will be familiar with a wide range of tools and techniques to test web applications. &lt;br /&gt;
The class will include a DVD of OWASP tools and documentation for testing web applications. Additionally, the DVD will include the OWASP Web Testing Environment. OWASP WTE is a collection of tools and documentation for testing web applications available both as a bootable Live CD and virtual machines. Attendees to this class will receive a customized version of OWASP WTE. It will be provided as a virtual machine which includes the tools, documentation and the applications tested during class. It is a self-contained environment to learn web application testing the students can take from class to further hone their testing skills. &lt;br /&gt;
&lt;br /&gt;
Students are encouraged to bring a laptop to class. The virtualization software for OWASP WTE runs on Windows, OS X and Linux. Students with a laptop can follow along with the in class demonstrations to get hands on testing experience &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Instructors: Matt Tesauro and Charles Henderson: [[Image:TrustwaveLogo.jpg]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 07:30-08:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-08:45 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:45-9:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 9:30-10:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:15-10:35 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF kick-off (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:35-11:20 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Panel Discussion: Characterizing Software Security as a Mainstream Business Risk – How to talk to other CXO’s about Software Security&amp;lt;br&amp;gt;John Dickson - Principal, Denim Group (moderator)&amp;lt;br&amp;gt;Tom Brennan - CEO Proactive Risk, OWASP Board Member&amp;lt;br&amp;gt;Ed Pagett, CISO, Lender Processing Services&amp;lt;br&amp;gt;Richard Greenberg, Information Security Officer, Los Angeles County Department of Public Health&amp;lt;br&amp;gt; John Sapp - IT Governance, Risk &amp;amp;amp; Compliance Manager, McKesson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:20-11:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:15-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:15-14:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:25-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs &amp;amp;amp; Michael Anderson, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:30-16:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Tour of OWASP Projects,&amp;lt;br&amp;gt; ''Dinis Cruz, OWASP'' &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Using the OWASP O2 Platform, &amp;lt;br&amp;gt;''Dinis Cruz, OWASP'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:15-16:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:25-17:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen. Moderator: Stuart Schwartz&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 17:10-17:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Mozzila Announcent: Content Security Policy&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 17:30-18:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 18:00-21:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Networking Event (Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:15-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:00-10:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:55-11:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:15-12:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:15-14:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:05-14:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | ''Panel Discussion: Vulnerability Lifecycle for Software Vendors&amp;lt;br&amp;gt;Symantec – Kelly FitzGerald&amp;lt;br&amp;gt;Senior Vulnerability Analyst&amp;lt;br&amp;gt;Microsoft – Katie Moussouris&amp;lt;br&amp;gt;Senior Security Strategist&amp;lt;br&amp;gt;Cigital – John Steven&amp;lt;br&amp;gt;Senior Director&amp;lt;br&amp;gt;HP, TippingPoint -Daniel Holden&amp;lt;br&amp;gt;Director, DVLabs&amp;lt;br&amp;gt;Symantec – Edward Bonver''&amp;lt;br&amp;gt;''Principal Software Engineer (moderator)'' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:50-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Defining the Identity Management Framework, ''Moderator: Barbara Danzi, Garda Cash Logistics, Richard Tychansky, Lockheed Martin, Jeff Williams,&amp;amp;nbsp;Aspect Security, and Hord Tipton, (ISC)². ''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:55-16:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:05-16:50 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&amp;amp;nbsp;(Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Gold Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Ibmneg blurgb.jpg|140x65px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Fortify logo AppSec Research 2010.png|139x43px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:TrustwaveLogo.jpg]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Veracode.gif|140x65px]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Silver Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Fishnet Logo AppSec.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Acunetix logo 200.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Barracuda Color Logo.jpg]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Cenziclogo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Cigital-hor-color.JPG|120x65px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fujitsu-red-opt-b-150x56.gif|150x56px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Netspi logo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Whitehat security logo.gif]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Imperva Logo.gif]]&amp;lt;br&amp;gt;[[Image:Aspect logo owasp.jpg|153x44px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:AppSecDC2009-Sponsor-aod.gif]]&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Mavituna.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Sponsors-radware.jpg]] &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Denim Group Logo.gif|133x61px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:Rapid7.png|229x40px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Organizational Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Eccouncil.jpg|759x59px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:ISSA-LA icon.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;[[Image:ISSA-OC.jpg|179x57px]] &lt;br /&gt;
&lt;br /&gt;
===  ===&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88696</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88696"/>
				<updated>2010-09-05T01:01:23Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Welcome to AppSec&amp;amp;nbsp;USA 2010 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|598x79px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(238, 235, 226); color: black;&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang.'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Dave Wichers: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn how to use the latest Samurai-WTF open source tools and the be shown the latest techniques to perform web application assessments. After a quick overview of pen testing methodology, the instructor will lead you through the penetration and exploitation of three different web applications, and the browsers connecting to them. Different sets of open source tools will be used on each web application, allow you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a fourth web application that contains keys you must find and collect. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence necessary to perform web application assessments and expose you to the wealth of freely available open source tools. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Instructor: Justin Searle: InGuardians [[Image:InGuardians.png|36x39px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Jeff Williams: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class will will cover the full range of tools and documentation that OWASP provides under free and open licenses. When the class is complete, students will be familiar with a wide range of tools and techniques to test web applications. &lt;br /&gt;
The class will include a DVD of OWASP tools and documentation for testing web applications. Additionally, the DVD will include the OWASP Web Testing Environment. OWASP WTE is a collection of tools and documentation for testing web applications available both as a bootable Live CD and virtual machines. Attendees to this class will receive a customized version of OWASP WTE. It will be provided as a virtual machine which includes the tools, documentation and the applications tested during class. It is a self-contained environment to learn web application testing the students can take from class to further hone their testing skills. &lt;br /&gt;
&lt;br /&gt;
Students are encouraged to bring a laptop to class. The virtualization software for OWASP WTE runs on Windows, OS X and Linux. Students with a laptop can follow along with the in class demonstrations to get hands on testing experience &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Instructors: Matt Tesauro and Charles Henderson: [[Image:TrustwaveLogo.jpg]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 07:30-08:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-08:45 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:45-9:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 9:30-10:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:15-10:35 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF kick-off (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:35-11:20 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Panel Discussion: Characterizing Software Security as a Mainstream Business Risk – How to talk to other CXO’s about Software Security&amp;lt;br&amp;gt;John Dickson - Principal, Denim Group (moderator)&amp;lt;br&amp;gt;Tom Brennan - CEO Proactive Risk, OWASP Board Member&amp;lt;br&amp;gt;Ed Pagett, CISO, Lender Processing Services&amp;lt;br&amp;gt;Richard Greenberg, Information Security Officer, Los Angeles County Department of Public Health&amp;lt;br&amp;gt; John Sapp - IT Governance, Risk &amp;amp;amp; Compliance Manager, McKesson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:20-11:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:15-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:15-14:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:25-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs &amp;amp;amp; Michael Anderson, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:30-16:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Tour of OWASP Projects,&amp;lt;br&amp;gt; ''Dinis Cruz, OWASP'' &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Using the OWASP O2 Platform, &amp;lt;br&amp;gt;''Dinis Cruz, OWASP'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:15-16:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:25-17:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen. Moderator: Stuart Schwartz&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 17:10-18:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 18:00-21:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Networking Event (Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:15-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:00-10:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:55-11:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:15-12:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:15-14:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:05-14:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | ''Panel Discussion: Vulnerability Lifecycle for Software Vendors&amp;lt;br&amp;gt;Symantec – Kelly FitzGerald&amp;lt;br&amp;gt;Senior Vulnerability Analyst&amp;lt;br&amp;gt;Microsoft – Katie Moussouris&amp;lt;br&amp;gt;Senior Security Strategist&amp;lt;br&amp;gt;Cigital – John Stephen&amp;lt;br&amp;gt;Senior Director&amp;lt;br&amp;gt;HP, TippingPoint -Daniel Holden&amp;lt;br&amp;gt;Director, DVLabs&amp;lt;br&amp;gt;Symantec – Edward Bonver''&amp;lt;br&amp;gt;''Principal Software Engineer (moderator)'' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:50-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Defining the Identity Management Framework, ''Moderator: Barbara Danzi, Garda Cash Logistics, Richard Tychansky, Lockheed Martin, Jeff Williams,&amp;amp;nbsp;Aspect Security, and Hord Tipton, (ISC)². ''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:55-16:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:05-16:50 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&amp;amp;nbsp;(Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Gold Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Ibmneg blurgb.jpg|140x65px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Fortify logo AppSec Research 2010.png|139x43px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:TrustwaveLogo.jpg]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Veracode.gif|140x65px]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Silver Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Fishnet Logo AppSec.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Acunetix logo 200.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Barracuda Color Logo.jpg]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Cenziclogo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Cigital-hor-color.JPG|120x65px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fujitsu-red-opt-b-150x56.gif|150x56px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Netspi logo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Whitehat security logo.gif]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Imperva Logo.gif]]&amp;lt;br&amp;gt;[[Image:Aspect logo owasp.jpg|153x44px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:AppSecDC2009-Sponsor-aod.gif]]&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Mavituna.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Sponsors-radware.jpg]] &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Denim Group Logo.gif|133x61px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:Rapid7.png|229x40px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Organizational Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Eccouncil.jpg|759x59px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:ISSA-LA icon.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;[[Image:ISSA-OC.jpg|179x57px]] &lt;br /&gt;
&lt;br /&gt;
===  ===&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88688</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88688"/>
				<updated>2010-09-04T02:24:47Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Welcome to AppSec&amp;amp;nbsp;USA 2010 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|598x79px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(238, 235, 226); color: black;&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang.'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Dave Wichers: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn how to use the latest Samurai-WTF open source tools and the be shown the latest techniques to perform web application assessments. After a quick overview of pen testing methodology, the instructor will lead you through the penetration and exploitation of three different web applications, and the browsers connecting to them. Different sets of open source tools will be used on each web application, allow you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a fourth web application that contains keys you must find and collect. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence necessary to perform web application assessments and expose you to the wealth of freely available open source tools. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Instructor: Justin Searle: InGuardians [[Image:InGuardians.png|36x39px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Jeff Williams: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class will will cover the full range of tools and documentation that OWASP provides under free and open licenses. When the class is complete, students will be familiar with a wide range of tools and techniques to test web applications. &lt;br /&gt;
