<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dharmeshmm</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dharmeshmm"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Dharmeshmm"/>
		<updated>2026-05-15T15:16:05Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=124044</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=124044"/>
				<updated>2012-02-10T09:23:16Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@owasp.org Dharmesh M Mehta] &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== e-Crime India Conference  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Ecrime-593x200-1.jpg|center|link=http://www.e-crimecongress.org/india/]]&lt;br /&gt;
&lt;br /&gt;
e-Crime India is the premier networking and knowledge initiative for those with responsibility for designing and coordinating security strategy, safeguarding digital assets, protecting customers, responding to incidents, and managing operations or investigations. Bringing together representatives of functions that include information security, IT, fraud, risk, investigations, CERT, audit, forensics, and compliance professionals the forum delivers critical information on protecting IT systems and electronic assets against existing attacks and emerging threats. &lt;br /&gt;
&lt;br /&gt;
Weblink: http://www.e-crimecongress.org/india/ &lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=118152</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=118152"/>
				<updated>2011-09-28T15:49:35Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:Dharmesh.Mehta@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== e-Crime India Conference  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Ecrime-593x200-1.jpg|center|link=http://www.e-crimecongress.org/india/]]&lt;br /&gt;
&lt;br /&gt;
e-Crime India is the premier networking and knowledge initiative for those with responsibility for designing and coordinating security strategy, safeguarding digital assets, protecting customers, responding to incidents, and managing operations or investigations. Bringing together representatives of functions that include information security, IT, fraud, risk, investigations, CERT, audit, forensics, and compliance professionals the forum delivers critical information on protecting IT systems and electronic assets against existing attacks and emerging threats. &lt;br /&gt;
&lt;br /&gt;
Weblink: http://www.e-crimecongress.org/india/ &lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=118150</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=118150"/>
				<updated>2011-09-28T15:41:13Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:Dharmesh.Mehta@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Mumbai Hosting the e-Crime India Forum  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Ecrime-593x200-1.jpg|center|link=http://www.e-crimecongress.org/india/]]&lt;br /&gt;
&lt;br /&gt;
e-Crime India is the premier networking and knowledge initiative for those with responsibility for designing and coordinating security strategy, safeguarding digital assets, protecting customers, responding to incidents, and managing operations or investigations. Bringing together representatives of functions that include information security, IT, fraud, risk, investigations, CERT, audit, forensics, and compliance professionals the forum delivers critical information on protecting IT systems and electronic assets against existing attacks and emerging threats. &lt;br /&gt;
&lt;br /&gt;
Weblink: http://www.e-crimecongress.org/india/ &lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Ecrime-593x200-1.jpg&amp;diff=118149</id>
		<title>File:Ecrime-593x200-1.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Ecrime-593x200-1.jpg&amp;diff=118149"/>
				<updated>2011-09-28T15:39:16Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: uploaded a new version of &amp;amp;quot;File:Ecrime-593x200-1.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Ecrime-593x200-1.jpg&amp;diff=118148</id>
		<title>File:Ecrime-593x200-1.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Ecrime-593x200-1.jpg&amp;diff=118148"/>
				<updated>2011-09-28T15:37:09Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: uploaded a new version of &amp;amp;quot;File:Ecrime-593x200-1.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ESAPI-JavaStatus&amp;diff=84954</id>
		<title>ESAPI-JavaStatus</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ESAPI-JavaStatus&amp;diff=84954"/>
				<updated>2010-06-16T11:52:39Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== ESAPI 2.0 Release issues ==&lt;br /&gt;
&lt;br /&gt;
* Make sure, at least, that the Swingset docs state that the code is out of date until we get caught up to the 2.0 release.&lt;br /&gt;
* Augment the Encoder &lt;br /&gt;
** new naming convention&lt;br /&gt;
** new fine grained url encoding functions&lt;br /&gt;
** DOM XSS encoding functions&lt;br /&gt;
* Ensure all units tests run successfully for Windows+Linux via Java 1.5.0_22&lt;br /&gt;
* Support for Data Preserving Encryption &lt;br /&gt;
* Split Swingset into 1.4 and 2.0 SwingSet&lt;br /&gt;
* Clean up Maven issues [http://code.google.com/p/owasp-esapi-java/issues/detail?id=63 http://code.google.com/p/owasp-esapi-java/issues/detail?id=63]&lt;br /&gt;
* Clean up issues around the validity of Safe File Upload classes and mechanism&lt;br /&gt;
* Other issues tracked via Google Code [http://code.google.com/p/owasp-esapi-java/issues/list here]&lt;br /&gt;
&lt;br /&gt;
== ESAPI 1.4 Release issues ==&lt;br /&gt;
* Upgrade 1.4 Maven configuration&lt;br /&gt;
* Fix Oracle encoder&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Dharmeshmm&amp;diff=84953</id>
		<title>User:Dharmeshmm</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Dharmeshmm&amp;diff=84953"/>
				<updated>2010-06-16T11:50:06Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: Blanked the page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=80346</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=80346"/>
				<updated>2010-03-23T12:26:07Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:Dharmesh.Mehta@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Ecrime-593x200-1.jpg&amp;diff=76312</id>
		<title>File:Ecrime-593x200-1.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Ecrime-593x200-1.jpg&amp;diff=76312"/>
				<updated>2010-01-15T05:04:25Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: uploaded a new version of &amp;quot;File:Ecrime-593x200-1.jpg&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=76311</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=76311"/>
				<updated>2010-01-15T05:02:40Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: /* Mumbai to Host India’s First e-Crime Forum */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:Dharmesh.Mehta@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Mumbai to Host India’s First e-Crime Forum  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Ecrime-593x200-1.jpg|center|link=http://www.vcindia.com/conf_ecrime_feb10.asp]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; On the '''23rd and 24th February''', a leading cyber crime security event, e-Crime India, will be staged in Mumbai for the first time. With the support of '''OWASP&amp;amp;nbsp;India''', '''Data Security CounciI of India (DSCI)''' and '''The Institution of Electronics and Telecommunication Engineers (IETE)''', the forum will be hosted at '''Hotel Novotel''', Juhu Beach, '''Mumbai'''. &lt;br /&gt;
&lt;br /&gt;
India’s foremost cyber crime experts and IT security professionals will convene to address the key challenges faced by the people whose job it is to tackle e-crime in India and issues connected with electronic risk. Internationally renowned Cyberlaw expert, Mr. Paven Duggal, will deliver a special address to the forum. Chief information security officers from leading banks, including Bank of India, ICICI, State Bank of India, Standard Chartered and HSBC, and global corporations such as Vodafone, Walt Disney, and Reliance Life, will join him on the podium. The forum will also hear presentations from leading academics and high-ranking law enforcement officials, including the senior inspector of police at Mumbai’s cyber police station. &lt;br /&gt;
&lt;br /&gt;
Over 250 senior decision makers from business, government, and law enforcement are expected to attend the event, which is being sponsored by organisations including HDFC Bank and Websense. &lt;br /&gt;
&lt;br /&gt;
As one of the most rapidly developing countries in the world, India has seen an enormous increase in internet users in recent years and accordingly e-crime in India has grown at an increasingly alarming rate, costing the Indian economy an estimated $50 billion annually. &lt;br /&gt;
&lt;br /&gt;
e-Crime India is a major initiative and is the newest member of the e-Crime Congress family of events following e-Crime Middle East, which was hosted in Abu Dhabi, December 2009. The e-Crime Congress, hosted annually in London attracting over 550 professionals from over 40 countries, recognises the need for international cooperation. Peter Brady, Business Development Manager of AKJ Associates, who organise the forum, says: ‘we are very happy to be coming to India, because cyber crime is a truly worldwide problem that is of concern to everyone. The e-Crime Congress has established a global reputation over the past eight years for its cutting edge agendas that deliver key information on the latest e-crime threats and practical guidance for overcoming them. We take pride in bringing together the right people to share information and combat cyber crime around the world collectively.’ Manoj Saha, Managing Editor of Dickenson Intellinetics, who are partnering AKJ Associates for e-Crime India, added: ‘as an organisation deeply involved with events related to financial markets, private equity and investment banking, e-crime India is a natural value adder to professionals in the Indian banking, corporate and financial markets - we are delighted to partner with AKJ Associates in making e-crime India the destination event that no security professional should miss.” &lt;br /&gt;
&lt;br /&gt;
[http://www.vcindia.com/conf_ecrime_feb10.asp Click Here For Complete Details On The Event] &lt;br /&gt;
&lt;br /&gt;
or http://www.e-crimecongress.org/india/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=76310</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=76310"/>
				<updated>2010-01-15T04:59:39Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:Dharmesh.Mehta@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Mumbai to Host India’s First e-Crime Forum  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Ecrime-593x200-1.jpg|center|link=http://www.vcindia.com/conf_ecrime_feb10.asp]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; On the'''23rd and 24th February''', a leading cyber crime security event, e-Crime India, will be staged in Mumbai for the first time. With the support of '''OWASP&amp;amp;nbsp;India''', '''Data Security CounciI of India (DSCI)''' and '''The Institution of Electronics and Telecommunication Engineers (IETE)''', the forum will be hosted at '''Hotel Novotel''', Juhu Beach, '''Mumbai'''. &lt;br /&gt;
&lt;br /&gt;
India’s foremost cyber crime experts and IT security professionals will convene to address the key challenges faced by the people whose job it is to tackle e-crime in India and issues connected with electronic risk. Internationally renowned Cyberlaw expert, Mr. Paven Duggal, will deliver a special address to the forum. Chief information security officers from leading banks, including Bank of India, ICICI, State Bank of India, Standard Chartered and HSBC, and global corporations such as Vodafone, Walt Disney, and Reliance Life, will join him on the podium. The forum will also hear presentations from leading academics and high-ranking law enforcement officials, including the senior inspector of police at Mumbai’s cyber police station. &lt;br /&gt;
&lt;br /&gt;
Over 250 senior decision makers from business, government, and law enforcement are expected to attend the event, which is being sponsored by organisations including HDFC Bank and Websense. &lt;br /&gt;
&lt;br /&gt;
As one of the most rapidly developing countries in the world, India has seen an enormous increase in internet users in recent years and accordingly e-crime in India has grown at an increasingly alarming rate, costing the Indian economy an estimated $50 billion annually. &lt;br /&gt;
&lt;br /&gt;
e-Crime India is a major initiative and is the newest member of the e-Crime Congress family of events following e-Crime Middle East, which was hosted in Abu Dhabi, December 2009. The e-Crime Congress, hosted annually in London attracting over 550 professionals from over 40 countries, recognises the need for international cooperation. Peter Brady, Business Development Manager of AKJ Associates, who organise the forum, says: ‘we are very happy to be coming to India, because cyber crime is a truly worldwide problem that is of concern to everyone. The e-Crime Congress has established a global reputation over the past eight years for its cutting edge agendas that deliver key information on the latest e-crime threats and practical guidance for overcoming them. We take pride in bringing together the right people to share information and combat cyber crime around the world collectively.’ Manoj Saha, Managing Editor of Dickenson Intellinetics, who are partnering AKJ Associates for e-Crime India, added: ‘as an organisation deeply involved with events related to financial markets, private equity and investment banking, e-crime India is a natural value adder to professionals in the Indian banking, corporate and financial markets - we are delighted to partner with AKJ Associates in making e-crime India the destination event that no security professional should miss.” &lt;br /&gt;
&lt;br /&gt;
[http://www.vcindia.com/conf_ecrime_feb10.asp Click Here For Complete Details On The Event] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=76309</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=76309"/>
				<updated>2010-01-15T04:55:24Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:Dharmesh.Mehta@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Mumbai to Host India’s First e-Crime Forum  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.vcindia.com/conf_ecrime_feb10.asp [[Image:Ecrime-593x200-1.jpg|center]]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; On the'''23rd and 24th February''', a leading cyber crime security event, e-Crime India, will be staged in Mumbai for the first time. With the support of '''OWASP&amp;amp;nbsp;India''', '''Data Security CounciI of India (DSCI)''' and '''The Institution of Electronics and Telecommunication Engineers (IETE)''', the forum will be hosted at '''Hotel Novotel''', Juhu Beach, '''Mumbai'''. &lt;br /&gt;
&lt;br /&gt;
India’s foremost cyber crime experts and IT security professionals will convene to address the key challenges faced by the people whose job it is to tackle e-crime in India and issues connected with electronic risk. Internationally renowned Cyberlaw expert, Mr. Paven Duggal, will deliver a special address to the forum. Chief information security officers from leading banks, including Bank of India, ICICI, State Bank of India, Standard Chartered and HSBC, and global corporations such as Vodafone, Walt Disney, and Reliance Life, will join him on the podium. The forum will also hear presentations from leading academics and high-ranking law enforcement officials, including the senior inspector of police at Mumbai’s cyber police station. &lt;br /&gt;
&lt;br /&gt;
Over 250 senior decision makers from business, government, and law enforcement are expected to attend the event, which is being sponsored by organisations including HDFC Bank and Websense. &lt;br /&gt;
&lt;br /&gt;
As one of the most rapidly developing countries in the world, India has seen an enormous increase in internet users in recent years and accordingly e-crime in India has grown at an increasingly alarming rate, costing the Indian economy an estimated $50 billion annually. &lt;br /&gt;
&lt;br /&gt;
e-Crime India is a major initiative and is the newest member of the e-Crime Congress family of events following e-Crime Middle East, which was hosted in Abu Dhabi, December 2009. The e-Crime Congress, hosted annually in London attracting over 550 professionals from over 40 countries, recognises the need for international cooperation. Peter Brady, Business Development Manager of AKJ Associates, who organise the forum, says: ‘we are very happy to be coming to India, because cyber crime is a truly worldwide problem that is of concern to everyone. The e-Crime Congress has established a global reputation over the past eight years for its cutting edge agendas that deliver key information on the latest e-crime threats and practical guidance for overcoming them. We take pride in bringing together the right people to share information and combat cyber crime around the world collectively.’ Manoj Saha, Managing Editor of Dickenson Intellinetics, who are partnering AKJ Associates for e-Crime India, added: ‘as an organisation deeply involved with events related to financial markets, private equity and investment banking, e-crime India is a natural value adder to professionals in the Indian banking, corporate and financial markets - we are delighted to partner with AKJ Associates in making e-crime India the destination event that no security professional should miss.” &lt;br /&gt;
&lt;br /&gt;
[http://www.vcindia.com/conf_ecrime_feb10.asp Click Here For Complete Details On The Event] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=76308</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=76308"/>
				<updated>2010-01-15T04:52:38Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:Dharmesh.Mehta@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Mumbai to Host India’s First e-Crime Forum  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Ecrime-593x200-1.jpg|center]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; On the'''23rd and 24th February''', a leading cyber crime security event, e-Crime India, will be staged in Mumbai for the first time. With the support of '''OWASP&amp;amp;nbsp;India''', '''Data Security CounciI of India (DSCI)''' and '''The Institution of Electronics and Telecommunication Engineers (IETE)''', the forum will be hosted at '''Hotel Novotel''', Juhu Beach, '''Mumbai'''. &lt;br /&gt;
&lt;br /&gt;
India’s foremost cyber crime experts and IT security professionals will convene to address the key challenges faced by the people whose job it is to tackle e-crime in India and issues connected with electronic risk. Internationally renowned Cyberlaw expert, Mr. Paven Duggal, will deliver a special address to the forum. Chief information security officers from leading banks, including Bank of India, ICICI, State Bank of India, Standard Chartered and HSBC, and global corporations such as Vodafone, Walt Disney, and Reliance Life, will join him on the podium. The forum will also hear presentations from leading academics and high-ranking law enforcement officials, including the senior inspector of police at Mumbai’s cyber police station. &lt;br /&gt;
&lt;br /&gt;
Over 250 senior decision makers from business, government, and law enforcement are expected to attend the event, which is being sponsored by organisations including HDFC Bank and Websense. &lt;br /&gt;
&lt;br /&gt;
As one of the most rapidly developing countries in the world, India has seen an enormous increase in internet users in recent years and accordingly e-crime in India has grown at an increasingly alarming rate, costing the Indian economy an estimated $50 billion annually. &lt;br /&gt;
&lt;br /&gt;
e-Crime India is a major initiative and is the newest member of the e-Crime Congress family of events following e-Crime Middle East, which was hosted in Abu Dhabi, December 2009. The e-Crime Congress, hosted annually in London attracting over 550 professionals from over 40 countries, recognises the need for international cooperation. Peter Brady, Business Development Manager of AKJ Associates, who organise the forum, says: ‘we are very happy to be coming to India, because cyber crime is a truly worldwide problem that is of concern to everyone. The e-Crime Congress has established a global reputation over the past eight years for its cutting edge agendas that deliver key information on the latest e-crime threats and practical guidance for overcoming them. We take pride in bringing together the right people to share information and combat cyber crime around the world collectively.’ Manoj Saha, Managing Editor of Dickenson Intellinetics, who are partnering AKJ Associates for e-Crime India, added: ‘as an organisation deeply involved with events related to financial markets, private equity and investment banking, e-crime India is a natural value adder to professionals in the Indian banking, corporate and financial markets - we are delighted to partner with AKJ Associates in making e-crime India the destination event that no security professional should miss.” &lt;br /&gt;
&lt;br /&gt;
[http://www.vcindia.com/conf_ecrime_feb10.asp Click Here For Complete Details On The Event] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=76307</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=76307"/>
				<updated>2010-01-15T04:52:02Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Mumbai to Host India’s First e-Crime Forum  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Ecrime-593x200-1.jpg|center]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; On the'''23rd and 24th February''', a leading cyber crime security event, e-Crime India, will be staged in Mumbai for the first time. With the support of '''OWASP&amp;amp;nbsp;India''', '''Data Security CounciI of India (DSCI)''' and '''The Institution of Electronics and Telecommunication Engineers (IETE)''', the forum will be hosted at '''Hotel Novotel''', Juhu Beach, '''Mumbai'''. &lt;br /&gt;
&lt;br /&gt;
India’s foremost cyber crime experts and IT security professionals will convene to address the key challenges faced by the people whose job it is to tackle e-crime in India and issues connected with electronic risk. Internationally renowned Cyberlaw expert, Mr. Paven Duggal, will deliver a special address to the forum. Chief information security officers from leading banks, including Bank of India, ICICI, State Bank of India, Standard Chartered and HSBC, and global corporations such as Vodafone, Walt Disney, and Reliance Life, will join him on the podium. The forum will also hear presentations from leading academics and high-ranking law enforcement officials, including the senior inspector of police at Mumbai’s cyber police station. &lt;br /&gt;
&lt;br /&gt;
Over 250 senior decision makers from business, government, and law enforcement are expected to attend the event, which is being sponsored by organisations including HDFC Bank and Websense. &lt;br /&gt;
&lt;br /&gt;
As one of the most rapidly developing countries in the world, India has seen an enormous increase in internet users in recent years and accordingly e-crime in India has grown at an increasingly alarming rate, costing the Indian economy an estimated $50 billion annually. &lt;br /&gt;
&lt;br /&gt;
e-Crime India is a major initiative and is the newest member of the e-Crime Congress family of events following e-Crime Middle East, which was hosted in Abu Dhabi, December 2009. The e-Crime Congress, hosted annually in London attracting over 550 professionals from over 40 countries, recognises the need for international cooperation. Peter Brady, Business Development Manager of AKJ Associates, who organise the forum, says: ‘we are very happy to be coming to India, because cyber crime is a truly worldwide problem that is of concern to everyone. The e-Crime Congress has established a global reputation over the past eight years for its cutting edge agendas that deliver key information on the latest e-crime threats and practical guidance for overcoming them. We take pride in bringing together the right people to share information and combat cyber crime around the world collectively.’ Manoj Saha, Managing Editor of Dickenson Intellinetics, who are partnering AKJ Associates for e-Crime India, added: ‘as an organisation deeply involved with events related to financial markets, private equity and investment banking, e-crime India is a natural value adder to professionals in the Indian banking, corporate and financial markets - we are delighted to partner with AKJ Associates in making e-crime India the destination event that no security professional should miss.” &lt;br /&gt;
&lt;br /&gt;
[http://www.vcindia.com/conf_ecrime_feb10.asp Click Here For Complete Details On The Event] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=76306</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=76306"/>
				<updated>2010-01-15T04:50:28Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:Dharmesh.Mehta@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt; Dharmesh Mehta&amp;lt;br&amp;gt; Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt; SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt; +91 9730002132&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Mumbai to Host India’s First e-Crime Forum  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Ecrime-593x200-1.jpg|center]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; On the'''23rd and 24th February''', a leading cyber crime security event, e-Crime India, will be staged in Mumbai for the first time. With the support of '''OWASP&amp;amp;nbsp;India''', '''Data Security CounciI of India (DSCI)''' and '''The Institution of Electronics and Telecommunication Engineers (IETE)''', the forum will be hosted at '''Hotel Novotel''', Juhu Beach, '''Mumbai'''. &lt;br /&gt;
&lt;br /&gt;
India’s foremost cyber crime experts and IT security professionals will convene to address the key challenges faced by the people whose job it is to tackle e-crime in India and issues connected with electronic risk. Internationally renowned Cyberlaw expert, Mr. Paven Duggal, will deliver a special address to the forum. Chief information security officers from leading banks, including Bank of India, ICICI, State Bank of India, Standard Chartered and HSBC, and global corporations such as Vodafone, Walt Disney, and Reliance Life, will join him on the podium. The forum will also hear presentations from leading academics and high-ranking law enforcement officials, including the senior inspector of police at Mumbai’s cyber police station. &lt;br /&gt;