The class will include a DVD of OWASP tools and documentation for testing web applications. Additionally, the DVD will include the OWASP Web Testing Environment. OWASP WTE is a collection of tools and documentation for testing web applications available both as a bootable Live CD and virtual machines. Attendees to this class will receive a customized version of OWASP WTE. It will be provided as a virtual machine which includes the tools, documentation and the applications tested during class. It is a self-contained environment to learn web application testing the students can take from class to further hone their testing skills. &lt;br /&gt;
&lt;br /&gt;
Students are encouraged to bring a laptop to class. The virtualization software for OWASP WTE runs on Windows, OS X and Linux. Students with a laptop can follow along with the in class demonstrations to get hands on testing experience &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Instructors: Matt Tesauro and Charles Henderson: [[Image:TrustwaveLogo.jpg]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 07:30-08:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-08:45 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:45-9:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 9:30-10:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:15-10:35 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF kick-off (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:35-11:20 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Panel Discussion: Characterizing Software Security as a Mainstream Business Risk – How to talk to other CXO’s about Software Security&amp;lt;br&amp;gt;John Dickson - Principal, Denim Group (moderator)&amp;lt;br&amp;gt;Tom Brennan - CEO Proactive Risk, OWASP Board Member&amp;lt;br&amp;gt;Ed Pagett, CISO, Lender Processing Services&amp;lt;br&amp;gt;Richard Greenberg, Information Security Officer, Los Angeles County Department of Public Health&amp;lt;br&amp;gt; John Sapp - IT Governance, Risk &amp;amp;amp; Compliance Manager, McKesson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:20-11:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:15-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:15-14:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:25-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs &amp;amp;amp; Michael Anderson, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:30-16:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Tour of OWASP Projects,&amp;lt;br&amp;gt; ''Dinis Cruz, OWASP'' &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Using the OWASP O2 Platform, &amp;lt;br&amp;gt;''Dinis Cruz, OWASP'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:15-16:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:25-17:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen. Moderator: Stuart Schwartz&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 17:10-18:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 18:00-21:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Networking Event (Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:15-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:00-10:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:55-11:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:15-12:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:15-14:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:05-14:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | ''Panel Discussion: Vulnerability Lifecycle for Software Vendors&amp;lt;br&amp;gt;Symantec – Kelly FitzGerald&amp;lt;br&amp;gt;Senior Vulnerability Analyst&amp;lt;br&amp;gt;Microsoft – Katie Moussouris&amp;lt;br&amp;gt;Senior Security Strategist&amp;lt;br&amp;gt;Cigital – John Stephen&amp;lt;br&amp;gt;Senior Director&amp;lt;br&amp;gt;HP, TippingPoint -Daniel Holden&amp;lt;br&amp;gt;Director, DVLabs&amp;lt;br&amp;gt;Symantec – Edward Bonver''&amp;lt;br&amp;gt;''Principal Software Engineer (moderator)'' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:50-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Defining the Identiy Management Framework, ''Moderator: Barbara Danzi, Garda Cash Logistics, Richard Tychansky, Lockheed Martin, Jeff Williams,&amp;amp;nbsp;Aspect Security, and Hord Tipton, (ISC)². ''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:55-16:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:05-16:50 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&amp;amp;nbsp;(Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Gold Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Ibmneg blurgb.jpg|140x65px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Fortify logo AppSec Research 2010.png|139x43px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:TrustwaveLogo.jpg]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Veracode.gif|140x65px]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Silver Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Fishnet Logo AppSec.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Acunetix logo 200.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Barracuda Color Logo.jpg]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Cenziclogo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Cigital-hor-color.JPG|120x65px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fujitsu-red-opt-b-150x56.gif|150x56px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Netspi logo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Whitehat security logo.gif]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Imperva Logo.gif]]&amp;lt;br&amp;gt;[[Image:Aspect logo owasp.jpg|153x44px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:AppSecDC2009-Sponsor-aod.gif]]&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Mavituna.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Sponsors-radware.jpg]] &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Denim Group Logo.gif|133x61px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:Rapid7.png|229x40px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Organizational Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Eccouncil.jpg|759x59px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:ISSA-LA icon.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;[[Image:ISSA-OC.jpg|179x57px]] &lt;br /&gt;
&lt;br /&gt;
===  ===&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88687</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88687"/>
				<updated>2010-09-04T02:15:06Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Welcome to AppSec&amp;amp;nbsp;USA 2010 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|598x79px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(238, 235, 226); color: black;&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang.'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Dave Wichers: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn how to use the latest Samurai-WTF open source tools and the be shown the latest techniques to perform web application assessments. After a quick overview of pen testing methodology, the instructor will lead you through the penetration and exploitation of three different web applications, and the browsers connecting to them. Different sets of open source tools will be used on each web application, allow you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a fourth web application that contains keys you must find and collect. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence necessary to perform web application assessments and expose you to the wealth of freely available open source tools. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Instructor: Justin Searle: InGuardians [[Image:InGuardians.png|36x39px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Jeff Williams: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class will will cover the full range of tools and documentation that OWASP provides under free and open licenses. When the class is complete, students will be familiar with a wide range of tools and techniques to test web applications. &lt;br /&gt;
The class will include a DVD of OWASP tools and documentation for testing web applications. Additionally, the DVD will include the OWASP Web Testing Environment. OWASP WTE is a collection of tools and documentation for testing web applications available both as a bootable Live CD and virtual machines. Attendees to this class will receive a customized version of OWASP WTE. It will be provided as a virtual machine which includes the tools, documentation and the applications tested during class. It is a self-contained environment to learn web application testing the students can take from class to further hone their testing skills. &lt;br /&gt;
&lt;br /&gt;
Students are encouraged to bring a laptop to class. The virtualization software for OWASP WTE runs on Windows, OS X and Linux. Students with a laptop can follow along with the in class demonstrations to get hands on testing experience &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Instructors: Matt Tesauro and Charles Henderson: [[Image:TrustwaveLogo.jpg]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 07:30-08:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-08:45 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:45-9:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 9:30-10:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:15-10:35 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF kick-off (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:35-11:20 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Panel Discussion: Characterizing Software Security as a Mainstream Business Risk – How to talk to other CXO’s about Software Security&amp;lt;br&amp;gt;John Dickson - Principal, Denim Group (moderator)&amp;lt;br&amp;gt;Tom Brennan - CEO Proactive Risk, OWASP Board Member&amp;lt;br&amp;gt;Ed Pagett, CISO, Lender Processing Services&amp;lt;br&amp;gt;Richard Greenberg, Information Security Officer, Los Angeles County Department of Public Health&amp;lt;br&amp;gt; John Sapp - IT Governance, Risk &amp;amp;amp; Compliance Manager, McKesson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:20-11:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:15-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:15-14:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:25-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs &amp;amp;amp; Michael Anderson, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:30-16:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Tour of OWASP Projects,&amp;lt;br&amp;gt; ''Dinis Cruz, OWASP'' &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Using the OWASP O2 Platform, &amp;lt;br&amp;gt;''Dinis Cruz, OWASP'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:15-16:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:25-17:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen. Moderator: Stuart Schwartz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:15-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:00-10:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:55-11:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:15-12:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:15-14:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:05-14:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | ''Panel Discussion: Vulnerability Lifecycle for Software Vendors&amp;lt;br&amp;gt;Symantec – Kelly FitzGerald&amp;lt;br&amp;gt;Senior Vulnerability Analyst&amp;lt;br&amp;gt;Microsoft – Katie Moussouris&amp;lt;br&amp;gt;Senior Security Strategist&amp;lt;br&amp;gt;Cigital – John Stephen&amp;lt;br&amp;gt;Senior Director&amp;lt;br&amp;gt;HP, TippingPoint -Daniel Holden&amp;lt;br&amp;gt;Director, DVLabs&amp;lt;br&amp;gt;Symantec – Edward Bonver''&amp;lt;br&amp;gt;''Principal Software Engineer (moderator)'' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:50-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Defining the Identiy Management Framework, ''Moderator: Barbara Danzi, Garda Cash Logistics, Richard Tychansky, Lockheed Martin, Jeff Williams,&amp;amp;nbsp;Aspect Security, and Hord Tipton, (ISC)². ''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:55-16:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:05-16:50 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&amp;amp;nbsp;(Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Gold Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Ibmneg blurgb.jpg|140x65px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Fortify logo AppSec Research 2010.png|139x43px]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:TrustwaveLogo.jpg]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Veracode.gif|140x65px]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Silver Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Fishnet Logo AppSec.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Acunetix logo 200.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Barracuda Color Logo.jpg]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Cenziclogo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Cigital-hor-color.JPG|120x65px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fujitsu-red-opt-b-150x56.gif|150x56px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Netspi logo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Whitehat security logo.gif]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Imperva Logo.gif]]&amp;lt;br&amp;gt;[[Image:Aspect logo owasp.jpg|153x44px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:AppSecDC2009-Sponsor-aod.gif]]&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Mavituna.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Sponsors-radware.jpg]] &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Denim Group Logo.gif|133x61px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:Rapid7.png|229x40px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Organizational Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Eccouncil.jpg|759x59px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:ISSA-LA icon.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;[[Image:ISSA-OC.jpg|179x57px]] &lt;br /&gt;
&lt;br /&gt;
===  ===&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88683</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88683"/>
				<updated>2010-09-04T01:49:30Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Welcome to AppSec&amp;amp;nbsp;USA 2010 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|598x79px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(238, 235, 226); color: black;&amp;quot; colspan=&amp;quot;4&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang.'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Dave Wichers: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn how to use the latest Samurai-WTF open source tools and the be shown the latest techniques to perform web application assessments. After a quick overview of pen testing methodology, the instructor will lead you through the penetration and exploitation of three different web applications, and the browsers connecting to them. Different sets of open source tools will be used on each web application, allow you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a fourth web application that contains keys you must find and collect. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence necessary to perform web application assessments and expose you to the wealth of freely available open source tools. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Instructor: Justin Searle: InGuardians [[Image:InGuardians.png|36x39px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Jeff Williams: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class will will cover the full range of tools and documentation that OWASP provides under free and open licenses. When the class is complete, students will be familiar with a wide range of tools and techniques to test web applications. &lt;br /&gt;