&lt;br /&gt;
Over 250 senior decision makers from business, government, and law enforcement are expected to attend the event, which is being sponsored by organisations including HDFC Bank and Websense. &lt;br /&gt;
&lt;br /&gt;
As one of the most rapidly developing countries in the world, India has seen an enormous increase in internet users in recent years and accordingly e-crime in India has grown at an increasingly alarming rate, costing the Indian economy an estimated $50 billion annually. &lt;br /&gt;
&lt;br /&gt;
e-Crime India is a major initiative and is the newest member of the e-Crime Congress family of events following e-Crime Middle East, which was hosted in Abu Dhabi, December 2009. The e-Crime Congress, hosted annually in London attracting over 550 professionals from over 40 countries, recognises the need for international cooperation. Peter Brady, Business Development Manager of AKJ Associates, who organise the forum, says: ‘we are very happy to be coming to India, because cyber crime is a truly worldwide problem that is of concern to everyone. The e-Crime Congress has established a global reputation over the past eight years for its cutting edge agendas that deliver key information on the latest e-crime threats and practical guidance for overcoming them. We take pride in bringing together the right people to share information and combat cyber crime around the world collectively.’ Manoj Saha, Managing Editor of Dickenson Intellinetics, who are partnering AKJ Associates for e-Crime India, added: ‘as an organisation deeply involved with events related to financial markets, private equity and investment banking, e-crime India is a natural value adder to professionals in the Indian banking, corporate and financial markets - we are delighted to partner with AKJ Associates in making e-crime India the destination event that no security professional should miss.” &lt;br /&gt;
&lt;br /&gt;
[http://www.vcindia.com/conf_ecrime_feb10.asp Click Here For Complete Details On The Event] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Ecrime-593x200-1.jpg&amp;diff=76305</id>
		<title>File:Ecrime-593x200-1.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Ecrime-593x200-1.jpg&amp;diff=76305"/>
				<updated>2010-01-15T04:36:19Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=61733</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=61733"/>
				<updated>2009-05-25T10:34:48Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:Dharmesh.Mehta@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
+91 9730002132&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
10. Testing Large Number of Applications - '''Madhumita Iyer''', Paladion Networks&lt;br /&gt;
[[https://www.owasp.org/images/0/04/Owasp_Mumbai_9_22_08_MadhumitaIyer.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
11. Wireless Security - '''Sheetal Joseph''', Tech Mahindra&lt;br /&gt;
[[https://www.owasp.org/images/e/e5/OWASP_Mumbai_2008.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, works with the Application Security Assurance Team at Mastek. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
11. '''Madhumita Iyer''' – Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing, Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
&lt;br /&gt;
12. '''Sheetal Joseph''' – Security Consultant, TechMahindra. She is a subject matter expert for internal line of business clients and external suppliers for security mitigation and maintenance of their internal control environment over data center operations, system development, change management, incident management and contingency planning. She is Prince2 Registered Practitioner, CISSP, CEH, BS7799 Lead Auditor and holds many more certifications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=56427</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=56427"/>
				<updated>2009-03-10T11:54:23Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
+91 9730002132&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
10. Testing Large Number of Applications - '''Madhumita Iyer''', Paladion Networks&lt;br /&gt;
[[https://www.owasp.org/images/0/04/Owasp_Mumbai_9_22_08_MadhumitaIyer.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
11. Wireless Security - '''Sheetal Joseph''', Tech Mahindra&lt;br /&gt;
[[https://www.owasp.org/images/e/e5/OWASP_Mumbai_2008.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, works with the Application Security Assurance Team at Mastek. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
11. '''Madhumita Iyer''' – Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing, Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
&lt;br /&gt;
12. '''Sheetal Joseph''' – Security Consultant, TechMahindra. She is a subject matter expert for internal line of business clients and external suppliers for security mitigation and maintenance of their internal control environment over data center operations, system development, change management, incident management and contingency planning. She is Prince2 Registered Practitioner, CISSP, CEH, BS7799 Lead Auditor and holds many more certifications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=54551</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=54551"/>
				<updated>2009-02-17T04:09:44Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
+91 9730002132&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP Mumbai Chapter Meeting ==&lt;br /&gt;
&lt;br /&gt;
  '''Date: Tentative in March 2009 &lt;br /&gt;
&lt;br /&gt;
  '''Venue: To be declared soon !! ''' &lt;br /&gt;
&lt;br /&gt;
  '''Call for Presentations: OWASP Mumbai March 2009 Meet&lt;br /&gt;
 OWASP Mumbai Chapter calls for papers for presentation for its upcoming meet in March 2009.  &lt;br /&gt;
 If you are interested in speaking at the event, sharing your thoughts, send in your topic brief (100 words) and your brief profile.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
  '''Interested in Sponsoring??&lt;br /&gt;
 Send a mail to dharmeshmm at owasp dot org to understand the sponsorship details. '''&lt;br /&gt;
&lt;br /&gt;
  '''Registrations OPEN !!&lt;br /&gt;
 &lt;br /&gt;
 OWASP Chapter Meetings are FREE to attend. &lt;br /&gt;
 Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.&lt;br /&gt;
 Your Name:&lt;br /&gt;
 Your Organization/Institution:&lt;br /&gt;
 Your Designation:&lt;br /&gt;
 Your Contact No.:&lt;br /&gt;
&lt;br /&gt;
  '''Event Sponsors : Sun StartUp Essentials &amp;amp; Mastek '''&lt;br /&gt;
&lt;br /&gt;
[http://in.sun.com/emrkt/startupessentials/index.jsp https://www.owasp.org/images/8/8e/SunStartupEssentials.jpg]&lt;br /&gt;
&lt;br /&gt;
Sun StartUp Essentials - The Sun StartUp Essentials program is designed specifically to help startups get off the ground rapidly and at lower cost. The program consists of discounted or free products and services designed with startups in mind. In addition a quick application and online catalogue delivers what you need fast. Website: in.sun.com/startupessentials/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.mastek.com https://www.owasp.org/images/f/fe/Mastek_logo.gif]&lt;br /&gt;
&lt;br /&gt;
Mastek is an international software solutions and integration services provider that designs, develops, integrates and maintains business applications to enable enterprises to solve complex, mission-critical business problems. Mastek also provides Application Security Consulting and Services like Defense Solutions, Secure Design Reviews, Application Security Workshops and Web Application Security Assessments. Website: www.mastek.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
10. Testing Large Number of Applications - '''Madhumita Iyer''', Paladion Networks&lt;br /&gt;
[[https://www.owasp.org/images/0/04/Owasp_Mumbai_9_22_08_MadhumitaIyer.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
11. Wireless Security - '''Sheetal Joseph''', Tech Mahindra&lt;br /&gt;
[[https://www.owasp.org/images/e/e5/OWASP_Mumbai_2008.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, works with the Application Security Assurance Team at Mastek. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
11. '''Madhumita Iyer''' – Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing, Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
&lt;br /&gt;
12. '''Sheetal Joseph''' – Security Consultant, TechMahindra. She is a subject matter expert for internal line of business clients and external suppliers for security mitigation and maintenance of their internal control environment over data center operations, system development, change management, incident management and contingency planning. She is Prince2 Registered Practitioner, CISSP, CEH, BS7799 Lead Auditor and holds many more certifications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=54550</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=54550"/>
				<updated>2009-02-17T04:09:15Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
+91 9730002132&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP Mumbai Chapter Meeting ==&lt;br /&gt;
&lt;br /&gt;
  '''Date: Tentative in March 2009 &lt;br /&gt;
&lt;br /&gt;
  '''Venue: To be declared soon !! ''' &lt;br /&gt;
&lt;br /&gt;
  '''Call for Presentations: OWASP Mumbai February 2009 Meet&lt;br /&gt;
 OWASP Mumbai Chapter calls for papers for presentation for its upcoming meet in March 2009.  &lt;br /&gt;
 If you are interested in speaking at the event, sharing your thoughts, send in your topic brief (100 words) and your brief profile.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
  '''Interested in Sponsoring??&lt;br /&gt;
 Send a mail to dharmeshmm at owasp dot org to understand the sponsorship details. '''&lt;br /&gt;
&lt;br /&gt;
  '''Registrations OPEN !!&lt;br /&gt;
 &lt;br /&gt;
 OWASP Chapter Meetings are FREE to attend. &lt;br /&gt;
 Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.&lt;br /&gt;
 Your Name:&lt;br /&gt;
 Your Organization/Institution:&lt;br /&gt;
 Your Designation:&lt;br /&gt;
 Your Contact No.:&lt;br /&gt;
&lt;br /&gt;
  '''Event Sponsors : Sun StartUp Essentials &amp;amp; Mastek '''&lt;br /&gt;
&lt;br /&gt;
[http://in.sun.com/emrkt/startupessentials/index.jsp https://www.owasp.org/images/8/8e/SunStartupEssentials.jpg]&lt;br /&gt;
&lt;br /&gt;
Sun StartUp Essentials - The Sun StartUp Essentials program is designed specifically to help startups get off the ground rapidly and at lower cost. The program consists of discounted or free products and services designed with startups in mind. In addition a quick application and online catalogue delivers what you need fast. Website: in.sun.com/startupessentials/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.mastek.com https://www.owasp.org/images/f/fe/Mastek_logo.gif]&lt;br /&gt;
&lt;br /&gt;
Mastek is an international software solutions and integration services provider that designs, develops, integrates and maintains business applications to enable enterprises to solve complex, mission-critical business problems. Mastek also provides Application Security Consulting and Services like Defense Solutions, Secure Design Reviews, Application Security Workshops and Web Application Security Assessments. Website: www.mastek.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
10. Testing Large Number of Applications - '''Madhumita Iyer''', Paladion Networks&lt;br /&gt;
[[https://www.owasp.org/images/0/04/Owasp_Mumbai_9_22_08_MadhumitaIyer.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
11. Wireless Security - '''Sheetal Joseph''', Tech Mahindra&lt;br /&gt;
[[https://www.owasp.org/images/e/e5/OWASP_Mumbai_2008.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, works with the Application Security Assurance Team at Mastek. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
11. '''Madhumita Iyer''' – Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing, Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
&lt;br /&gt;
12. '''Sheetal Joseph''' – Security Consultant, TechMahindra. She is a subject matter expert for internal line of business clients and external suppliers for security mitigation and maintenance of their internal control environment over data center operations, system development, change management, incident management and contingency planning. She is Prince2 Registered Practitioner, CISSP, CEH, BS7799 Lead Auditor and holds many more certifications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=53226</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=53226"/>
				<updated>2009-02-07T12:57:01Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
+91 9730002132&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP Mumbai Chapter Meeting ==&lt;br /&gt;
&lt;br /&gt;
  '''Date: Tentative on 18th Feb / 25th Feb 2009 &lt;br /&gt;
&lt;br /&gt;
  '''Venue: To be declared soon !! ''' &lt;br /&gt;
&lt;br /&gt;
  '''Call for Presentations: OWASP Mumbai February 2009 Meet&lt;br /&gt;
 OWASP Mumbai Chapter calls for papers for presentation for its upcoming meet in February 2009.  &lt;br /&gt;
 If you are interested in speaking at the event, sharing your thoughts, send in your topic brief (100 words) and your brief profile.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
  '''Interested in Sponsoring??&lt;br /&gt;