The class will include a DVD of OWASP tools and documentation for testing web applications. Additionally, the DVD will include the OWASP Web Testing Environment. OWASP WTE is a collection of tools and documentation for testing web applications available both as a bootable Live CD and virtual machines. Attendees to this class will receive a customized version of OWASP WTE. It will be provided as a virtual machine which includes the tools, documentation and the applications tested during class. It is a self-contained environment to learn web application testing the students can take from class to further hone their testing skills. &lt;br /&gt;
&lt;br /&gt;
Students are encouraged to bring a laptop to class. The virtualization software for OWASP WTE runs on Windows, OS X and Linux. Students with a laptop can follow along with the in class demonstrations to get hands on testing experience &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Instructors: Matt Tesauro and Charles Henderson: [[Image:TrustwaveLogo.jpg]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;4&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 07:30-08:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-08:45 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; colspan=&amp;quot;3&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:45-9:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; colspan=&amp;quot;3&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 9:30-10:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; colspan=&amp;quot;3&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:15-10:35 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF kick-off (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:35-11:20 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Panel: Characterizing Software Security as a Mainstream Business Risk – How to talk to other CXO’s about Software Security&amp;lt;br&amp;gt;John Dickson - Principal, Denim Group (moderator)&amp;lt;br&amp;gt;Tom Brennan - CEO Proactive Risk, OWASP Board Member&amp;lt;br&amp;gt;Ed Pagett, CISO, Lender Processing Services&amp;lt;br&amp;gt;Richard Greenberg, Information Security Officer, Los Angeles County Department of Public Health&amp;lt;br&amp;gt; John Sapp - IT Governance, Risk &amp;amp;amp; Compliance Manager, McKesson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:20-11:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:15-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; colspan=&amp;quot;3&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:15-14:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:25-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs &amp;amp;amp; Michael Anderson, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:30-16:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Tour of OWASP Projects,&amp;lt;br&amp;gt; ''Dinis Cruz, OWASP'' &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Using the OWASP O2 Platform, &amp;lt;br&amp;gt;''Dinis Cruz, OWASP'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:15-16:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:25-17:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; colspan=&amp;quot;3&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen, TBD...Moderator: Stuart Schwartz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;4&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; colspan=&amp;quot;3&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:15-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; colspan=&amp;quot;3&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:00-10:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:55-11:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:15-12:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:15-14:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; colspan=&amp;quot;3&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:05-14:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | ''Symantec – Edward Bonver''&amp;lt;br&amp;gt;''Principal Software Engineer (moderator)&amp;lt;br&amp;gt;Symantec – Kelly FitzGerald&amp;lt;br&amp;gt;Senior Vulnerability Analyst&amp;lt;br&amp;gt;Microsoft – Katie Moussouris&amp;lt;br&amp;gt;Senior Security Strategist&amp;lt;br&amp;gt;Cigital – John Stephen&amp;lt;br&amp;gt;Senior Director&amp;lt;br&amp;gt;HP, TippingPoint -Daniel Holden&amp;lt;br&amp;gt;Director, DVLabs'' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:50-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Defining the Identiy Management Framework, ''Richard Tychansky, Jeff Williams and Hord Tipton. Moderator: Barbara Danzi''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:55-16:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:05-16:50 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; colspan=&amp;quot;3&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&amp;amp;nbsp;(Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Gold Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Ibmneg blurgb.jpg|140x65px]] [[Image:Fortify logo AppSec Research 2010.png|140x65px]] &amp;amp;nbsp; &amp;amp;nbsp;[[Image:TrustwaveLogo.jpg]]&amp;amp;nbsp; &amp;amp;nbsp;[[Image:Veracode.gif|140x65px]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Silver Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Fishnet Logo AppSec.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Acunetix logo 200.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Barracuda Color Logo.jpg]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Cenziclogo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Cigital-hor-color.JPG|120x65px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fujitsu-red-opt-b-150x56.gif|150x56px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Netspi logo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Whitehat security logo.gif]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Imperva Logo.gif]]&amp;lt;br&amp;gt;[[Image:Aspect logo owasp.jpg|153x44px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:AppSecDC2009-Sponsor-aod.gif]]&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Mavituna.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Sponsors-radware.jpg]] &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Denim Group Logo.gif|133x61px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:Rapid7.png|229x40px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Organizational Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Eccouncil.jpg|759x59px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:ISSA-LA icon.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;[[Image:ISSA-OC.jpg|179x57px]] &lt;br /&gt;
&lt;br /&gt;
===  ===&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88670</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88670"/>
				<updated>2010-09-03T17:52:41Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Welcome to AppSec&amp;amp;nbsp;USA 2010 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|598x79px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(238, 235, 226); color: black;&amp;quot; colspan=&amp;quot;4&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang.'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0, 0, 0); font-size: 95%;&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Dave Wichers: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn how to use the latest Samurai-WTF open source tools and the be shown the latest techniques to perform web application assessments. After a quick overview of pen testing methodology, the instructor will lead you through the penetration and exploitation of three different web applications, and the browsers connecting to them. Different sets of open source tools will be used on each web application, allow you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a fourth web application that contains keys you must find and collect. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence necessary to perform web application assessments and expose you to the wealth of freely available open source tools. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | &lt;br /&gt;
Instructor: Justin Searle: InGuardians [[Image:InGuardians.png|36x39px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Instructor: Jeff Williams: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | This class will will cover the full range of tools and documentation that OWASP provides under free and open licenses. When the class is complete, students will be familiar with a wide range of tools and techniques to test web applications. &lt;br /&gt;
The class will include a DVD of OWASP tools and documentation for testing web applications. Additionally, the DVD will include the OWASP Web Testing Environment. OWASP WTE is a collection of tools and documentation for testing web applications available both as a bootable Live CD and virtual machines. Attendees to this class will receive a customized version of OWASP WTE. It will be provided as a virtual machine which includes the tools, documentation and the applications tested during class. It is a self-contained environment to learn web application testing the students can take from class to further hone their testing skills. &lt;br /&gt;
&lt;br /&gt;
Students are encouraged to bring a laptop to class. The virtualization software for OWASP WTE runs on Windows, OS X and Linux. Students with a laptop can follow along with the in class demonstrations to get hands on testing experience &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Instructors: Matt Tesauro and Charles Henderson: [[Image:TrustwaveLogo.jpg]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;4&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 07:30-08:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-08:45 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; colspan=&amp;quot;3&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:45-9:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; colspan=&amp;quot;3&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 9:30-10:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; colspan=&amp;quot;3&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:15-10:35 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF kick-off (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:35-11:20 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Panel: Characterizing Software Security as a Mainstream Business Risk – How to talk to other CXO’s about Software Security&amp;lt;br&amp;gt;John Dickson - Principal, Denim Group (moderator)&amp;lt;br&amp;gt;Tom Brennan - CEO Proactive Risk, OWASP Board Member&amp;lt;br&amp;gt;Ed Pagett, CISO, Lender Processing Services&amp;lt;br&amp;gt;Richard Greenberg, Information Security Officer, Los Angeles County Department of Public Health&amp;lt;br&amp;gt; John Sapp - IT Governance, Risk &amp;amp;amp; Compliance Manager, McKesson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:20-11:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:15-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; colspan=&amp;quot;3&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:15-14:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:25-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs &amp;amp;amp; Michael Anderson, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:30-16:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Tour of OWASP Projects,&amp;lt;br&amp;gt; ''Dinis Cruz, OWASP'' &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Using the OWASP O2 Platform, &amp;lt;br&amp;gt;''Dinis Cruz, OWASP'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:15-16:25 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:25-17:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; colspan=&amp;quot;3&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen, TBD...Moderator: Stuart Schwartz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;4&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 - Emerald Bay &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:15 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; colspan=&amp;quot;3&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:15-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; colspan=&amp;quot;3&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:00-10:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:55-11:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:15-12:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Lunch - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:15-14:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; colspan=&amp;quot;3&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:05-14:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | ''Symantec – Edward Bonver''&amp;lt;br&amp;gt;''Principal Software Engineer (moderator)&amp;lt;br&amp;gt;Symantec – Kelly FitzGerald&amp;lt;br&amp;gt;Senior Vulnerability Analyst&amp;lt;br&amp;gt;Microsoft – Katie Moussouris&amp;lt;br&amp;gt;Senior Security Strategist&amp;lt;br&amp;gt;Cigital – John Stephen&amp;lt;br&amp;gt;Senior Director&amp;lt;br&amp;gt;HP, TippingPoint -Daniel Holden&amp;lt;br&amp;gt;Director, DVLabs'' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:50-15:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Coffee Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:55 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Defining the Identiy Management Framework, ''Richard Tychansky, Jeff Williams and Hord Tipton''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:55-16:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; colspan=&amp;quot;3&amp;quot; | Break - Expo - CTF (Pacific Ballroom)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:05-16:50 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; colspan=&amp;quot;3&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&amp;amp;nbsp;(Pacific Ballroom)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Gold Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Ibmneg blurgb.jpg|140x65px]] [[Image:Fortify logo AppSec Research 2010.png|140x65px]] &amp;amp;nbsp; &amp;amp;nbsp;[[Image:TrustwaveLogo.jpg]]&amp;amp;nbsp; &amp;amp;nbsp;[[Image:Veracode.gif|140x65px]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Silver Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Fishnet Logo AppSec.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Acunetix logo 200.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Barracuda Color Logo.jpg]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Cenziclogo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Cigital-hor-color.JPG|120x65px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fujitsu-red-opt-b-150x56.gif|150x56px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Netspi logo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Whitehat security logo.gif]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Imperva Logo.gif]]&amp;lt;br&amp;gt;[[Image:Aspect logo owasp.jpg|153x44px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:AppSecDC2009-Sponsor-aod.gif]]&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Mavituna.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Sponsors-radware.jpg]] &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Denim Group Logo.gif|133x61px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:Rapid7.png|229x40px]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Organizational Sponsors  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Eccouncil.jpg|759x59px]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:ISSA-LA icon.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;[[Image:ISSA-OC.jpg|179x57px]] &lt;br /&gt;