 Send a mail to dharmeshmm at owasp dot org to understand the sponsorship details. '''&lt;br /&gt;
&lt;br /&gt;
  '''Registrations OPEN !!&lt;br /&gt;
 &lt;br /&gt;
 OWASP Chapter Meetings are FREE to attend. &lt;br /&gt;
 Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.&lt;br /&gt;
 Your Name:&lt;br /&gt;
 Your Organization/Institution:&lt;br /&gt;
 Your Designation:&lt;br /&gt;
 Your Contact No.:&lt;br /&gt;
&lt;br /&gt;
  '''Event Sponsors : Sun StartUp Essentials &amp;amp; Mastek '''&lt;br /&gt;
&lt;br /&gt;
[http://in.sun.com/emrkt/startupessentials/index.jsp https://www.owasp.org/images/8/8e/SunStartupEssentials.jpg]&lt;br /&gt;
&lt;br /&gt;
Sun StartUp Essentials - The Sun StartUp Essentials program is designed specifically to help startups get off the ground rapidly and at lower cost. The program consists of discounted or free products and services designed with startups in mind. In addition a quick application and online catalogue delivers what you need fast. Website: in.sun.com/startupessentials/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.mastek.com https://www.owasp.org/images/f/fe/Mastek_logo.gif]&lt;br /&gt;
&lt;br /&gt;
Mastek is an international software solutions and integration services provider that designs, develops, integrates and maintains business applications to enable enterprises to solve complex, mission-critical business problems. Mastek also provides Application Security Consulting and Services like Defense Solutions, Secure Design Reviews, Application Security Workshops and Web Application Security Assessments. Website: www.mastek.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
10. Testing Large Number of Applications - '''Madhumita Iyer''', Paladion Networks&lt;br /&gt;
[[https://www.owasp.org/images/0/04/Owasp_Mumbai_9_22_08_MadhumitaIyer.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
11. Wireless Security - '''Sheetal Joseph''', Tech Mahindra&lt;br /&gt;
[[https://www.owasp.org/images/e/e5/OWASP_Mumbai_2008.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, works with the Application Security Assurance Team at Mastek. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
11. '''Madhumita Iyer''' – Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing, Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
&lt;br /&gt;
12. '''Sheetal Joseph''' – Security Consultant, TechMahindra. She is a subject matter expert for internal line of business clients and external suppliers for security mitigation and maintenance of their internal control environment over data center operations, system development, change management, incident management and contingency planning. She is Prince2 Registered Practitioner, CISSP, CEH, BS7799 Lead Auditor and holds many more certifications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=53225</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=53225"/>
				<updated>2009-02-07T12:47:33Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
+91 9730002132&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP Mumbai Chapter Meeting ==&lt;br /&gt;
&lt;br /&gt;
  '''Date: Tentative on 18th Feb / 25th Feb 2009 &lt;br /&gt;
&lt;br /&gt;
  '''Venue: To be declared soon !! ''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Call for Presentations: OWASP Mumbai February 2009 Meet&amp;lt;/u&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 OWASP Mumbai Chapter calls for papers for presentation for its upcoming meet in February 2009.  &lt;br /&gt;
 If you are interested in speaking at the event, sharing your thoughts, send in your topic brief (100 words) and your brief profile.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
  '''Event Sponsors : Sun StartUp Essentials &amp;amp; Mastek '''&lt;br /&gt;
&lt;br /&gt;
[http://in.sun.com/emrkt/startupessentials/index.jsp https://www.owasp.org/images/8/8e/SunStartupEssentials.jpg]&lt;br /&gt;
&lt;br /&gt;
Sun StartUp Essentials - The Sun StartUp Essentials program is designed specifically to help startups get off the ground rapidly and at lower cost. The program consists of discounted or free products and services designed with startups in mind. In addition a quick application and online catalogue delivers what you need fast. Website: in.sun.com/startupessentials/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.mastek.com https://www.owasp.org/images/f/fe/Mastek_logo.gif]&lt;br /&gt;
&lt;br /&gt;
Mastek is an international software solutions and integration services provider that designs, develops, integrates and maintains business applications to enable enterprises to solve complex, mission-critical business problems. Mastek also provides Application Security Consulting and Services like Defense Solutions, Secure Design Reviews, Application Security Workshops and Web Application Security Assessments. Website: www.mastek.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Interested in Sponsoring??&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Send a mail to dharmeshmm at owasp dot org to understand the sponsorship details.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Registrations OPEN !!&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 OWASP Chapter Meetings are FREE to attend. &lt;br /&gt;
 Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.&lt;br /&gt;
 Your Name:&lt;br /&gt;
 Your Organization/Institution:&lt;br /&gt;
 Your Designation:&lt;br /&gt;
 Your Contact No.:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
10. Testing Large Number of Applications - '''Madhumita Iyer''', Paladion Networks&lt;br /&gt;
[[https://www.owasp.org/images/0/04/Owasp_Mumbai_9_22_08_MadhumitaIyer.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
11. Wireless Security - '''Sheetal Joseph''', Tech Mahindra&lt;br /&gt;
[[https://www.owasp.org/images/e/e5/OWASP_Mumbai_2008.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, works with the Application Security Assurance Team at Mastek. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
11. '''Madhumita Iyer''' – Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing, Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
&lt;br /&gt;
12. '''Sheetal Joseph''' – Security Consultant, TechMahindra. She is a subject matter expert for internal line of business clients and external suppliers for security mitigation and maintenance of their internal control environment over data center operations, system development, change management, incident management and contingency planning. She is Prince2 Registered Practitioner, CISSP, CEH, BS7799 Lead Auditor and holds many more certifications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SunStartupEssentials.jpg&amp;diff=53224</id>
		<title>File:SunStartupEssentials.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SunStartupEssentials.jpg&amp;diff=53224"/>
				<updated>2009-02-07T12:45:18Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Sun.gif&amp;diff=53223</id>
		<title>File:Sun.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Sun.gif&amp;diff=53223"/>
				<updated>2009-02-07T12:41:49Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: SUN Startup Logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SUN Startup Logo&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=45278</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=45278"/>
				<updated>2008-10-31T17:02:53Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
+91 9730002132&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
10. Testing Large Number of Applications - '''Madhumita Iyer''', Paladion Networks&lt;br /&gt;
[[https://www.owasp.org/images/0/04/Owasp_Mumbai_9_22_08_MadhumitaIyer.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
11. Wireless Security - '''Sheetal Joseph''', Tech Mahindra&lt;br /&gt;
[[https://www.owasp.org/images/e/e5/OWASP_Mumbai_2008.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, works with the Application Security Assurance Team at Mastek. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
11. '''Madhumita Iyer''' – Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing, Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
&lt;br /&gt;
12. '''Sheetal Joseph''' – Security Consultant, TechMahindra. She is a subject matter expert for internal line of business clients and external suppliers for security mitigation and maintenance of their internal control environment over data center operations, system development, change management, incident management and contingency planning. She is Prince2 Registered Practitioner, CISSP, CEH, BS7799 Lead Auditor and holds many more certifications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=45107</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=45107"/>
				<updated>2008-10-30T04:16:45Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (+91 9730002132) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Mumbai&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
+91 9730002132&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
10. Testing Large Number of Applications - '''Madhumita Iyer''', Paladion Networks&lt;br /&gt;
[[https://www.owasp.org/images/0/04/Owasp_Mumbai_9_22_08_MadhumitaIyer.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
11. Wireless Security - '''Sheetal Joseph''', Tech Mahindra&lt;br /&gt;
[[https://www.owasp.org/images/e/e5/OWASP_Mumbai_2008.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
11. '''Madhumita Iyer''' – Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing, Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
&lt;br /&gt;
12. '''Sheetal Joseph''' – Security Consultant, TechMahindra. She is a subject matter expert for internal line of business clients and external suppliers for security mitigation and maintenance of their internal control environment over data center operations, system development, change management, incident management and contingency planning. She is Prince2 Registered Practitioner, CISSP, CEH, BS7799 Lead Auditor and holds many more certifications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=41024</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=41024"/>
				<updated>2008-09-24T12:37:33Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (91-98670-75327) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
91-98670-75327&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
10. Testing Large Number of Applications - '''Madhumita Iyer''', Paladion Networks&lt;br /&gt;
[[https://www.owasp.org/images/0/04/Owasp_Mumbai_9_22_08_MadhumitaIyer.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
11. Wireless Security - '''Sheetal Joseph''', Tech Mahindra&lt;br /&gt;
[[https://www.owasp.org/images/e/e5/OWASP_Mumbai_2008.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
11. '''Madhumita Iyer''' – Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing, Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
&lt;br /&gt;
12. '''Sheetal Joseph''' – Security Consultant, TechMahindra. She is a subject matter expert for internal line of business clients and external suppliers for security mitigation and maintenance of their internal control environment over data center operations, system development, change management, incident management and contingency planning. She is Prince2 Registered Practitioner, CISSP, CEH, BS7799 Lead Auditor and holds many more certifications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp_Mumbai_9_22_08_MadhumitaIyer.pdf&amp;diff=41022</id>
		<title>File:Owasp Mumbai 9 22 08 MadhumitaIyer.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp_Mumbai_9_22_08_MadhumitaIyer.pdf&amp;diff=41022"/>
				<updated>2008-09-24T12:31:29Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Mumbai_2008.pdf&amp;diff=41021</id>
		<title>File:OWASP Mumbai 2008.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Mumbai_2008.pdf&amp;diff=41021"/>
				<updated>2008-09-24T12:29:05Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=40292</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=40292"/>
				<updated>2008-09-17T17:01:53Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (91-98670-75327) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
91-98670-75327&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP Mumbai Chapter Meeting ==&lt;br /&gt;
&lt;br /&gt;
  '''Date: 22nd September, 2008 - Monday&lt;br /&gt;
&lt;br /&gt;
  '''Timing: 2:30 PM to 5:30 PM '''&lt;br /&gt;
&lt;br /&gt;
  '''Event Agenda''' &lt;br /&gt;
  2:30 PM - 2:45 PM Registrations &lt;br /&gt;
  2:45 PM - 3:00 PM Welcome Note - Anuradha Srinivasan, Mastek &lt;br /&gt;
  3:00 PM - 4:00 PM Testing Large Volume of Apps - Madhumita Iyer, Paladion Networks &lt;br /&gt;
  4:00 PM - 5:00 PM Wireless Security - Sheetal Joseph, TechMahindra  &lt;br /&gt;
  5:00 PM - 5:30 PM Snacks &amp;amp; Networking &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Speakers for the Meeting&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  '''Topic: Testing Large Volume of Apps - Notes from the Field'''&lt;br /&gt;
  Speaker : Madhumita Iyer, Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing,&lt;br /&gt;
  Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application&lt;br /&gt;
  pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
&lt;br /&gt;
  '''Topic: Wireless Security'''&lt;br /&gt;
  Speaker : Sheetal Joseph, Security Consultant, TechMahindra. She is a subject matter expert for internal line of business clients &lt;br /&gt;
  and external suppliers for security mitigation and maintenance of their internal control environment over data center operations, &lt;br /&gt;
  system development, change management, incident management and contingency planning. She is Prince2 Registered Practitioner, &lt;br /&gt;
  CISSP, CEH, BS7799 Lead Auditor and holds many more certifications. &lt;br /&gt;
&lt;br /&gt;
  '''Event Sponsors : K-Secure &amp;amp; Mastek '''&lt;br /&gt;
&lt;br /&gt;
[http://www.ksecure.net https://www.owasp.org/images/c/c9/KSecure.gif]&lt;br /&gt;
&lt;br /&gt;
K-Secure - is a leading provider of IT Security Trainings and Services to corporations and aspiring IT Security Professionals. &lt;br /&gt;
Several basic and advanced Web Application Security and Secure Coding trainings and services are available at K-Secure, which are &lt;br /&gt;
delivered by very highly experienced professionals. For more information visit their web site - www.ksecure.net&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.mastek.com https://www.owasp.org/images/f/fe/Mastek_logo.gif]&lt;br /&gt;
&lt;br /&gt;
Mastek is an international software solutions and integration services provider that designs, develops, integrates and maintains business applications to enable enterprises to solve complex, mission-critical business problems. Mastek also provides Application Security Consulting and Services like Defense Solutions, Secure Design Reviews, Application Security Workshops and Web Application Security Assessments. Website: www.mastek.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Registrations OPEN !!&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 OWASP Chapter Meetings are FREE to attend. &lt;br /&gt;
 Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.&lt;br /&gt;
 Your Name:&lt;br /&gt;
 Your Organization/Institution:&lt;br /&gt;
 Your Designation:&lt;br /&gt;
 Your Contact No.:&lt;br /&gt;
&lt;br /&gt;
 '''Venue: HOTEL HEAVENS INDIA '''&lt;br /&gt;
 Plot No A-1, Opposite SDF 4, SEEPZ, SEZ, ANDHERI (E)- MUMBAI - 400 096.&lt;br /&gt;
 [http://bp1.blogger.com/_ndrxWV2ZI0s/RtJ7Ig7vAbI/AAAAAAAAAto/V5JNTkiJeRY/s1600-h/Venue+Map.jpg Venue Map]&lt;br /&gt;
&lt;br /&gt;
 '''Venue Entrance - GATE PASSES '''&lt;br /&gt;
 *NOTE: The venue is inside SEZ (Special Economic Zone). Entry to SEZ is very restricted. The visitor can only enter via a company &lt;br /&gt;
 gate pass. The gate pass for the event will be provided on behalf of MASTEK LTD as organization. The gate passes will have to be &lt;br /&gt;
 collected from the SEEPZ SEZ Main Gate (Gate #1).&lt;br /&gt;
&lt;br /&gt;
 '''Any vehicle (Two wheeler or Four wheeler), Cameras, Video Recorders, Laptops / CD’s / DVD’s or any other form of Digital Media &lt;br /&gt;
 is NOT ALLOWED inside SEZ (venue).''' &lt;br /&gt;
 We are sorry for the inconvenience, but SEZ rules need to be strictly adhered to. The person distributing the gate passes will be &lt;br /&gt;
 Mr. Anil Raut and can be contacted at 9819355155. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''&lt;br /&gt;
&lt;br /&gt;
The second OWASP Mumbai Chapter Meet was held at TechMahindra premises in Chandivali. Mr. Richard on behalf of TechMahindra gave a warm welcome to all the delegates to the OWASP Mumbai Local Chapter –II. Accompanying him, Mr. Dharmesh of Mastek Ltd – Mumbai Chapter Head gave a brief description about the goals of OWASP Mumbai Chapter and the road ahead.&lt;br /&gt;
&lt;br /&gt;
Presentations:&lt;br /&gt;
&lt;br /&gt;
1. ''Significance of Random Numbers in Application Security'': '''Richard Lewis''', e-Security Consultant with Tech Mahindra, started with the practical usage of random numbers. He explained how good random number generation prevents applications from malfunctioning, increases strength of cryptographic operations which in turn increases entropy associated with the key. He went on to explain how random numbers automate otherwise manual tasks and how it increases the security of application. He explained the concepts of entropy and to which level it should be reached in an application. In the end he talked about the various sources of random numbers. He showed developers the simple mathematics required to calculate minimum password lengths, given the security requirements.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/1/13/RichardLewis_RandomNumberSignificance.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
2. ''Java Decompilation'': '''Girish Kulkarni''', e-Security Consultant with Tech Mahindra went through Java Decompilation utility and techniques to defeat decompilation. Use of obfuscators, byte code encryptor/decryptor and generating executable from source were some of the techniques that he explained.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/3/3e/Girish_LockingDownJavaByteCode.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
3. ''/GS Security Check in Visual Studio'': '''Chanda Dutta''', '''Divya Makhija''', '''Sugita Kumari''', '''Upma Sharma''' from Tech Mahindra, presented the usage of /GS security check in Visual Studio. Chanda started the presentation by giving an introduction to /GS Security Check feature of Visual Studio. She explained what is /GS Buffer Security Check, the need of /GS and what it can prevent. Sugita further explained how /GS works and what is canary with process of how to using a canary can prevent buffer overrun. Upma then demonstrated a simulation explaining normal working of buffer overflow and how can it be prevented. Divya explained the various limitations of /GS as how the features of /GS can be exploited and summarized the /GS Buffer Security Check features and functionalities. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/a/ad/GS_Switch_in_Visual_Studio.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
'''Venue and Sponsor Details:'''&lt;br /&gt;
&lt;br /&gt;
[http://www.techmahindra.com Tech Mahindra Ltd.].&lt;br /&gt;
&lt;br /&gt;
Tech Mahindra Limited.&lt;br /&gt;
Wing 1, Oberoi Estate Gardens,&lt;br /&gt;
Chandivali, Andheri (E),&lt;br /&gt;
Mumbai 400 072, Maharashtra, India.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''&lt;br /&gt;
&lt;br /&gt;
With the welcome address by Anuradha, the first meeting of Mumbai Chapter embarked. Right from giving a brief introduction about OWASP and its aim, Anuradha explained the focus of OWASP as a voluntary organization aiming at contributing to the knowledge as a part of sharing it. Apart from it, Anuradha briefed about OWASP Top 10 Project and OWASP Guide to building Secure Application.&lt;br /&gt;
&lt;br /&gt;
Richard presented on Secure Coding Fundamentals and elucidated the Cost factor inculcated due to insecure code resulting in Network Cost, Productivity Cost and so on. Further explaining the basic reasons of threat to code, he explained how the mistakes done by the Programmers, I/O, API Abuse, Environment &amp;amp; Configuration and Time &amp;amp; State were responsible for Security flaws in an application. Moving ahead, Richard laid down a few principles to be followed as Secure Coding – General Guidelines for all the languages and specific Secure Coding Guidelines for C &amp;amp; C++, Java and .NET&lt;br /&gt;
&lt;br /&gt;
Richard's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/28/RichardLewis_SecureCodingFundamentals.ppt Download]&lt;br /&gt;
&lt;br /&gt;
With Threat Analysis &amp;amp; Modeling Process, Dharmesh explained the steps followed as Threat Modeling Process starting from Defining Application Requirement, Application Architecture, and Modeling Threats looking at CIA feature of Security Basics. The aim covered to look towards gathering the information needed from application development teams in order to mock out the potential threats that are inherit in the software application they build starting from the very inception of the software birth. &lt;br /&gt;
Giving the demonstration of Threat Analysis and Modeling Tool v2.0 with the basic example of its functionality, Dharmesh presented the Threat Modeling in real scenario. &lt;br /&gt;
&lt;br /&gt;
Dharmesh's Presentation&lt;br /&gt;
[http://www.owasp.org/images/6/6c/Dharmesh_Threat_Modeling.ppt Download]&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa explained how password can be lost or manipulated in a real life scenario and it dealt with the countermeasures to be taken to avoid it. The topics covered under it included Stealing Password using different methods as – Browser’s Refresh, Browser’s Memory, Remember feature, Forget Password feature and last but not the least SQL Injection. The role of Browser’s Viewing Tool available showed a clear picture of how password could be easily cracked.&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/21/5_ways_to_lose_your_user%27s_password.ppt Download]&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=40284</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=40284"/>
				<updated>2008-09-17T16:54:58Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (91-98670-75327) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
91-98670-75327&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP Mumbai Chapter Meeting ==&lt;br /&gt;
&lt;br /&gt;
  '''Date: 22nd September, 2008 - Monday&lt;br /&gt;
&lt;br /&gt;
  '''Timing: 2:30 PM to 5:30 PM '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Speakers for the Meeting&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  '''Topic: Testing Large Volume of Apps - Notes from the Field'''&lt;br /&gt;
  Speaker : Madhumita Iyer, Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing,&lt;br /&gt;
  Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application&lt;br /&gt;
  pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
&lt;br /&gt;
  '''Topic: Wireless Security'''&lt;br /&gt;
  Speaker : Sheetal Joseph, Security Consultant, TechMahindra. She is a subject matter expert for internal line of business clients &lt;br /&gt;
  and external suppliers for security mitigation and maintenance of their internal control environment over data center operations, &lt;br /&gt;
  system development, change management, incident management and contingency planning. She is Prince2 Registered Practitioner, &lt;br /&gt;
  CISSP, CEH, BS7799 Lead Auditor and holds many more certifications. &lt;br /&gt;
&lt;br /&gt;
  '''Event Sponsors : K-Secure &amp;amp; Mastek '''&lt;br /&gt;
&lt;br /&gt;
[http://www.ksecure.net https://www.owasp.org/images/c/c9/KSecure.gif]&lt;br /&gt;
&lt;br /&gt;
K-Secure - is a leading provider of IT Security Trainings and Services to corporations and aspiring IT Security Professionals. &lt;br /&gt;
Several basic and advanced Web Application Security and Secure Coding trainings and services are available at K-Secure, which are &lt;br /&gt;
delivered by very highly experienced professionals. For more information visit their web site - www.ksecure.net&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.mastek.com https://www.owasp.org/images/f/fe/Mastek_logo.gif]&lt;br /&gt;
&lt;br /&gt;
Mastek is an international software solutions and integration services provider that designs, develops, integrates and maintains business applications to enable enterprises to solve complex, mission-critical business problems. Mastek also provides Application Security Consulting and Services like Defense Solutions, Secure Design Reviews, Application Security Workshops and Web Application Security Assessments. Website: www.mastek.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Registrations OPEN !!&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 OWASP Chapter Meetings are FREE to attend. &lt;br /&gt;
 Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.&lt;br /&gt;
 Your Name:&lt;br /&gt;
 Your Organization/Institution:&lt;br /&gt;
 Your Designation:&lt;br /&gt;
 Your Contact No.:&lt;br /&gt;
&lt;br /&gt;
 '''Venue: HOTEL HEAVENS INDIA '''&lt;br /&gt;
 Plot No A-1, Opposite SDF 4, SEEPZ, SEZ, ANDHERI (E)- MUMBAI - 400 096.&lt;br /&gt;
 [http://bp1.blogger.com/_ndrxWV2ZI0s/RtJ7Ig7vAbI/AAAAAAAAAto/V5JNTkiJeRY/s1600-h/Venue+Map.jpg Venue Map]&lt;br /&gt;
&lt;br /&gt;
 '''Venue Entrance - GATE PASSES '''&lt;br /&gt;
 *NOTE: The venue is inside SEZ (Special Economic Zone). Entry to SEZ is very restricted. The visitor can only enter via a company &lt;br /&gt;
 gate pass. The gate pass for the event will be provided on behalf of MASTEK LTD as organization. The gate passes will have to be &lt;br /&gt;
 collected from the SEEPZ SEZ Main Gate (Gate #1).&lt;br /&gt;
&lt;br /&gt;
 '''Any vehicle (Two wheeler or Four wheeler), Cameras, Video Recorders, Laptops / CD’s / DVD’s or any other form of Digital Media &lt;br /&gt;
 is NOT ALLOWED inside SEZ (venue).''' &lt;br /&gt;
 We are sorry for the inconvenience, but SEZ rules need to be strictly adhered to. The person distributing the gate passes will be &lt;br /&gt;
 Mr. Anil Raut and can be contacted at 9819355155. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''&lt;br /&gt;
&lt;br /&gt;
The second OWASP Mumbai Chapter Meet was held at TechMahindra premises in Chandivali. Mr. Richard on behalf of TechMahindra gave a warm welcome to all the delegates to the OWASP Mumbai Local Chapter –II. Accompanying him, Mr. Dharmesh of Mastek Ltd – Mumbai Chapter Head gave a brief description about the goals of OWASP Mumbai Chapter and the road ahead.&lt;br /&gt;