&lt;br /&gt;
===  ===&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=84766</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=84766"/>
				<updated>2010-06-10T02:14:19Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[File:Appsec_banner.png|alt=AppSec USA 2010 Banner|AppSec 2010 USA Banner]]&lt;br /&gt;
&lt;br /&gt;
[http://www.studentcenter.uci.edu/meetings/bookables/rooms.php UC Irvine Conference Center] | [http:// Registration Link (Coming soon)] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
====Welcome====  &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''Call for papers/training out!'''&lt;br /&gt;
&lt;br /&gt;
We are accepting presentation proposals!&lt;br /&gt;
&lt;br /&gt;
http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Call_for_Papers.2FTraining&lt;br /&gt;
&lt;br /&gt;
'''News April 8th'''&lt;br /&gt;
&lt;br /&gt;
Our final keynote has just accepted!  Bill Cheswick from AT&amp;amp;T Research and Jeff Williams of Aspect Security round out our keynotes!&lt;br /&gt;
&lt;br /&gt;
[[file:Lumetathumb.jpeg|250px]][[file:JeffWilliams2.jpg|250px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''News March 25th'''&lt;br /&gt;
&lt;br /&gt;
David Rice of [http://www.geekonomicsbook.com/ Geekonomics] and HD Moore of [http://www.metasploit.com/ Metasploit]/[http://www.rapid7.com/ Rapid7] will be keynote speakers!&lt;br /&gt;
&lt;br /&gt;
[[File:Hdm.hshot.white.jpg|250px]][[File:Rice_color_small.jpg|250px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Press Release January 23rd, 2010 -- [http://owasp.blogspot.com/2010/01/owasp-q1-2010-newsletter.html Event Announced!]''' &lt;br /&gt;
&lt;br /&gt;
The Global Conferences Committee is excited to announce the date and location of the OWASP AppSec US 2010 Conference. AppSec US 2010 will be held September 7th through September 10th, 2010 and will be hosted by the Orange County and Los Angeles Chapters at&lt;br /&gt;
the University of California, Irvine, the only school in the University of California&lt;br /&gt;
system with a dedicated school of Information and Computer Science. More information,&lt;br /&gt;
including the call for speakers &amp;amp; the call for training will be sent shortly.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend AppSec USA 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full AppSec USA Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers/Training====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers and training curriculum for the OWASP AppSec USA, California 2010 Conference that will take place at the UC Irvine Conference Center in beautiful Orange County, CA on September 7th through 10th of 2010.  There will be training courses on September 7th and 8th, followed by plenary sessions on the 9th and 10th with each day having at least three tracks. AppSec USA may also have BOF (Birds of Feathers, an informal adhoc meeting), break out, or speed talks in addition to the standard schedule depending on the submissions we receive.&lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order):&lt;br /&gt;
  - Business Risks with Application Security.&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs.&lt;br /&gt;
  - Web Services-, XML- and Application Security.&lt;br /&gt;
  - Metrics for Application Security.&lt;br /&gt;
  - Application Threat Modeling.&lt;br /&gt;
  - Hands-on Source Code Review.&lt;br /&gt;
  - Web Application Security Testing.&lt;br /&gt;
  - OWASP Tools and Projects.&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET).&lt;br /&gt;
  - Privacy Concerns with Applications and Data Storage&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc.&lt;br /&gt;
  - Anything else relating to OWASP and Application Security.&lt;br /&gt;
 &lt;br /&gt;
To make a submission you must include :&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - Abstract&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of  CFP committee)&lt;br /&gt;
&lt;br /&gt;
Optional: a link to a presentation video.&lt;br /&gt;
 &lt;br /&gt;
Submission deadline is June 30th at 12PM PST (GMT -8)&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=appsec2010&lt;br /&gt;
Conference Website: http://www.owasp.org/index.php/AppSec_US_2010,_CA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Please forward to all interested practitioners and colleagues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Now Open!  ==&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/i.aspx?4W%2cM3%2c3c8f8c26-a4b3-40d6-9daa-1f541ea0ccc2 CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount of $50. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| $375 Until 7/15/2010&lt;br /&gt;
| Non-Members&lt;br /&gt;
| After 7/15/2010 - $445&lt;br /&gt;
|-&lt;br /&gt;
| $325 Until 7/15/2010&lt;br /&gt;
| OWASP Members&lt;br /&gt;
| After 7/15/2010 - $395&lt;br /&gt;
|-&lt;br /&gt;
| $250 &lt;br /&gt;
| Students with valid Student ID&lt;br /&gt;
|-&lt;br /&gt;
| $375 Until 7/15/2010&lt;br /&gt;
| New Registration Option!  Become an OWASP Member and attend the event!&lt;br /&gt;
|-&lt;br /&gt;
| $TBD&lt;br /&gt;
| 2-Day Training Course&lt;br /&gt;
|-&lt;br /&gt;
| $TBD &lt;br /&gt;
| 1-Day Training Course&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend AppSec USA 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event.  This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please contact neil(at)owasp.org to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities &lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[File:Volunteer_Sheet.doc‎‎]] can be downloaded which outlines some of the responsibilities and available positions.  Note: this document references the the DC conference last year, this is just for a general guideline.  Updated document coming soon.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== UC Irvine Conference Center Center  ==&lt;br /&gt;
&lt;br /&gt;
AppSec USA 20010 will be taking place at the [http://www.studentcenter.uci.edu/ UC Irvine Conference Center] in Irvine, CA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
[[File:Hyatt_main.gif]]&lt;br /&gt;
&lt;br /&gt;
We have reached a deal with [http://irvine.hyatt.com/hyatt/hotels/services/maps/index.jsp;jsessionid=B5FD749994590A884ADF548D5A1306FE.atg07-prd-atg1?icamp=propMapDirections Hyatt Regency of Irvine].  The standard room rate will be $109.  The hotel will be offering a shuttle service to and from both the UC Irvine campus as well as the John Wayne Airport!&lt;br /&gt;
&lt;br /&gt;
Space is limited so be sure to book sooner than later. Please use this link to reserve a room https://resweb.passkey.com/go/owasp2010&lt;br /&gt;
&lt;br /&gt;
UC Irvine also has special arrangements not related to this conference [http://snap.uci.edu/viewXmlFile.jsp?resourceID=259 here]&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf List of Sponsorship Opportunities]&lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information.&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[file:IrvineSponsors.png]]&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; &lt;br /&gt;
|- &lt;br /&gt;
| &amp;lt;h2&amp;gt;Platinum Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|  &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h2&amp;gt;Gold Sponsors&amp;lt;/h2&amp;gt; &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h2&amp;gt;Silver Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Organizational Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Reception Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Coffee Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the OC Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=83525</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=83525"/>
				<updated>2010-05-14T16:22:24Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[File:Appsec_banner.png|alt=AppSec USA 2010 Banner|AppSec 2010 USA Banner]]&lt;br /&gt;
&lt;br /&gt;
[http://www.studentcenter.uci.edu/meetings/bookables/rooms.php UC Irvine Conference Center] | [http:// Registration Link (Coming soon)] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
====Welcome====  &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''Call for papers/training out!'''&lt;br /&gt;
&lt;br /&gt;
We are accepting presentation proposals!&lt;br /&gt;
&lt;br /&gt;
http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Call_for_Papers.2FTraining&lt;br /&gt;
&lt;br /&gt;
'''News April 8th'''&lt;br /&gt;
&lt;br /&gt;
Our final keynote has just accepted!  Bill Cheswick from AT&amp;amp;T Research and Jeff Williams of Aspect Security round out our keynotes!&lt;br /&gt;
&lt;br /&gt;
[[file:Lumetathumb.jpeg|250px]][[file:JeffWilliams2.jpg|250px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''News March 25th'''&lt;br /&gt;
&lt;br /&gt;
David Rice of [http://www.geekonomicsbook.com/ Geekonomics] and HD Moore of [http://www.metasploit.com/ Metasploit]/[http://www.rapid7.com/ Rapid7] will be keynote speakers!&lt;br /&gt;
&lt;br /&gt;
[[File:Hdm.hshot.white.jpg|250px]][[File:Rice_color_small.jpg|250px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Press Release January 23rd, 2010 -- [http://owasp.blogspot.com/2010/01/owasp-q1-2010-newsletter.html Event Announced!]''' &lt;br /&gt;
&lt;br /&gt;
The Global Conferences Committee is excited to announce the date and location of the OWASP AppSec US 2010 Conference. AppSec US 2010 will be held September 7th through September 10th, 2010 and will be hosted by the Orange County and Los Angeles Chapters at&lt;br /&gt;
the University of California, Irvine, the only school in the University of California&lt;br /&gt;
system with a dedicated school of Information and Computer Science. More information,&lt;br /&gt;
including the call for speakers &amp;amp; the call for training will be sent shortly.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend AppSec USA 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full AppSec USA Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers/Training====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers and training curriculum for the OWASP AppSec USA, California 2010 Conference that will take place at the UC Irvine Conference Center in beautiful Orange County, CA on September 7th through 10th of 2010.  There will be training courses on September 7th and 8th, followed by plenary sessions on the 9th and 10th with each day having at least three tracks. AppSec USA may also have BOF (Birds of Feathers, an informal adhoc meeting), break out, or speed talks in addition to the standard schedule depending on the submissions we receive.&lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order):&lt;br /&gt;
  - Business Risks with Application Security.&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs.&lt;br /&gt;
  - Web Services-, XML- and Application Security.&lt;br /&gt;
  - Metrics for Application Security.&lt;br /&gt;
  - Application Threat Modeling.&lt;br /&gt;
  - Hands-on Source Code Review.&lt;br /&gt;
  - Web Application Security Testing.&lt;br /&gt;
  - OWASP Tools and Projects.&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET).&lt;br /&gt;
  - Privacy Concerns with Applications and Data Storage&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc.&lt;br /&gt;
  - Anything else relating to OWASP and Application Security.&lt;br /&gt;
 &lt;br /&gt;
To make a submission you must include :&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - Abstract&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of  CFP committee)&lt;br /&gt;
&lt;br /&gt;
Optional: a link to a presentation video.&lt;br /&gt;
 &lt;br /&gt;
Submission deadline is June 15th at 12PM PST (GMT -8)&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=appsec2010&lt;br /&gt;
Conference Website: http://www.owasp.org/index.php/AppSec_US_2010,_CA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Please forward to all interested practitioners and colleagues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Coming Soon  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount of $50. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| $TBD&lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| $TBD&lt;br /&gt;
| OWASP Members&lt;br /&gt;
|-&lt;br /&gt;
| $TBD &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| $TBD &lt;br /&gt;
| 2-Day Training Course&lt;br /&gt;
|-&lt;br /&gt;
| $TBD &lt;br /&gt;
| 1-Day Training Course&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend AppSec USA 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event.  This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please contact neil(at)owasp.org to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities &lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[File:Volunteer_Sheet.doc‎‎]] can be downloaded which outlines some of the responsibilities and available positions.  Note: this document references the the DC conference last year, this is just for a general guideline.  Updated document coming soon.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== UC Irvine Conference Center Center  ==&lt;br /&gt;
&lt;br /&gt;
AppSec USA 20010 will be taking place at the [http://www.studentcenter.uci.edu/ UC Irvine Conference Center] in Irvine, CA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
[[File:Hyatt_main.gif]]&lt;br /&gt;
&lt;br /&gt;
We have reached a deal with [http://irvine.hyatt.com/hyatt/hotels/services/maps/index.jsp;jsessionid=B5FD749994590A884ADF548D5A1306FE.atg07-prd-atg1?icamp=propMapDirections Hyatt Regency of Irvine].  The standard room rate will be $109.  The hotel will be offering a shuttle service to and from both the UC Irvine campus as well as the John Wayne Airport!&lt;br /&gt;
&lt;br /&gt;
Space is limited so be sure to book sooner than later. Please use this link to reserve a room https://resweb.passkey.com/go/owasp2010&lt;br /&gt;
&lt;br /&gt;
UC Irvine also has special arrangements not related to this conference [http://snap.uci.edu/viewXmlFile.jsp?resourceID=259 here]&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf List of Sponsorship Opportunities]&lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information.&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[file:IrvineSponsors.png]]&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; &lt;br /&gt;
|- &lt;br /&gt;
| &amp;lt;h2&amp;gt;Platinum Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|  &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h2&amp;gt;Gold Sponsors&amp;lt;/h2&amp;gt; &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h2&amp;gt;Silver Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Organizational Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Reception Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Coffee Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the OC Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=83524</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=83524"/>
				<updated>2010-05-14T16:21:34Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[File:Appsec_banner.png|alt=AppSec USA 2010 Banner|AppSec 2010 USA Banner]]&lt;br /&gt;
&lt;br /&gt;
[http://www.studentcenter.uci.edu/meetings/bookables/rooms.php UC Irvine Conference Center] | [http:// Registration Link (Coming soon)] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
====Welcome====  &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''Call for papers/training out!'''&lt;br /&gt;
&lt;br /&gt;
We are accepting presentation proposals!&lt;br /&gt;
&lt;br /&gt;
http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Call_for_Papers.2FTraining&lt;br /&gt;
&lt;br /&gt;
'''News April 8th'''&lt;br /&gt;
&lt;br /&gt;
Our final keynote has just accepted!  Bill Cheswick from AT&amp;amp;T Research and Jeff Williams of Aspect Security round out our keynotes!&lt;br /&gt;
&lt;br /&gt;