&lt;br /&gt;
Presentations:&lt;br /&gt;
&lt;br /&gt;
1. ''Significance of Random Numbers in Application Security'': '''Richard Lewis''', e-Security Consultant with Tech Mahindra, started with the practical usage of random numbers. He explained how good random number generation prevents applications from malfunctioning, increases strength of cryptographic operations which in turn increases entropy associated with the key. He went on to explain how random numbers automate otherwise manual tasks and how it increases the security of application. He explained the concepts of entropy and to which level it should be reached in an application. In the end he talked about the various sources of random numbers. He showed developers the simple mathematics required to calculate minimum password lengths, given the security requirements.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/1/13/RichardLewis_RandomNumberSignificance.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
2. ''Java Decompilation'': '''Girish Kulkarni''', e-Security Consultant with Tech Mahindra went through Java Decompilation utility and techniques to defeat decompilation. Use of obfuscators, byte code encryptor/decryptor and generating executable from source were some of the techniques that he explained.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/3/3e/Girish_LockingDownJavaByteCode.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
3. ''/GS Security Check in Visual Studio'': '''Chanda Dutta''', '''Divya Makhija''', '''Sugita Kumari''', '''Upma Sharma''' from Tech Mahindra, presented the usage of /GS security check in Visual Studio. Chanda started the presentation by giving an introduction to /GS Security Check feature of Visual Studio. She explained what is /GS Buffer Security Check, the need of /GS and what it can prevent. Sugita further explained how /GS works and what is canary with process of how to using a canary can prevent buffer overrun. Upma then demonstrated a simulation explaining normal working of buffer overflow and how can it be prevented. Divya explained the various limitations of /GS as how the features of /GS can be exploited and summarized the /GS Buffer Security Check features and functionalities. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/a/ad/GS_Switch_in_Visual_Studio.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
'''Venue and Sponsor Details:'''&lt;br /&gt;
&lt;br /&gt;
[http://www.techmahindra.com Tech Mahindra Ltd.].&lt;br /&gt;
&lt;br /&gt;
Tech Mahindra Limited.&lt;br /&gt;
Wing 1, Oberoi Estate Gardens,&lt;br /&gt;
Chandivali, Andheri (E),&lt;br /&gt;
Mumbai 400 072, Maharashtra, India.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''&lt;br /&gt;
&lt;br /&gt;
With the welcome address by Anuradha, the first meeting of Mumbai Chapter embarked. Right from giving a brief introduction about OWASP and its aim, Anuradha explained the focus of OWASP as a voluntary organization aiming at contributing to the knowledge as a part of sharing it. Apart from it, Anuradha briefed about OWASP Top 10 Project and OWASP Guide to building Secure Application.&lt;br /&gt;
&lt;br /&gt;
Richard presented on Secure Coding Fundamentals and elucidated the Cost factor inculcated due to insecure code resulting in Network Cost, Productivity Cost and so on. Further explaining the basic reasons of threat to code, he explained how the mistakes done by the Programmers, I/O, API Abuse, Environment &amp;amp; Configuration and Time &amp;amp; State were responsible for Security flaws in an application. Moving ahead, Richard laid down a few principles to be followed as Secure Coding – General Guidelines for all the languages and specific Secure Coding Guidelines for C &amp;amp; C++, Java and .NET&lt;br /&gt;
&lt;br /&gt;
Richard's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/28/RichardLewis_SecureCodingFundamentals.ppt Download]&lt;br /&gt;
&lt;br /&gt;
With Threat Analysis &amp;amp; Modeling Process, Dharmesh explained the steps followed as Threat Modeling Process starting from Defining Application Requirement, Application Architecture, and Modeling Threats looking at CIA feature of Security Basics. The aim covered to look towards gathering the information needed from application development teams in order to mock out the potential threats that are inherit in the software application they build starting from the very inception of the software birth. &lt;br /&gt;
Giving the demonstration of Threat Analysis and Modeling Tool v2.0 with the basic example of its functionality, Dharmesh presented the Threat Modeling in real scenario. &lt;br /&gt;
&lt;br /&gt;
Dharmesh's Presentation&lt;br /&gt;
[http://www.owasp.org/images/6/6c/Dharmesh_Threat_Modeling.ppt Download]&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa explained how password can be lost or manipulated in a real life scenario and it dealt with the countermeasures to be taken to avoid it. The topics covered under it included Stealing Password using different methods as – Browser’s Refresh, Browser’s Memory, Remember feature, Forget Password feature and last but not the least SQL Injection. The role of Browser’s Viewing Tool available showed a clear picture of how password could be easily cracked.&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/21/5_ways_to_lose_your_user%27s_password.ppt Download]&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Mastek_logo.gif&amp;diff=40283</id>
		<title>File:Mastek logo.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Mastek_logo.gif&amp;diff=40283"/>
				<updated>2008-09-17T16:45:21Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:KSecure.gif&amp;diff=40282</id>
		<title>File:KSecure.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:KSecure.gif&amp;diff=40282"/>
				<updated>2008-09-17T16:42:02Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=39355</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=39355"/>
				<updated>2008-09-11T16:55:33Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: /* Upcoming OWASP Mumbai Chapter Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (91-98670-75327) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
91-98670-75327&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP Mumbai Chapter Meeting ==&lt;br /&gt;
&lt;br /&gt;
  '''Date: 22nd September, 2008 - Monday&lt;br /&gt;
&lt;br /&gt;
  '''Timing: 2:30 PM to 5:30 PM '''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Registrations OPEN !!&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 OWASP Chapter Meetings are FREE to attend. &lt;br /&gt;
 Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.&lt;br /&gt;
 Your Name:&lt;br /&gt;
 Your Organization/Institution:&lt;br /&gt;
 Your Designation:&lt;br /&gt;
 Your Contact No.:&lt;br /&gt;
&lt;br /&gt;
 '''Venue: HOTEL HEAVENS INDIA '''&lt;br /&gt;
 Plot No A-1, Opposite SDF 4, SEEPZ, SEZ, ANDHERI (E)- MUMBAI - 400 096.&lt;br /&gt;
 [http://bp1.blogger.com/_ndrxWV2ZI0s/RtJ7Ig7vAbI/AAAAAAAAAto/V5JNTkiJeRY/s1600-h/Venue+Map.jpg Venue Map]&lt;br /&gt;
&lt;br /&gt;
 '''Venue Entrance - GATE PASSES '''&lt;br /&gt;
 *NOTE: The venue is inside SEZ (Special Economic Zone). Entry to SEZ is very restricted. The visitor can only enter via a company &lt;br /&gt;
 gate pass. The gate pass for the event will be provided on behalf of MASTEK LTD as organization. The gate passes will have to be &lt;br /&gt;
 collected from the SEEPZ SEZ Main Gate (Gate #1).&lt;br /&gt;
&lt;br /&gt;
 '''Any vehicle (Two wheeler or Four wheeler), Cameras, Video Recorders, Laptops / CD’s / DVD’s or any other form of Digital Media &lt;br /&gt;
 is NOT ALLOWED inside SEZ (venue).''' &lt;br /&gt;
 We are sorry for the inconvenience, but SEZ rules need to be strictly adhered to. The person distributing the gate passes will be &lt;br /&gt;
 Mr. Anil Raut and can be contacted at 9819355155. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Speakers for the Meeting&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  '''Topic: Testing Large Volume of Apps - Notes from the Field'''&lt;br /&gt;
  Speaker : Madhumita Iyer, Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing,&lt;br /&gt;
  Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application&lt;br /&gt;
  pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
&lt;br /&gt;
  '''Topic: Wireless Security'''&lt;br /&gt;
  Speaker : Sheetal Joseph, Security Consultant, TechMahindra. She is a subject matter expert for internal line of business clients &lt;br /&gt;
  and external suppliers for security mitigation and maintenance of their internal control environment over data center operations, &lt;br /&gt;
  system development, change management, incident management and contingency planning. She is Prince2 Registered Practitioner, &lt;br /&gt;
  CISSP, CEH, BS7799 Lead Auditor and holds many more certifications. &lt;br /&gt;
&lt;br /&gt;
  Call for Other Presentation Slots OPEN !!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Call for Presentations: OWASP Mumbai September 2008 Meet&amp;lt;/u&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 OWASP Mumbai Chapter calls for papers for presentation for its upcoming meet in September 2008.  &lt;br /&gt;
 If you are interested in speaking at the event, sharing your thoughts, send in your topic brief (100 words) and your brief profile.&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;u&amp;gt;Interested in Sponsoring??&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Send a mail to dharmeshmm at owasp dot org to understand the sponsorship details.&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''&lt;br /&gt;
&lt;br /&gt;
The second OWASP Mumbai Chapter Meet was held at TechMahindra premises in Chandivali. Mr. Richard on behalf of TechMahindra gave a warm welcome to all the delegates to the OWASP Mumbai Local Chapter –II. Accompanying him, Mr. Dharmesh of Mastek Ltd – Mumbai Chapter Head gave a brief description about the goals of OWASP Mumbai Chapter and the road ahead.&lt;br /&gt;
&lt;br /&gt;
Presentations:&lt;br /&gt;
&lt;br /&gt;
1. ''Significance of Random Numbers in Application Security'': '''Richard Lewis''', e-Security Consultant with Tech Mahindra, started with the practical usage of random numbers. He explained how good random number generation prevents applications from malfunctioning, increases strength of cryptographic operations which in turn increases entropy associated with the key. He went on to explain how random numbers automate otherwise manual tasks and how it increases the security of application. He explained the concepts of entropy and to which level it should be reached in an application. In the end he talked about the various sources of random numbers. He showed developers the simple mathematics required to calculate minimum password lengths, given the security requirements.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/1/13/RichardLewis_RandomNumberSignificance.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
2. ''Java Decompilation'': '''Girish Kulkarni''', e-Security Consultant with Tech Mahindra went through Java Decompilation utility and techniques to defeat decompilation. Use of obfuscators, byte code encryptor/decryptor and generating executable from source were some of the techniques that he explained.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/3/3e/Girish_LockingDownJavaByteCode.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
3. ''/GS Security Check in Visual Studio'': '''Chanda Dutta''', '''Divya Makhija''', '''Sugita Kumari''', '''Upma Sharma''' from Tech Mahindra, presented the usage of /GS security check in Visual Studio. Chanda started the presentation by giving an introduction to /GS Security Check feature of Visual Studio. She explained what is /GS Buffer Security Check, the need of /GS and what it can prevent. Sugita further explained how /GS works and what is canary with process of how to using a canary can prevent buffer overrun. Upma then demonstrated a simulation explaining normal working of buffer overflow and how can it be prevented. Divya explained the various limitations of /GS as how the features of /GS can be exploited and summarized the /GS Buffer Security Check features and functionalities. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/a/ad/GS_Switch_in_Visual_Studio.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
'''Venue and Sponsor Details:'''&lt;br /&gt;
&lt;br /&gt;
[http://www.techmahindra.com Tech Mahindra Ltd.].&lt;br /&gt;
&lt;br /&gt;
Tech Mahindra Limited.&lt;br /&gt;
Wing 1, Oberoi Estate Gardens,&lt;br /&gt;
Chandivali, Andheri (E),&lt;br /&gt;
Mumbai 400 072, Maharashtra, India.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''&lt;br /&gt;
&lt;br /&gt;
With the welcome address by Anuradha, the first meeting of Mumbai Chapter embarked. Right from giving a brief introduction about OWASP and its aim, Anuradha explained the focus of OWASP as a voluntary organization aiming at contributing to the knowledge as a part of sharing it. Apart from it, Anuradha briefed about OWASP Top 10 Project and OWASP Guide to building Secure Application.&lt;br /&gt;
&lt;br /&gt;