[[file:Lumetathumb.jpeg|250px]][[file:JeffWilliams2.jpg|250px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''News March 25th'''&lt;br /&gt;
&lt;br /&gt;
David Rice of [http://www.geekonomicsbook.com/ Geekonomics] and HD Moore of [http://www.metasploit.com/ Metasploit]/[http://www.rapid7.com/ Rapid7] will be keynote speakers!&lt;br /&gt;
&lt;br /&gt;
[[File:Hdm.hshot.white.jpg|250px]][[File:Rice_color_small.jpg|250px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Press Release January 23rd, 2010 -- [http://owasp.blogspot.com/2010/01/owasp-q1-2010-newsletter.html Event Announced!]''' &lt;br /&gt;
&lt;br /&gt;
The Global Conferences Committee is excited to announce the date and location of the OWASP AppSec US 2010 Conference. AppSec US 2010 will be held September 7th through September 10th, 2010 and will be hosted by the Orange County and Los Angeles Chapters at&lt;br /&gt;
the University of California, Irvine, the only school in the University of California&lt;br /&gt;
system with a dedicated school of Information and Computer Science. More information,&lt;br /&gt;
including the call for speakers &amp;amp; the call for training will be sent shortly.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend AppSec USA 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full AppSec USA Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Call for Papers/Training====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers and training curriculum for the OWASP AppSec USA, California 2010 Conference that will take place at the UC Irvine Conference Center in beautiful Orange County, CA on September 7th through 10th of 2010.  There will be training courses on September 7th and 8th, followed by plenary sessions on the 9th and 10th with each day having at least three tracks. AppSec USA may also have BOF (Birds of Feathers, an informal adhoc meeting), break out, or speed talks in addition to the standard schedule depending on the submissions we receive.&lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order):&lt;br /&gt;
  - Business Risks with Application Security.&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs.&lt;br /&gt;
  - Web Services-, XML- and Application Security.&lt;br /&gt;
  - Metrics for Application Security.&lt;br /&gt;
  - Application Threat Modeling.&lt;br /&gt;
  - Hands-on Source Code Review.&lt;br /&gt;
  - Web Application Security Testing.&lt;br /&gt;
  - OWASP Tools and Projects.&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET).&lt;br /&gt;
  - Privacy Concerns with Applications and Data Storage&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc.&lt;br /&gt;
  - Anything else relating to OWASP and Application Security.&lt;br /&gt;
 &lt;br /&gt;
To make a submission you must include :&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - Abstract&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of  CFP committee)&lt;br /&gt;
&lt;br /&gt;
Optional: a link to a presentation video.&lt;br /&gt;
 &lt;br /&gt;
Submission deadline is June 15th at 12PM PST (GMT -8)&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=appsec2010&lt;br /&gt;
Conference Website: http://www.owasp.org/index.php/AppSec_US_2010,_CA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Please forward to all interested practitioners and colleagues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Coming Soon  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount of $50. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| $TBD&lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| $TBD&lt;br /&gt;
| OWASP Members&lt;br /&gt;
|-&lt;br /&gt;
| $TBD &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| $TBD &lt;br /&gt;
| 2-Day Training Course&lt;br /&gt;
|-&lt;br /&gt;
| $TBD &lt;br /&gt;
| 1-Day Training Course&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend AppSec USA 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event.  This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please contact neil(at)owasp.org to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities &lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[File:Volunteer_Sheet.doc‎‎]] can be downloaded which outlines some of the responsibilities and available positions.  Note: this document references the the DC conference last year, this is just for a general guideline.  Updated document coming soon.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== UC Irvine Conference Center Center  ==&lt;br /&gt;
&lt;br /&gt;
AppSec USA 20010 will be taking place at the [http://www.studentcenter.uci.edu/ UC Irvine Conference Center] in Irvine, CA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
[[File:Hyatt_main.gif]]&lt;br /&gt;
&lt;br /&gt;
We have reached a deal with [http://irvine.hyatt.com/hyatt/hotels/services/maps/index.jsp;jsessionid=B5FD749994590A884ADF548D5A1306FE.atg07-prd-atg1?icamp=propMapDirections Hyatt Regency of Irvine].  The standard room rate will be $109.  The hotel will be offering a shuttle service to and from both the UC Irvine campus as well as the John Wayne Airport!&lt;br /&gt;
&lt;br /&gt;
Space is limited so be sure to book sooner than later. Please use this link to reserve a room https://resweb.passkey.com/go/owasp2010&lt;br /&gt;
&lt;br /&gt;
UC Irvine also has special arrangements not related to this conference [http://snap.uci.edu/viewXmlFile.jsp?resourceID=259 here]&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf List of Sponsorship Opportunities]&lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information.&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[file:IrvineSponsors.png]]&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; &lt;br /&gt;
|- &lt;br /&gt;
| &amp;lt;h2&amp;gt;Platinum Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|  &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h2&amp;gt;Gold Sponsors&amp;lt;/h2&amp;gt; &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h2&amp;gt;Silver Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Organizational Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Reception Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Coffee Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the OC Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=83523</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=83523"/>
				<updated>2010-05-14T16:15:39Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[File:Appsec_banner.png|alt=AppSec USA 2010 Banner|AppSec 2010 USA Banner]]&lt;br /&gt;
&lt;br /&gt;
[http://www.studentcenter.uci.edu/meetings/bookables/rooms.php UC Irvine Conference Center] | [http:// Registration Link (Coming soon)] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
====Welcome====  &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''Call for papers/training out!'''&lt;br /&gt;
&lt;br /&gt;
We are accepting presentation proposals!&lt;br /&gt;
&lt;br /&gt;
http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Call_for_Papers.2FTraining&lt;br /&gt;
&lt;br /&gt;
'''News April 8th'''&lt;br /&gt;
&lt;br /&gt;
Our final keynote has just accepted!  Bill Cheswick from AT&amp;amp;T Research and Jeff Williams of Aspect Security round out our keynotes!&lt;br /&gt;
&lt;br /&gt;
[[file:Lumetathumb.jpeg|250px]][[file:JeffWilliams2.jpg|250px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''News March 25th'''&lt;br /&gt;
&lt;br /&gt;
David Rice of [http://www.geekonomicsbook.com/ Geekonomics] and HD Moore of [http://www.metasploit.com/ Metasploit]/[http://www.rapid7.com/ Rapid7] will be keynote speakers!&lt;br /&gt;
&lt;br /&gt;
[[File:Hdm.hshot.white.jpg|250px]][[File:Rice_color_small.jpg|250px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Press Release January 23rd, 2010 -- [http://owasp.blogspot.com/2010/01/owasp-q1-2010-newsletter.html Event Announced!]''' &lt;br /&gt;
&lt;br /&gt;
The Global Conferences Committee is excited to announce the date and location of the OWASP AppSec US 2010 Conference. AppSec US 2010 will be held September 7th through September 10th, 2010 and will be hosted by the Orange County and Los Angeles Chapters at&lt;br /&gt;
the University of California, Irvine, the only school in the University of California&lt;br /&gt;
system with a dedicated school of Information and Computer Science. More information,&lt;br /&gt;
including the call for speakers &amp;amp; the call for training will be sent shortly.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend AppSec USA 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full AppSec USA Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers/Training====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers and training curriculum for the OWASP AppSec USA, California 2010 Conference that will take place at the UC Irvine Conference Center in beautiful Orange County, CA on September 7th through 10th of 2010.  There will be training courses on September 7th and 8th, followed by plenary sessions on the 9th and 10th with each day having at least three tracks. AppSec USA may also have BOF (Birds of Feathers, an informal adhoc meeting), break out, or speed talks in addition to the standard schedule depending on the submissions we receive.&lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order):&lt;br /&gt;
  - Business Risks with Application Security.&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs.&lt;br /&gt;
  - Web Services-, XML- and Application Security.&lt;br /&gt;
  - Metrics for Application Security.&lt;br /&gt;
  - Application Threat Modeling.&lt;br /&gt;
  - Hands-on Source Code Review.&lt;br /&gt;
  - Web Application Security Testing.&lt;br /&gt;
  - OWASP Tools and Projects.&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET).&lt;br /&gt;
  - Privacy Concerns with Applications and Data Storage&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc.&lt;br /&gt;
  - Anything else relating to OWASP and Application Security.&lt;br /&gt;
 &lt;br /&gt;
To make a submission you must include :&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - Abstract&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of  CFP committee)&lt;br /&gt;
&lt;br /&gt;
Optional: a link to a presentation video.&lt;br /&gt;
 &lt;br /&gt;
Submission deadline is June 15th at 12PM PST (GMT -8)&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=appsec2010&lt;br /&gt;
Conference Website: http://www.owasp.org/index.php/AppSec_US_2010,_CA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Please forward to all interested practitioners and colleagues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Coming Soon  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount of $50. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| $TBD&lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| $TBD&lt;br /&gt;
| OWASP Members&lt;br /&gt;
|-&lt;br /&gt;
| $TBD &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| $TBD &lt;br /&gt;
| 2-Day Training Course&lt;br /&gt;
|-&lt;br /&gt;
| $TBD &lt;br /&gt;
| 1-Day Training Course&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend AppSec USA 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event.  This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please contact neil(at)owasp.org to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities &lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[File:Volunteer_Sheet.doc‎‎]] can be downloaded which outlines some of the responsibilities and available positions.  Note: this document references the the DC conference last year, this is just for a general guideline.  Updated document coming soon.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== UC Irvine Conference Center Center  ==&lt;br /&gt;
&lt;br /&gt;
AppSec USA 20010 will be taking place at the [http://www.studentcenter.uci.edu/ UC Irvine Conference Center] in Irvine, CA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
[[File:Hyatt_main.gif]]&lt;br /&gt;
&lt;br /&gt;
We have reached a deal with [http://irvine.hyatt.com/hyatt/hotels/services/maps/index.jsp;jsessionid=B5FD749994590A884ADF548D5A1306FE.atg07-prd-atg1?icamp=propMapDirections Hyatt Regency of Irvine].  The standard room rate will be $109.  The hotel will be offering a shuttle service to and from both the UC Irvine campus as well as the John Wayne Airport!&lt;br /&gt;
&lt;br /&gt;
Space is limited so be sure to book sooner than later. Please use this link to reserve a room https://resweb.passkey.com/go/owasp2010&lt;br /&gt;
&lt;br /&gt;
UC Irvine also has special arrangements not related to this conference [http://snap.uci.edu/viewXmlFile.jsp?resourceID=259 here]&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf List of Sponsorship Opportunities]&lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information.&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[file:IrvineSponsors.png]]&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; &lt;br /&gt;
|- &lt;br /&gt;
| &amp;lt;h2&amp;gt;Platinum Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|  &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h2&amp;gt;Gold Sponsors&amp;lt;/h2&amp;gt; &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h2&amp;gt;Silver Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Organizational Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Reception Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Coffee Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the OC Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=79329</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=79329"/>
				<updated>2010-03-09T04:40:56Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[File:Appsec_banner.png|alt=AppSec USA 2010 Banner|AppSec 2010 USA Banner]]&lt;br /&gt;
&lt;br /&gt;
[http://www.studentcenter.uci.edu/meetings/bookables/rooms.php UC Irvine Conference Center] | [http:// Registration Link (Coming soon)] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
====Welcome====  &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''News February 11th'''&lt;br /&gt;
&lt;br /&gt;
David Rice of [http://www.geekonomicsbook.com/ Geekonomics] will be a keynote speaker!&lt;br /&gt;
&lt;br /&gt;
The CFP/CFT will be arriving in inboxes soon, please submit proposals ASAP!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Press Release January 23rd, 2010 -- [http://owasp.blogspot.com/2010/01/owasp-q1-2010-newsletter.html Event Announced!]''' &lt;br /&gt;
&lt;br /&gt;
The Global Conferences Committee is excited to announce the date and location of the OWASP AppSec US 2010 Conference. AppSec US 2010 will be held September 7th through September 10th, 2010 and will be hosted by the Orange County and Los Angeles Chapters at&lt;br /&gt;
the University of California, Irvine, the only school in the University of California&lt;br /&gt;
system with a dedicated school of Information and Computer Science. More information,&lt;br /&gt;
including the call for speakers &amp;amp; the call for training will be sent shortly.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend AppSec USA 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full AppSec USA Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23AppSec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''@AppSecDC09 Twitter Feed ([http://twitter.com/AppSecDC09 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;34534108&amp;lt;/twitter&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers/Training====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers and training curriculum for the OWASP AppSec USA, California 2010 Conference that will take place at the UC Irvine Conference Center in beautiful Orange County, CA on September 7th through 10th of 2010.  There will be training courses on September 7th and 8th, followed by plenary sessions on the 9th and 10th with each day having at least three tracks. AppSec USA may also have BOF (Birds of Feathers, an informal adhoc meeting), break out, or speed talks in addition to the standard schedule depending on the submissions we receive.&lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order):&lt;br /&gt;
  - Business Risks with Application Security.&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs.&lt;br /&gt;
  - Web Services-, XML- and Application Security.&lt;br /&gt;
  - Metrics for Application Security.&lt;br /&gt;
  - Application Threat Modeling.&lt;br /&gt;
  - Hands-on Source Code Review.&lt;br /&gt;
  - Web Application Security Testing.&lt;br /&gt;
  - OWASP Tools and Projects.&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET).&lt;br /&gt;
  - Privacy Concerns with Applications and Data Storage&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc.&lt;br /&gt;
  - Anything else relating to OWASP and Application Security.&lt;br /&gt;
 &lt;br /&gt;
To make a submission you must include :&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - Abstract&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of  CFP committee)&lt;br /&gt;
&lt;br /&gt;
Optional: a link to a presentation video.&lt;br /&gt;
 &lt;br /&gt;
Submission deadline is June 6th at 12PM PST (GMT -8)&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=appsec2010&lt;br /&gt;
Conference Website: http://www.owasp.org/index.php/AppSec_US_2010,_CA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Please forward to all interested practitioners and colleagues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Coming Soon  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount of $50. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| $TBD&lt;br /&gt;
| General Public&lt;br /&gt;
|-&lt;br /&gt;
| $TBD&lt;br /&gt;
| OWASP Members&lt;br /&gt;
|-&lt;br /&gt;
| $TBD &lt;br /&gt;
| Students&lt;br /&gt;
|-&lt;br /&gt;
| $TBD &lt;br /&gt;
| 2-Day Training Course&lt;br /&gt;
|-&lt;br /&gt;
| $TBD &lt;br /&gt;
| 1-Day Training Course&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend AppSec USA 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, attendees must present proof of enrollment when picking up your badge. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
&lt;br /&gt;
More info coming soon!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Please contact the appropriate arch-minion to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security -- [mailto:angel.contreras(at)owasp.org Angel Contreras] &lt;br /&gt;
*Speakers and Trainers -- [mailto:wade.woolwine(at)owasp.org Wade Woolwine], [mailto:jeremy.long(at)owasp.org Jeremy Long] and [mailto:josh.feinblum(at)owasp.org Josh Feinblum] &lt;br /&gt;
*Vendors -- [mailto:dave.sachdev(at)owasp.org Dave Sachdev] &lt;br /&gt;
*Facilities -- [mailto:doug.wilson(at)owasp.org Doug Wilson] and [mailto:barry.austin(at)owasp.org Barry Austin]&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [http://www.owasp.org/images/f/f1/OWASP_DCAppSec_Vol_Guide.pdf Volunteer Guide] can be downloaded which outlines some of the responsibilities and available positions.&lt;br /&gt;
&lt;br /&gt;
Or, you can e-mail the organizers at mark.bristow(at)owasp.org, doug.wilson(at)owasp.org or rex.booth(at)owasp.org. &lt;br /&gt;
&lt;br /&gt;
Or email appsec_us_09(at)lists.owasp.org or [https://lists.owasp.org/mailman/listinfo/appsec_us_09 sign up] for the mailing list! --&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== UC Irvine Conference Center Center  ==&lt;br /&gt;
&lt;br /&gt;
AppSec USA 20010 will be taking place at the [http://www.studentcenter.uci.edu/ UC Irvine Conference Center] in Irvine, CA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. A complete list of sponsorship opportunities are listed [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf here]&lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information.&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; valign=&amp;quot;middle&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; &lt;br /&gt;
|- &lt;br /&gt;
| &amp;lt;h2&amp;gt;Platinum Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|  &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h2&amp;gt;Gold Sponsors&amp;lt;/h2&amp;gt; &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h2&amp;gt;Silver Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Organizational Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Reception Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;h3&amp;gt;Coffee Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the OC Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=75385</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=75385"/>
				<updated>2009-12-22T08:04:27Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Wednesday, December 16th, 2009 7:30PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Los Angeles|extra=The chapter leader is [mailto:Cassio.goldschmidt@gmail.com Cassio Goldschmidt]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Losangeles|emailarchives=http://lists.owasp.org/pipermail/owasp-losangeles}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;LosAngeles&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2 style=&amp;quot;margin:0; background:#cef2e0; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;&amp;quot;&amp;gt;Upcoming Chapter Meetings &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
    &amp;lt;b&amp;gt;Meeting Location&amp;lt;/b&amp;gt;&lt;br /&gt;
    [http://maps.google.com/maps?q=900+Corporate+Pointe,+90230&amp;amp;ie=UTF8&amp;amp;oe=UTF-8&amp;amp;ll=33.988385,-118.387041&amp;amp;spn=0.010284,0.014055&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=addr Symantec Corporation]&lt;br /&gt;
    900 Corporate Pointe&lt;br /&gt;
    Culver City, CA 90230&lt;br /&gt;
    Laguna Conference Room&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Wednesday, December 16th, 2009 7:30PM ==&lt;br /&gt;
* &amp;lt;b&amp;gt;[http://www.owasp.org/images/b/bc/Sutton_-_Pulling_The_Plug-Security_Risks_in_Next_Generation_Offline_Web_Apps_-_OWASP_LA_OC.pdf Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as Gears (formerly Google Gears) and the Database Storage &amp;lt;http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage/&amp;gt;  functionality included in the emerging HTML 5 &amp;lt;http://dev.w3.org/html5/spec/Overview.html&amp;gt;  specification. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given web application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Michael Sutton&amp;lt;/B&amp;gt;,Vice President and security research at Zscaler, has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
= Would you like to speak at an OWASP Los Angeles Meeting? =&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN ~ to submit educational topic for upcoming meeting please submit your BIO and talk abstract via email to [mailto:cassio@owasp.org Cassio Goldschmidt].  When accepted it will be required to use the following powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations This page] provides a [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations list of previous presentations] conducted at the Los Angeles Chapter.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Los Angeles Chapter Leader=&lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt]&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Sutton_-_Pulling_The_Plug-Security_Risks_in_Next_Generation_Offline_Web_Apps_-_OWASP_LA_OC.pdf&amp;diff=75384</id>
		<title>File:Sutton - Pulling The Plug-Security Risks in Next Generation Offline Web Apps - OWASP LA OC.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Sutton_-_Pulling_The_Plug-Security_Risks_in_Next_Generation_Offline_Web_Apps_-_OWASP_LA_OC.pdf&amp;diff=75384"/>
				<updated>2009-12-22T08:01:50Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_2009,_2010&amp;diff=74273</id>
		<title>Los Angeles Previous Presentations 2009, 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_2009,_2010&amp;diff=74273"/>
				<updated>2009-11-28T03:13:21Z</updated>
		
		<summary type="html">&lt;p&gt;Cgoldsch: /* Wednesday, November 18th, 2009 7:30PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Previous Presentations =&lt;br /&gt;
== Wednesday, November 18th, 2009 7:30PM ==&lt;br /&gt;
* &amp;lt;b&amp;gt;[http://www.owasp.org/images/b/bc/Watching_software_run_11.18.09.pptx Watching Software Run with Brian Chess, Fortify Founder and Chief Scientist]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Now more than ever before, computer systems are vulnerable because software is vulnerable.  No matter how good programmers get at making secure software, it will never be perfect—we will always have to contend with incomplete or inadequate code. Most efforts at living with bad code have focused on shoring it up from the outside: limiting network access (firewalls) or watching for suspicious behavior (intrusion detection). This talk takes a different perspective: we’ll look at methods for identifying and blunting the effects of software shortcomings from the inside by watching the software run.&lt;br /&gt;
&lt;br /&gt;
Modern languages like Java and C# are good for more than just programmers.  They also provide a wealth of structured information when they execute.  We can apply many same techniques developed for outside-in security, but at a finer granularity and with much more context.  Along the way there is a lot to talk about: Where web application firewalls excel and where they fall down.  Fuzzing vs. static analysis.  The disappointments of both aspect oriented programming and building security in.  Why nobody uses the Java Security model.  Taking your security with you into the cloud.  The reason SQL injection won’t go away.  Revenge of the reference monitor.  Why was Twitter’s security so bad?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Brian Chess&amp;lt;/b&amp;gt; is a founder of Fortify Software and serves as Fortify's Chief Scientist, where his work focuses on practical methods for creating secure systems. His book, Secure Programming with Static Analysis, shows how static source code analysis is an indispensable tool for getting security right. Brian holds a Ph.D. in computer engineering from the University of California at Santa Cruz, where he studied the application of static analysis to the problem of finding security-relevant defects in source code. Before settling on security, Brian spent a decade in Silicon Valley working at huge companies and small startups. He has done research on a broad set of topics, ranging from integrated circuit design all the way to delivering software as a service.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, October 21st, 2009 7:30PM ==&lt;br /&gt;
* &amp;lt;b&amp;gt;[http://www.owasp.org/images/c/ca/ISO27001_OWASPLA_Shankar_10212009.pdf Enabling Compliance Requirements using Information Security Management System (ISMS) Framework (ISO27001)]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Growing threats and complex regulatory requirements emphasize the need for an effective Information Security Management System (ISMS) framework for an organization. Comprehensive and globally accepted standards like ISO27001 can help in protecting information assets and in enabling compliance requirements. ISO27001 provides an Information Security framework based on best practices and controls to ensure the confidentiality, integrity and availability of information assets. This presentation analyzes the possible synergies between the goals of Information Security Management System (ISMS) and the various compliance requirements, thus making the compliance efforts less complex. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Following are the key objectives of this presentation :&lt;br /&gt;
* Provide an introduction to ISO27001 and its controls&lt;br /&gt;
* Discuss the implementation approach for an Information Security Management System (ISMS) framework &lt;br /&gt;
* Familiarize the audience with some common challenges in implementation&lt;br /&gt;
* Outline synergy between ISO27001 controls and some compliance requirements( PCI , etc)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Attendees will learn about ISO27001 Information Security Standard, ISMS implementation approach and how ISO27001 can be used in meeting various regulatory/compliance requirements like Sox, PCI etc. It will also help the attendees to improve the information security posture of the organization and provide an effective and efficient approach for handling various information security/compliance audits with less effort.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Shankar Subramaniyan&amp;lt;/b&amp;gt; has over 11 years of experience as a technology consulting and project management executive in the areas of IT Governance, Risk and Compliance (GRC), Business Continuity Planning and Network Design &amp;amp; Architecture. He has thorough expertise on setting up Information Security Framework and Policies on the basis of industry standards such as ISO 27001. He has worked extensively on industry standards and best practices like BS7799 and ITIL.  He also has good understanding and knowledge of various compliance requirements like PCI, Sox etc. Shankar' s experience includes IT audit, SOX remediation, ISMS (ISO27001) implementation, PCI compliance assessment, disaster recovery solution, enterprise risk management, designing IT security architecture and implementing ITIL processes. Shankar has rich experience in handling large projects and managing client relationships across corporate and educational sectors.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, September 16th, 2009 7:30PM ==&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
On August 5th of 2009, Federal prosecutors on Monday charged Albert Gonzales with the largest case of credit and debit card data theft ever in the United States: 130 million credit cards numbers by hacking into the systems of Heartland Payment Systems, the New Jersey-based card processing company, as well as Hannaford Brothers, 7-Eleven and two unnamed national retailers. Using a SQL-injection attack, the hackers installed malware on Hannaford Brothers. Hannaford was PCI compliant at the time they were compromise that lets question the validity of regulatory compliance frameworks, and specifically PCI standards as an effective method to reduce data breaches, identity theft, and the proliferation of credit card fraud. This presentation will further analyze how status quo security standards, such as PCI-DSS, as well as other policies, standards, and guidelines truly affect security risk mitigation efforts against cybercrime based threats.  These traditional efforts will be compared to threat modeling workflows in order to demonstrate how real risk is mitigated under each scenario.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Cases for financial fraud will be anonymously presented to create a business case for application threat modeling as a viable methodology to drive improved application design and security risk mitigation.  Threat modeling concepts will be elaborated in order to prove how application architecture walkthroughs via threat modeling improve the mitigation of cybercrime threats. Attacker motives and goals will be presented and incorporated into attack trees and it will show how attack libraries can be used to effectively identify application vulnerabilities and devise countermeasures in web application.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
From the risk analysis perspective, several attacks will be considered and highlighted, particularly attacks that represent a systemic impact to an organization or government (such as for example a distributed denial of service).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Through the presentation of threat modeling scenarios, analyses and correlations will be drawn from the represented model(s) to attack patterns, associated and discovered security vulnerabilities, data sources, application topologies, and possible roles and permissions associated with the application environment. The purpose of the presentation is to demonstrate how application threat modeling can be used as part of a nouveau age form of security risk mitigation and overall application security.  Data flow diagrams and application walkthroughs will enable audience members to witness how application threat modeling is an evolved form of security process engineering for improved application design and overall application security.  The presentation will also demonstrate how threat modeling is capable of delivering critical business functions as well as in mitigating current and future cyber attacks, such as distributed denial of service, botnet driven-malware, spear phishing techniques, and more attacks that ultimately lead to identity and credit card fraud.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