Richard presented on Secure Coding Fundamentals and elucidated the Cost factor inculcated due to insecure code resulting in Network Cost, Productivity Cost and so on. Further explaining the basic reasons of threat to code, he explained how the mistakes done by the Programmers, I/O, API Abuse, Environment &amp;amp; Configuration and Time &amp;amp; State were responsible for Security flaws in an application. Moving ahead, Richard laid down a few principles to be followed as Secure Coding – General Guidelines for all the languages and specific Secure Coding Guidelines for C &amp;amp; C++, Java and .NET&lt;br /&gt;
&lt;br /&gt;
Richard's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/28/RichardLewis_SecureCodingFundamentals.ppt Download]&lt;br /&gt;
&lt;br /&gt;
With Threat Analysis &amp;amp; Modeling Process, Dharmesh explained the steps followed as Threat Modeling Process starting from Defining Application Requirement, Application Architecture, and Modeling Threats looking at CIA feature of Security Basics. The aim covered to look towards gathering the information needed from application development teams in order to mock out the potential threats that are inherit in the software application they build starting from the very inception of the software birth. &lt;br /&gt;
Giving the demonstration of Threat Analysis and Modeling Tool v2.0 with the basic example of its functionality, Dharmesh presented the Threat Modeling in real scenario. &lt;br /&gt;
&lt;br /&gt;
Dharmesh's Presentation&lt;br /&gt;
[http://www.owasp.org/images/6/6c/Dharmesh_Threat_Modeling.ppt Download]&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa explained how password can be lost or manipulated in a real life scenario and it dealt with the countermeasures to be taken to avoid it. The topics covered under it included Stealing Password using different methods as – Browser’s Refresh, Browser’s Memory, Remember feature, Forget Password feature and last but not the least SQL Injection. The role of Browser’s Viewing Tool available showed a clear picture of how password could be easily cracked.&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/21/5_ways_to_lose_your_user%27s_password.ppt Download]&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=38826</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=38826"/>
				<updated>2008-09-08T09:31:35Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: /* Upcoming OWASP Mumbai Chapter Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (91-98670-75327) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
91-98670-75327&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP Mumbai Chapter Meeting ==&lt;br /&gt;
&lt;br /&gt;
  '''Date: 22nd September, 2008 - Monday&lt;br /&gt;
&lt;br /&gt;
  '''Timing: 2:30 PM to 5:30 PM '''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Registrations OPEN !!&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 OWASP Chapter Meetings are FREE to attend. &lt;br /&gt;
 Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.&lt;br /&gt;
 Your Name:&lt;br /&gt;
 Your Organization/Institution:&lt;br /&gt;
 Your Designation:&lt;br /&gt;
 Your Contact No.:&lt;br /&gt;
&lt;br /&gt;
 '''Venue: HOTEL HEAVENS INDIA '''&lt;br /&gt;
 Plot No A-1, Opposite SDF 4, SEEPZ, SEZ, ANDHERI (E)- MUMBAI - 400 096.&lt;br /&gt;
 [http://bp1.blogger.com/_ndrxWV2ZI0s/RtJ7Ig7vAbI/AAAAAAAAAto/V5JNTkiJeRY/s1600-h/Venue+Map.jpg Venue Map]&lt;br /&gt;
 '''Venue Entrance - GATE PASSES '''&lt;br /&gt;
 *NOTE: The venue is inside SEZ (Special Economic Zone). Entry to SEZ is very restricted. The visitor can only enter via a company &lt;br /&gt;
 gate pass. The gate pass for the event will be provided on behalf of MASTEK LTD as organization. The gate passes will have to be &lt;br /&gt;
 collected from the SEEPZ SEZ Main Gate (Gate #1).&lt;br /&gt;
 '''Any vehicle (Two wheeler or Four wheeler), Cameras, Video Recorders, Laptops / CD’s / DVD’s or any other form of Digital Media &lt;br /&gt;
 is NOT ALLOWED inside SEZ (venue).''' &lt;br /&gt;
 We are sorry for the inconvenience, but SEZ rules need to be strictly adhered to. The person distributing the gate passes will be &lt;br /&gt;
 Mr. Anil Raut and can be contacted at 9819355155. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Speakers for the Meeting&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  '''Topic: Testing Large Volume of Apps - Notes from the Field'''&lt;br /&gt;
  Speaker : Madhumita Iyer, Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing,&lt;br /&gt;
  Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application&lt;br /&gt;
  pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
  &lt;br /&gt;
  Call for Other Presentation Slots OPEN !!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Call for Presentations: OWASP Mumbai September 2008 Meet&amp;lt;/u&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 OWASP Mumbai Chapter calls for papers for presentation for its upcoming meet in September 2008.  &lt;br /&gt;
 If you are interested in speaking at the event, sharing your thoughts, send in your topic brief (100 words) and your brief profile.&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;u&amp;gt;Interested in Sponsoring??&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Send a mail to dharmeshmm at owasp dot org to understand the sponsorship details.&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''&lt;br /&gt;
&lt;br /&gt;
The second OWASP Mumbai Chapter Meet was held at TechMahindra premises in Chandivali. Mr. Richard on behalf of TechMahindra gave a warm welcome to all the delegates to the OWASP Mumbai Local Chapter –II. Accompanying him, Mr. Dharmesh of Mastek Ltd – Mumbai Chapter Head gave a brief description about the goals of OWASP Mumbai Chapter and the road ahead.&lt;br /&gt;
&lt;br /&gt;
Presentations:&lt;br /&gt;
&lt;br /&gt;
1. ''Significance of Random Numbers in Application Security'': '''Richard Lewis''', e-Security Consultant with Tech Mahindra, started with the practical usage of random numbers. He explained how good random number generation prevents applications from malfunctioning, increases strength of cryptographic operations which in turn increases entropy associated with the key. He went on to explain how random numbers automate otherwise manual tasks and how it increases the security of application. He explained the concepts of entropy and to which level it should be reached in an application. In the end he talked about the various sources of random numbers. He showed developers the simple mathematics required to calculate minimum password lengths, given the security requirements.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/1/13/RichardLewis_RandomNumberSignificance.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
2. ''Java Decompilation'': '''Girish Kulkarni''', e-Security Consultant with Tech Mahindra went through Java Decompilation utility and techniques to defeat decompilation. Use of obfuscators, byte code encryptor/decryptor and generating executable from source were some of the techniques that he explained.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/3/3e/Girish_LockingDownJavaByteCode.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
3. ''/GS Security Check in Visual Studio'': '''Chanda Dutta''', '''Divya Makhija''', '''Sugita Kumari''', '''Upma Sharma''' from Tech Mahindra, presented the usage of /GS security check in Visual Studio. Chanda started the presentation by giving an introduction to /GS Security Check feature of Visual Studio. She explained what is /GS Buffer Security Check, the need of /GS and what it can prevent. Sugita further explained how /GS works and what is canary with process of how to using a canary can prevent buffer overrun. Upma then demonstrated a simulation explaining normal working of buffer overflow and how can it be prevented. Divya explained the various limitations of /GS as how the features of /GS can be exploited and summarized the /GS Buffer Security Check features and functionalities. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/a/ad/GS_Switch_in_Visual_Studio.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
'''Venue and Sponsor Details:'''&lt;br /&gt;
&lt;br /&gt;
[http://www.techmahindra.com Tech Mahindra Ltd.].&lt;br /&gt;
&lt;br /&gt;
Tech Mahindra Limited.&lt;br /&gt;
Wing 1, Oberoi Estate Gardens,&lt;br /&gt;
Chandivali, Andheri (E),&lt;br /&gt;
Mumbai 400 072, Maharashtra, India.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''&lt;br /&gt;
&lt;br /&gt;
With the welcome address by Anuradha, the first meeting of Mumbai Chapter embarked. Right from giving a brief introduction about OWASP and its aim, Anuradha explained the focus of OWASP as a voluntary organization aiming at contributing to the knowledge as a part of sharing it. Apart from it, Anuradha briefed about OWASP Top 10 Project and OWASP Guide to building Secure Application.&lt;br /&gt;
&lt;br /&gt;
Richard presented on Secure Coding Fundamentals and elucidated the Cost factor inculcated due to insecure code resulting in Network Cost, Productivity Cost and so on. Further explaining the basic reasons of threat to code, he explained how the mistakes done by the Programmers, I/O, API Abuse, Environment &amp;amp; Configuration and Time &amp;amp; State were responsible for Security flaws in an application. Moving ahead, Richard laid down a few principles to be followed as Secure Coding – General Guidelines for all the languages and specific Secure Coding Guidelines for C &amp;amp; C++, Java and .NET&lt;br /&gt;
&lt;br /&gt;
Richard's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/28/RichardLewis_SecureCodingFundamentals.ppt Download]&lt;br /&gt;
&lt;br /&gt;
With Threat Analysis &amp;amp; Modeling Process, Dharmesh explained the steps followed as Threat Modeling Process starting from Defining Application Requirement, Application Architecture, and Modeling Threats looking at CIA feature of Security Basics. The aim covered to look towards gathering the information needed from application development teams in order to mock out the potential threats that are inherit in the software application they build starting from the very inception of the software birth. &lt;br /&gt;
Giving the demonstration of Threat Analysis and Modeling Tool v2.0 with the basic example of its functionality, Dharmesh presented the Threat Modeling in real scenario. &lt;br /&gt;
&lt;br /&gt;
Dharmesh's Presentation&lt;br /&gt;
[http://www.owasp.org/images/6/6c/Dharmesh_Threat_Modeling.ppt Download]&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa explained how password can be lost or manipulated in a real life scenario and it dealt with the countermeasures to be taken to avoid it. The topics covered under it included Stealing Password using different methods as – Browser’s Refresh, Browser’s Memory, Remember feature, Forget Password feature and last but not the least SQL Injection. The role of Browser’s Viewing Tool available showed a clear picture of how password could be easily cracked.&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/21/5_ways_to_lose_your_user%27s_password.ppt Download]&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=38824</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=38824"/>
				<updated>2008-09-08T09:27:41Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (91-98670-75327) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
91-98670-75327&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP Mumbai Chapter Meeting ==&lt;br /&gt;
&lt;br /&gt;
  '''Date: 22nd September, 2008 - Monday&lt;br /&gt;
&lt;br /&gt;
  '''Timing: 2:30 PM to 5:30 PM '''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Registrations OPEN !!&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 OWASP Chapter Meetings are FREE to attend. &lt;br /&gt;
 Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.&lt;br /&gt;
 Your Name:&lt;br /&gt;
 Your Organization/Institution:&lt;br /&gt;
 Your Designation:&lt;br /&gt;
 Your Contact No.:&lt;br /&gt;
&lt;br /&gt;
 '''Venue: HOTEL HEAVENS INDIA '''&lt;br /&gt;
 Plot No A-1, Opposite SDF 4, SEEPZ, SEZ, ANDHERI (E)- MUMBAI - 400 096.&lt;br /&gt;
 [http://bp1.blogger.com/_ndrxWV2ZI0s/RtJ7Ig7vAbI/AAAAAAAAAto/V5JNTkiJeRY/s1600-h/Venue+Map.jpg Venue Map]&lt;br /&gt;
 '''Venue Entrance - GATE PASSES '''&lt;br /&gt;
 *NOTE: The venue is inside SEZ (Special Economic Zone). Entry to SEZ is very restricted. The visitor can only enter via a company &lt;br /&gt;
 gate pass. The gate pass for the event will be provided on behalf of MASTEK LTD as organization. The gate passes will have to be &lt;br /&gt;
 collected from the SEEPZ SEZ Main Gate (Gate #1).&lt;br /&gt;
 '''Any vehicle (Two wheeler or Four wheeler), Cameras, Video Recorders, Laptops / CD’s / DVD’s or any other form of Digital Media &lt;br /&gt;
 is NOT ALLOWED inside SEZ (venue).''' &lt;br /&gt;
 We are sorry for the inconvenience, but SEZ rules need to be strictly adhered to. The person distributing the gate passes will be &lt;br /&gt;
 Mr. Anil Raut and can be contacted at 9819355155. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Registrations:&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 OWASP Chapter Meetings are FREE to attend. &lt;br /&gt;
 Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.&lt;br /&gt;
 Your Name:&lt;br /&gt;
 Your Organization/Institution:&lt;br /&gt;
 Your Designation:&lt;br /&gt;