From the point of view of current and future cybercrime risk mitigation, several different strategies for application threat modeling will be discussed as related to securing both the web application web and critical financial infrastructures, such as ATMs. Finally some emphasis will be given to countermeasures that provide for incident response, intelligence and forensics capabilities.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Presentation outline, defining all topics that will be covered:&lt;br /&gt;
* Status quo of regulatory compliance in mitigating risk&lt;br /&gt;
* Threat modeling techniques for cybercrime threats&lt;br /&gt;
* Attack tree analysis for attack tree vectors&lt;br /&gt;
* Threat modeling for multi-channel fraud threat scenarios&lt;br /&gt;
* Cyber crime threats and application countermeasures via threat modeling&lt;br /&gt;
* Example of mitigation strategies for cybercrime and application of defense in depth for web applications&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Any supporting research/tools:&lt;br /&gt;
* Threat models and attack trees&lt;br /&gt;
* Threat model are produced using the Microsoft™ threat modeling tool&lt;br /&gt;
* Public available cybercrime data will be presented and correlated&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Marco Morana&amp;lt;/b&amp;gt; serves as one of the leaders of OWASP (Open Web Application Security Project) organization where he is actively involved in evangelize on web application security through presentations at local chapter meetings in USA as well as internationally. Marco has recently been awarded a contract from Wiley Publishing to co-author a book on Application Threat Modeling.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Besides being the OWASP Cincinnati chapter lead, Marco is also active contributor to OWASP projects such as the application threat modeling methodology for secure coding guideline and the security testing guide (ver. 2 and 3). Besides contributing to OWASP, Marco works as Technology Information Security Officer for a large financial organization in North America with responsibilities in the definition of the organization web application security standards, management of application security assessments during the SDLC, threat-fraud analysis and training of software developers, project managers and architects on different topics related to application security. &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
In the past, Marco served as senior security consultant and independent consultant where his responsibilities included providing software security services for several clients in the financial and banking, telecommunications and commercial sector industry. Besides security consulting, Marco had a career as technologist in the security industry where he contributed to the design business critical security products currently being used by several FORTUNE 500 companies as well by the US Government. &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Marco work on software security is referred in the 2007 State Of the Art report by the Information Assurance Technology Analysis Center (IATAC). Marco received the NASA’s Space Act Award in 1999 for the patenting the S/MIME SEP (Secure Email Plug-in) application. &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Marco research work on application and software security is widely published on several magazines such as In-secure magazine, Secure Enterprise, ISSA Journal and the C/C++ Users journal. Marco’s ideas and strategies for writing secure software are posted on his blog: http://securesoftware.blogspot.com. &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tony UcedaVelez&amp;lt;/b&amp;gt; has more than 10 years of hands-on security and technology experience and is a vocal advocate of security process engineering – a terminology that describes the design and development of secure processes and controls working symbiotically to a unique business workflow.  Tony currenlty serves as Managing Director for an Atlanta based risk advisory firm that focuses on security strategy and delivering effective means for risk mitigation and security process engineering. He has worked and consulted for the Fortune 500, as well as federal agencies in the U.S on the topic of application security and security process engineering.  His diverse background in software development, security architecture, and network security, coupled with his expertise in process engineering and security risk management has allowed Tony to be a recognized leader in developing strategic security solutions that are multi-faceted in their approach to addressing enterprise risk.  &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
In the realm of application security, Tony is a threat modeling evangelist and has provided numerous talks domestically and globally on its many benefits and application.  He has served as a guest mentor to teams participating in Kennesaw State University’s annual Cybercrime capture the flag event as well as a Cybercrime speaker for Southern Polytechnic University in Atlanta.  He has also served as a guest speaker on the subject of application threat modeling during ISACA’s annual Geek Week event and has also served as a keynote speaker on the subject for ISACA’s Global Symposium web cast series.  Additional articles include articles related to CoBIT and the ValIT model (ISACA’s Journal), application threat modeling within the SDLC (InSecureMagazine), and security process engineering for a ROSI (return on security investment) (Journal of Finance).  He is currently finalizing a Wiley publishing book on Application Threat Modeling with Marco Morana.  &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to VerSprite, Tony served as Sr. Director of Security Risk Management to a Fortune 50 organization where he led security assessments against global application environments.  His work encompassed web application security testing, security architecture reviews, and analysis for business logic exploits.  He applied effective ways to introduce the subject of application risk to information owners by effectively mapping them to causal factors for business.  Previous to this role, he spent more than 5 years in the field of application security across other Fortune 500 organizations within the banking, telecom, and information service industry segments. &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Tony currently leads the OWASP Atlanta Chapter, where he manages monthly workshops and events for the Atlanta web application security community.  He also has developed a case study program for the Atlanta chapter in order to develop case studies with local Atlanta companies who are seeking to apply application threat modeling techniques within the SDLC and/ or incorporate the many OWASP produced tools and frameworks.  Tony can be reached at tonyuv@versprite.com or tonyuv@owasp.org. &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tuesday, August 25th, 2009 3:00PM ==&lt;br /&gt;
* &amp;lt;b&amp;gt;OWASP Live CD Demo and Q&amp;amp;A with Matt Tessauro&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Matt Tesauro will be in visiting our LA chapter and providing a quick demo of [http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project OWASP Live CD]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;B&amp;gt;Matt Tesauro&amp;lt;/B&amp;gt; has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP Live CD. &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Thursday, August 20th, 2009 7:30PM ==&lt;br /&gt;
* &amp;lt;b&amp;gt;The Software Assurance Maturity Model (SAMM)&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.opensamm.org/ The Software Assurance Maturity Model (SAMM)]&lt;br /&gt;
is a flexible and prescriptive framework for building security into a&lt;br /&gt;
software development organization. Covering more than typical&lt;br /&gt;
SDLC-based models for security, SAMM enables organizations to&lt;br /&gt;
self-assess their security assurance program and then use recommended&lt;br /&gt;
roadmaps to improve in a way that's aligned to the specific risks&lt;br /&gt;
facing the organization. Beyond that, SAMM enables creation of&lt;br /&gt;
scorecards for an organization's effectiveness at secure software&lt;br /&gt;
development throughout the typical governance, development, and&lt;br /&gt;
deployment business functions. Scorecards also enable management&lt;br /&gt;
within an organization to demonstrate quantitative improvements&lt;br /&gt;
through iterations of building a security assurance program. This&lt;br /&gt;
workshop will introduce the SAMM framework and walk through useful&lt;br /&gt;
activities such as assessing an assurance program, mapping an existing&lt;br /&gt;
organization to a recommended roadmap, and iteratively building an&lt;br /&gt;
assurance program. Time allowing, additional case studies will also be&lt;br /&gt;
discussed. SAMM is an open and free project and has recently been added&lt;br /&gt;
under the Open Web Application Security Project (OWASP) Foundation.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;Pravir Chandra&amp;lt;/b&amp;gt; is Director of Strategic Services at Fortify Software&lt;br /&gt;
and works with clients on software security assurance programs.&lt;br /&gt;
Pravir is recognized for his expertise in software security, code&lt;br /&gt;
analysis, and his ability to strategically apply technical knowledge.&lt;br /&gt;
Prior to Fortify, he was a Principal Consultant affiliated with&lt;br /&gt;
Cigital and led large software security programs at Fortune 500&lt;br /&gt;
companies.  Pravir Co-Founded Secure Software, Inc. and was Chief&lt;br /&gt;
Security Architect prior to its acquisition by Fortify.  He recently&lt;br /&gt;
created and led the Open Software Assurance Maturity Model (OpenSAMM)&lt;br /&gt;
project with the OWASP Foundation, leads the OWASP CLASP project, and&lt;br /&gt;
also serves as member of the OWASP Global Projects Committee. Pravir&lt;br /&gt;
is author of the book Network Security with OpenSSL.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tuesday, July 21st, 2009 7:30PM ==&lt;br /&gt;
* &amp;lt;b&amp;gt;Lock picks, BumpKeys, and Hackers oh my!  How secure is your application?&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This talk will focus on physical security controls, weaknesses, and counter measures.   I will present on what lock picking is, how bump keys work, and ways to subverting electronic locks.  We will also go into what are good controls, and what is often overlooked when designing secure environments.  Many of the topics covered apply to application security, as the methods for securing these devices is by using obscurity.  In the application world with automated tools and scripts, this does not hold water for very long.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;B&amp;gt;David M. N. Bryan, NetSPI&amp;lt;/b&amp;gt; has 10 years of computer security experience, including consulting, engineering, and administration.  He has performed security assessment projects in the healthcare, nuclear, manufacturing, pharmaceutical, banking and educational sectors.    &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
As an active participant in the information security community, he volunteers at DEFCON, where he designs and implements the firewall and network for what is said to be the most hostile network environment in the world. This network allows speakers, press, vendors, and others to gain access to the Internet, without being hacked.  In his spare time he and his wife run the local DEFCON group, DC612 and participate in the Minneapolis OWASP chapter.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== June 24th, 2009 7:30PM == &lt;br /&gt;
* &amp;lt;b&amp;gt;Information Warfare: Past, Present and Future&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Information warfare is the composite use of psychological operations&lt;br /&gt;
(PYOPS), military deception (MILDEC), operational security (OPSEC),&lt;br /&gt;
computer network operations (CNO), and electronic warfare (EW) to&lt;br /&gt;
control and disrupt information flow.  Recently, interest in&lt;br /&gt;
information war technologies, techniques and policy issues have&lt;br /&gt;
increased, especially in the domain of CNO.  Increased scrutiny over&lt;br /&gt;
network operations is both legitimate and valid, as global commerce&lt;br /&gt;
and military powers are integrated and dependent on the Internet for&lt;br /&gt;
critical operations. This presentation will describe the five domains&lt;br /&gt;
of information warfare, the past use of information warfare in the&lt;br /&gt;
Gulf war and recent Cyber attacks on the Eastern European countries of&lt;br /&gt;
Georgia and Estonia.  Information will be presented on possible new&lt;br /&gt;
directions of information warfare.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Mikhael Felker&amp;lt;/b&amp;gt;, CISSP-ISSEP has worked in a variety of roles including&lt;br /&gt;
instructor, engineer, and researcher.  He is currently employed by The&lt;br /&gt;
Aerospace Corporation in the Information Assurance Technology&lt;br /&gt;
Department, supporting Information Assurance (IA) for satellite&lt;br /&gt;
systems.  He is also an Instructor within the Computer &amp;amp; Information&lt;br /&gt;
Systems Division at UCLA Extension, teaching a course in networking.&lt;br /&gt;
Actively involved in the Los Angeles security community, he is the&lt;br /&gt;
Education Director for Los Angeles Chapter of Information Systems&lt;br /&gt;
Security Association (ISSA), member and speaker of Information Systems&lt;br /&gt;
Audit and Control Association (ISACA), and former Defense Sector&lt;br /&gt;
Coordinator for InfraGard.  Mikhael has published articles in IEEE&lt;br /&gt;
Security &amp;amp; Privacy, the ISSA Journal, Information Systems Control&lt;br /&gt;
Journal, and SecurityFocus.  He is a recipient of the Scholarship for&lt;br /&gt;
Service Program (SFS) Fellowship, sponsored by the National Science&lt;br /&gt;
Foundation and Department of Homeland Security (DHS).  Mikhael&lt;br /&gt;
completed his graduate work at Carnegie Mellon University with a&lt;br /&gt;
Master's in Information Security Policy &amp;amp; Management and Bachelor's at&lt;br /&gt;
UCLA in Computer Science.  He holds over 10 certifications in IT and&lt;br /&gt;
Security.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== May 20th, 2009 == &lt;br /&gt;
* &amp;lt;b&amp;gt;[http://video.google.com/videoplay?docid=2875886330538461390 Top Ten Web Hacking Techniques of 2008: &amp;quot;What's possible, not probable&amp;quot;] &amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The polls are closed, votes are in, and we have the winners making up the Top Ten Web Hacking Techniques of 2008! The competition was fierce with the newest and most innovative web hacking techniques to the test. This session will review the top ten hacks from 2008 - what they indicate about the security of the web, what they mean for businesses, and what might be used against us soon down the road.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Jeremiah Grossman&amp;lt;/b&amp;gt; is the founder and CTO of WhiteHat Security.  He is considered a world-renowned expert in Web security, is a co- founder of the Web Application Security Consortium, and was named to InfoWorld's Top 25 CTOs for 2007.  Grossman is a frequent speaker at industry events including the Black Hat Briefings, RSA, CSI, HiTB, OWASP, ISSA, and a number of large universities.  He has authored dozens of articles and white papers; is credited with the discovery of many cutting-edge attack and defensive techniques and is a co-author of XSS Attacks. Grossman is often quoted in the the business and technical press.  Prior to WhiteHat, Grossman was an information security officer at Yahoo!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== April 15th, 2009 ==&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Cross Site Scripting, Exploits and Defenses&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
For a long time, the impact of XSS vulnerabilities has been grossly underestimated. Recent compromises, such as the pro-Hillary [http://cyberinsecure.com/hacked-obama-site-redirects-visitors-to-clintons-site/ defacement] of Barack Obama's website, and a [http://www.securescience.net/twoubledtwitter.html Viral XSS in Twitter] demonstrated the impact of XSS vulnerabilities to the masses.&lt;br /&gt;
&lt;br /&gt;
During this presentation, David Campbell will demonstrate exactly how effective XSS vulns can be, and show you what you can do to protect yourself and your sites.&lt;br /&gt;
&lt;br /&gt;
This presentation was originally delivered to OWASP Colorado in May of 2008, and has been updated for this session.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:DC_ED_OWASP_XSS_MAY2008_v1.0.pdf Slide deck from May '08 talk]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;David Campbell&amp;lt;/b&amp;gt; is an infosec veteran, with experience ranging from penetration testing for Fortune 100's to architecting security solutions for large multinational financials to consulting for government agencies.  DC is presently chapter leader of OWASP Denver and is Principal Consultant at Electric Alchemy. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== March 12th, 2009 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;NETWORK SECURITY DINNER WITH ISSA - CISO'S Security Dashboard Panel!!&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This month will be joining forces with ISSA to create the &amp;lt;b&amp;gt;biggest netowork event for security professionals in Los Angeles&amp;lt;/b&amp;gt; for this year.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Agenda&amp;lt;/b&amp;gt;&lt;br /&gt;
* 5:30 p.m., Networking and tours of the antivirus facility&lt;br /&gt;
* 6:30 p.m., Dinner&lt;br /&gt;
* 7:30 p.m., CISO Panel&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Panelists&amp;lt;/b&amp;gt; &lt;br /&gt;
* Robert J. Brown, CISSP, CISO WestCorp Credit Union  &lt;br /&gt;
* Steve Haydostian, CISSP, Former CISO, Healthnet  &lt;br /&gt;
* David Lam, CISSP, CISO, Stephen S. Wise &lt;br /&gt;
* Edward G. Pagett II, CISSP, CISO, Lender Processing Services, Inc. &lt;br /&gt;
* Mike O. Villegas, CISA, CISSP, Director of Information Security, Newegg.com&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Dinner Fees:&amp;lt;/b&amp;gt;&lt;br /&gt;
* ISSA-LA members &amp;amp; OWASP members - Pre-Register and Pay online: $25&lt;br /&gt;
* ISSA-LA members &amp;amp; OWASP members - Pay at the door: $30&lt;br /&gt;
* Non-members - Pre-Register and Pay online: $30&lt;br /&gt;
* Non-members - Pay at the door: $35&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Thanks to David Lam and Stan Stahl for agreeing to have OWASP joining this ISSA LA event!&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== February 18th 2009 ==&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Cloud Computing and Security]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The Cloud Computing and Software as a Service models are driving many companies to build innovative, scalable and cost effective alternatives to the traditional IT computing model. Even with the potential cost and scalability benefits of cloud computing, its use by more traditional enterprises has been retarded by the concerns of their professional security and audit staffs. In our experience these concerns are legitimate, and although surveys have shown that security is the #1 factor preventing adoption of cloud computing, there has been very little reliable discussion of the technical security risks inherent in the model and how engineers, sys-admins and architects can deal with these risks.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
In this session, we will explore the widely differing security models of the leading cloud computing providers, including Amazon, Google and Salesforce. We will also reveal the significant differences in operational and application security practices necessary to deal with a cloud computing environment.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Alex Stamos&amp;lt;/b&amp;gt; is a co-founder and Partner at iSEC Partners Inc., a strategic digital security organization. Alex is an experienced security engineer specializing in solving difficult problems in application security and is a leading researcher in the field of web application and mobile security. He has been a featured speaker at top industry conferences such as Black Hat, Web 2.0 Expo, CanSecWest, DefCon, SyScan, SD Best Practices, Microsoft BlueHat and OWASP App Sec. Alex is a contributing author to &amp;quot;Hacking Exposed: Web 2.0&amp;quot; and an author of the upcoming book &amp;quot;Mobile Application Security&amp;quot;, both from McGraw-Hill. He holds a BSEE from the University of California, Berkeley.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== January 28th 2009 ==&lt;br /&gt;
&amp;lt;b&amp;gt;Building Security into the Test Organization&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The common approach to detecting web security issues is still the regular application of a post-release pen-test or tool based scan. These last minute examinations rarely live up to broader organizational goals; they can be difficult to repeat, measure, or optimize over time. Most of all they're expensive: they find bugs late in the lifecycle. This talk recommends moving security testing responsibility within the test team itself. The approach discussed will work with-or-without the existence of explicit security requirements. See how security testing has been applied at other organizations and how it might be customized for yours.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Ben Walther&amp;lt;/b&amp;gt; firmly believes testers have a wonderfully devious mindset, and has been promoting the idea of &amp;quot;security testing&amp;quot; at Cigital's clients, at OWASP events, and to any friends and relatives who will listen. To this end, with the aid of O'Reilly media, Ben Walther and Paco Hope recently published a book entitled the &amp;quot;Web Security Testing Cookbook.&amp;quot;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== December 10th 2008 ==&lt;br /&gt;
&amp;lt;b&amp;gt;[http://www.owasp.org/images/7/79/OWASP-WASCAppSec2007SanJose_SamyWorm.ppt The MySpace Worm]&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
The most virulent worm in the history of the series of tubes known as the Internet. One of the most highly accessed websites ever [see comScore]. One of the most ostentatious hackers alive. Over one million victims. Less than 24 hours. Fueled only by Chipotle burritos. The MySpace Worm.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Samy will be recapping the story of the development, release and eventual future of the MySpace worm. The 24 hours that led up to over one million friends. The eventual downfall of the MySpace site for several hours. The non-malicious intent and humorous progression of the worm. The t-shirts. The copycats. The behind-the-scenes story of the Secret Service raid at Samy's home and office. The demise of Samy's legal use of computers, community service, restitution, high-risk offender probation, and rehabilitation. And where Samy is today.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Samy Kamkar&amp;lt;/b&amp;gt;, software engineer and self-proclaimed playboy, is a meddler in the security and software realms. He is currently the Director of Engineering and co-founder of Fonality, Inc., an IP PBX startup located in Culver City. Previously, Samy led the development of all core top-level domain name server software and systems for Global Domains International (.ws). Prior to that, Samy worked with Penn State University developing psychometric personality assessment software with attention to artificial intelligence and bioinformatics. When not strapped behind the Matrix, Samy can be found performing parkour (free running), practicing urban escape artist maneuvers, or is found getting involved in local community service projects. In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in the areas of network security, reverse engineering, and network gaming, and continues his focus in staying out of jail.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== November 19th 2008 ==&lt;br /&gt;
&amp;lt;b&amp;gt;A new web attack vector: [http://www.eweek.com/c/a/Security/Security-Researcher-to-Reveal-New-Web-Attack-Vector/ Script Fragmentation]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce a new web-based attack vector which&lt;br /&gt;
utilizes client-side scripting to fragment malicious web content.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This involves distributing web exploits in a asynchronous manner to&lt;br /&gt;
evade signature detection. Similar to TCP fragmentation attacks, which&lt;br /&gt;
are still an issue in current IDS/IPS products, This attack vector&lt;br /&gt;
involves sending any web exploit in fragments and uses the already&lt;br /&gt;
existing components within the web browser to reassemble and execute&lt;br /&gt;
the exploit.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Our presentation will discuss this attack vector used to evade both&lt;br /&gt;
gateway and client side detection. We will show several proof of&lt;br /&gt;
concepts containing common readily available web exploits.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Stephan Chenette&amp;lt;/b&amp;gt; is a Senior Security Researcher who helps lead Websense Security&lt;br /&gt;
Labs working on malcode detection techniques. Mr. Chenette specializes&lt;br /&gt;
in research tools ranging from kernel-land sandboxes, to static&lt;br /&gt;
analysis scanners. He has released public analyses on various&lt;br /&gt;
vulnerabilities and malware. Prior to joining Websense, Stephan was a&lt;br /&gt;
security software engineer for 4 years working in research and product&lt;br /&gt;
development at eEye Digital Security.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== October 29th 2008 ==&lt;br /&gt;
&amp;lt;b&amp;gt;Entitlements Management: Security and policies for SOA using XML appliances&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loosely coupled Web Services can be insecure as, by their very nature, are exposed to application consumers. Security built into XML appliances alleviates the developer with the burden of coding security and policies into  their application, freeing the developer to concentrate on conding business processes.&lt;br /&gt;
This evenings meeting will discuss SOA security challenges and introduce the Layer7 XML appliance that allows for dynamic policies to be configured on the fly using an intuitive user interface.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Jonathan Gershater’s&amp;lt;/b&amp;gt; career started at 3Com, managing servers and networks. His initial foray into Enterprise Software began in 1999 at enCommerce, which was later acquired by Entrust. He worked at Sun Microsystems from  2005 to 2008 architecting and deploying identity solutions for customers using Sun Java System Identity products. He recently joined Layer 7 Technologies as a senior solution architect. &lt;br /&gt;
He can be reached at jgershater@layer7tech.com.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== September 17th 2008 ==&lt;br /&gt;
&amp;lt;b&amp;gt;The web hacking incident database (WHID) 2007 Report&amp;lt;/b&amp;gt; is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. The database classifies each reported attack by, among other criteria, the method used, the outcome of the attack and the industry and the country of the attacked organization. Based on the database Breach Labs which sponsors WHID issues a periodical report on trends in Web Application Security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
By providing answers to questions such as:&lt;br /&gt;
&lt;br /&gt;
* The drivers behind Web hacking.&lt;br /&gt;
* The technology hackers use.&lt;br /&gt;
* The types of organizations attacked most often.&lt;br /&gt;
* The common outcomes&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The presentation will discuss WHID statistics, focusing on rising trends in Web Attacks in the 1st half of 2008. As the WHID enables research into the business model behind hacking, the presentation goes beyond discussing the technical aspects of attacks such as SQL injection crawlers and Web Site herding, to discussing the business model common to all of the attacks: Economy of scale.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Ryan C. Barnett&amp;lt;/b&amp;gt; is a recognized security thought leader and evangelist who frequently speaks with the media and industry groups.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
He is the director of application security at Breach Security. He is also a faculty member for the SANS Institute, where his duties include instructor/courseware developer for Apache Security/Building a Web Application Firewall Workshop, Top 20 Vulnerabilities Team Member and Local Mentor for the SANS Track 4, &amp;quot;Hacker Techniques, Exploits and Incident Handling&amp;quot; course. He holds six SANS Global Information Assurance Certifications (GIAC): Intrusion Analyst (GCIA), Systems and Network Auditor (GSNA), Forensic Analyst (GCFA), Incident Handler (GCIH), Unix Security Administrator (GCUX) and Security Essentials (GSEC).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mr. Barnett also serves as the team lead for the Center for Internet Security Apache Benchmark Project and is a member of the Web Application Security Consortium. His web security book, &amp;quot;Preventing Web Attacks with Apache,” was published by Addison/Wesley in 2006.&lt;br /&gt;
&lt;br /&gt;
== August 19th 2008 ==&lt;br /&gt;
&amp;lt;b&amp;gt;&amp;quot;Don't Write Your Own Security Code&amp;quot;&amp;lt;/b&amp;gt; – Application security is arguably the most difficult IT challenge facing organizations today.  There are over 600 different categories of vulnerabilities to avoid and they are all tricky.  Most of these problems are related to the design, implementation, and use of a relatively small set of security controls.  To solve this problem for developers, Jeff created the OWASP ESAPI project – a clean intuitive toolbox of the core security building blocks that every web developer needs. In this talk, Jeff will show you how to create an ESAPI for your organization that will solve the OWASP Top Ten vulnerabilities, increase assurance, and dramatically cut costs all at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Jeff Williams&amp;lt;/b&amp;gt; is the founder and CEO of Aspect Security, specializing in application security services.  Jeff also serves as the volunteer Chair of the Open Web Application Security Project (OWASP).  Jeff has made extensive contributions to the application security community through OWASP, including the Top Ten, WebGoat, Stinger, Secure Software Contract Annex, Enterprise Security API, and the local chapters program. Jeff holds advanced degrees in psychology, computer science, and human factors, and graduated cum laude from Georgetown Law.&lt;/div&gt;</summary>
		<author><name>Cgoldsch</name></author>	</entry>

	</feed>