 Your Contact No.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Speakers for the Meeting&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  '''Topic: Testing Large Volume of Apps - Notes from the Field'''&lt;br /&gt;
  Speaker : Madhumita Iyer, Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing,&lt;br /&gt;
  Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application&lt;br /&gt;
  pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
  &lt;br /&gt;
  Call for Other Presentation Slots OPEN !!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Call for Presentations: OWASP Mumbai September 2008 Meet&amp;lt;/u&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 OWASP Mumbai Chapter calls for papers for presentation for its upcoming meet in September 2008.  &lt;br /&gt;
 If you are interested in speaking at the event, sharing your thoughts, send in your topic brief (100 words) and your brief profile.&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;u&amp;gt;Interested in Sponsoring??&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Send a mail to dharmeshmm at owasp dot org to understand the sponsorship details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''&lt;br /&gt;
&lt;br /&gt;
The second OWASP Mumbai Chapter Meet was held at TechMahindra premises in Chandivali. Mr. Richard on behalf of TechMahindra gave a warm welcome to all the delegates to the OWASP Mumbai Local Chapter –II. Accompanying him, Mr. Dharmesh of Mastek Ltd – Mumbai Chapter Head gave a brief description about the goals of OWASP Mumbai Chapter and the road ahead.&lt;br /&gt;
&lt;br /&gt;
Presentations:&lt;br /&gt;
&lt;br /&gt;
1. ''Significance of Random Numbers in Application Security'': '''Richard Lewis''', e-Security Consultant with Tech Mahindra, started with the practical usage of random numbers. He explained how good random number generation prevents applications from malfunctioning, increases strength of cryptographic operations which in turn increases entropy associated with the key. He went on to explain how random numbers automate otherwise manual tasks and how it increases the security of application. He explained the concepts of entropy and to which level it should be reached in an application. In the end he talked about the various sources of random numbers. He showed developers the simple mathematics required to calculate minimum password lengths, given the security requirements.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/1/13/RichardLewis_RandomNumberSignificance.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
2. ''Java Decompilation'': '''Girish Kulkarni''', e-Security Consultant with Tech Mahindra went through Java Decompilation utility and techniques to defeat decompilation. Use of obfuscators, byte code encryptor/decryptor and generating executable from source were some of the techniques that he explained.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/3/3e/Girish_LockingDownJavaByteCode.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
3. ''/GS Security Check in Visual Studio'': '''Chanda Dutta''', '''Divya Makhija''', '''Sugita Kumari''', '''Upma Sharma''' from Tech Mahindra, presented the usage of /GS security check in Visual Studio. Chanda started the presentation by giving an introduction to /GS Security Check feature of Visual Studio. She explained what is /GS Buffer Security Check, the need of /GS and what it can prevent. Sugita further explained how /GS works and what is canary with process of how to using a canary can prevent buffer overrun. Upma then demonstrated a simulation explaining normal working of buffer overflow and how can it be prevented. Divya explained the various limitations of /GS as how the features of /GS can be exploited and summarized the /GS Buffer Security Check features and functionalities. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/a/ad/GS_Switch_in_Visual_Studio.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
'''Venue and Sponsor Details:'''&lt;br /&gt;
&lt;br /&gt;
[http://www.techmahindra.com Tech Mahindra Ltd.].&lt;br /&gt;
&lt;br /&gt;
Tech Mahindra Limited.&lt;br /&gt;
Wing 1, Oberoi Estate Gardens,&lt;br /&gt;
Chandivali, Andheri (E),&lt;br /&gt;
Mumbai 400 072, Maharashtra, India.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''&lt;br /&gt;
&lt;br /&gt;
With the welcome address by Anuradha, the first meeting of Mumbai Chapter embarked. Right from giving a brief introduction about OWASP and its aim, Anuradha explained the focus of OWASP as a voluntary organization aiming at contributing to the knowledge as a part of sharing it. Apart from it, Anuradha briefed about OWASP Top 10 Project and OWASP Guide to building Secure Application.&lt;br /&gt;
&lt;br /&gt;
Richard presented on Secure Coding Fundamentals and elucidated the Cost factor inculcated due to insecure code resulting in Network Cost, Productivity Cost and so on. Further explaining the basic reasons of threat to code, he explained how the mistakes done by the Programmers, I/O, API Abuse, Environment &amp;amp; Configuration and Time &amp;amp; State were responsible for Security flaws in an application. Moving ahead, Richard laid down a few principles to be followed as Secure Coding – General Guidelines for all the languages and specific Secure Coding Guidelines for C &amp;amp; C++, Java and .NET&lt;br /&gt;
&lt;br /&gt;
Richard's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/28/RichardLewis_SecureCodingFundamentals.ppt Download]&lt;br /&gt;
&lt;br /&gt;
With Threat Analysis &amp;amp; Modeling Process, Dharmesh explained the steps followed as Threat Modeling Process starting from Defining Application Requirement, Application Architecture, and Modeling Threats looking at CIA feature of Security Basics. The aim covered to look towards gathering the information needed from application development teams in order to mock out the potential threats that are inherit in the software application they build starting from the very inception of the software birth. &lt;br /&gt;
Giving the demonstration of Threat Analysis and Modeling Tool v2.0 with the basic example of its functionality, Dharmesh presented the Threat Modeling in real scenario. &lt;br /&gt;
&lt;br /&gt;
Dharmesh's Presentation&lt;br /&gt;
[http://www.owasp.org/images/6/6c/Dharmesh_Threat_Modeling.ppt Download]&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa explained how password can be lost or manipulated in a real life scenario and it dealt with the countermeasures to be taken to avoid it. The topics covered under it included Stealing Password using different methods as – Browser’s Refresh, Browser’s Memory, Remember feature, Forget Password feature and last but not the least SQL Injection. The role of Browser’s Viewing Tool available showed a clear picture of how password could be easily cracked.&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/21/5_ways_to_lose_your_user%27s_password.ppt Download]&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=37671</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=37671"/>
				<updated>2008-08-30T18:52:22Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (91-98670-75327) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
91-98670-75327&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP Mumbai Chapter Meeting ==&lt;br /&gt;
&lt;br /&gt;
Date : 15th September 2008&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Registrations:&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 OWASP Chapter Meetings are FREE to attend. &lt;br /&gt;
 Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.&lt;br /&gt;
 Your Name:&lt;br /&gt;
 Your Organization/Institution:&lt;br /&gt;
 Your Designation:&lt;br /&gt;
 Your Contact No.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Speakers for the Meeting&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  '''Topic: Testing Large Volume of Apps - Notes from the Field'''&lt;br /&gt;
  Speaker : Madhumita Iyer, Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing,&lt;br /&gt;
  Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application&lt;br /&gt;
  pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.&lt;br /&gt;
  &lt;br /&gt;
  Call for Other Presentation Slots OPEN !!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Call for Presentations: OWASP Mumbai September 2008 Meet&amp;lt;/u&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 OWASP Mumbai Chapter calls for papers for presentation for its upcoming meet in September 2008.  &lt;br /&gt;
 If you are interested in speaking at the event, sharing your thoughts, send in your topic brief (100 words) and your brief profile.&lt;br /&gt;
 &lt;br /&gt;
 Venue for the meet shall be communicated shortly. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;u&amp;gt;Interested in Sponsoring??&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Send a mail to dharmeshmm at owasp dot org to understand the sponsorship details.&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''&lt;br /&gt;
&lt;br /&gt;
The second OWASP Mumbai Chapter Meet was held at TechMahindra premises in Chandivali. Mr. Richard on behalf of TechMahindra gave a warm welcome to all the delegates to the OWASP Mumbai Local Chapter –II. Accompanying him, Mr. Dharmesh of Mastek Ltd – Mumbai Chapter Head gave a brief description about the goals of OWASP Mumbai Chapter and the road ahead.&lt;br /&gt;
&lt;br /&gt;
Presentations:&lt;br /&gt;
&lt;br /&gt;
1. ''Significance of Random Numbers in Application Security'': '''Richard Lewis''', e-Security Consultant with Tech Mahindra, started with the practical usage of random numbers. He explained how good random number generation prevents applications from malfunctioning, increases strength of cryptographic operations which in turn increases entropy associated with the key. He went on to explain how random numbers automate otherwise manual tasks and how it increases the security of application. He explained the concepts of entropy and to which level it should be reached in an application. In the end he talked about the various sources of random numbers. He showed developers the simple mathematics required to calculate minimum password lengths, given the security requirements.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/1/13/RichardLewis_RandomNumberSignificance.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
2. ''Java Decompilation'': '''Girish Kulkarni''', e-Security Consultant with Tech Mahindra went through Java Decompilation utility and techniques to defeat decompilation. Use of obfuscators, byte code encryptor/decryptor and generating executable from source were some of the techniques that he explained.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/3/3e/Girish_LockingDownJavaByteCode.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
3. ''/GS Security Check in Visual Studio'': '''Chanda Dutta''', '''Divya Makhija''', '''Sugita Kumari''', '''Upma Sharma''' from Tech Mahindra, presented the usage of /GS security check in Visual Studio. Chanda started the presentation by giving an introduction to /GS Security Check feature of Visual Studio. She explained what is /GS Buffer Security Check, the need of /GS and what it can prevent. Sugita further explained how /GS works and what is canary with process of how to using a canary can prevent buffer overrun. Upma then demonstrated a simulation explaining normal working of buffer overflow and how can it be prevented. Divya explained the various limitations of /GS as how the features of /GS can be exploited and summarized the /GS Buffer Security Check features and functionalities. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/a/ad/GS_Switch_in_Visual_Studio.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
'''Venue and Sponsor Details:'''&lt;br /&gt;
&lt;br /&gt;
[http://www.techmahindra.com Tech Mahindra Ltd.].&lt;br /&gt;
&lt;br /&gt;
Tech Mahindra Limited.&lt;br /&gt;
Wing 1, Oberoi Estate Gardens,&lt;br /&gt;
Chandivali, Andheri (E),&lt;br /&gt;
Mumbai 400 072, Maharashtra, India.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''&lt;br /&gt;
&lt;br /&gt;
With the welcome address by Anuradha, the first meeting of Mumbai Chapter embarked. Right from giving a brief introduction about OWASP and its aim, Anuradha explained the focus of OWASP as a voluntary organization aiming at contributing to the knowledge as a part of sharing it. Apart from it, Anuradha briefed about OWASP Top 10 Project and OWASP Guide to building Secure Application.&lt;br /&gt;
&lt;br /&gt;
Richard presented on Secure Coding Fundamentals and elucidated the Cost factor inculcated due to insecure code resulting in Network Cost, Productivity Cost and so on. Further explaining the basic reasons of threat to code, he explained how the mistakes done by the Programmers, I/O, API Abuse, Environment &amp;amp; Configuration and Time &amp;amp; State were responsible for Security flaws in an application. Moving ahead, Richard laid down a few principles to be followed as Secure Coding – General Guidelines for all the languages and specific Secure Coding Guidelines for C &amp;amp; C++, Java and .NET&lt;br /&gt;
&lt;br /&gt;
Richard's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/28/RichardLewis_SecureCodingFundamentals.ppt Download]&lt;br /&gt;
&lt;br /&gt;
With Threat Analysis &amp;amp; Modeling Process, Dharmesh explained the steps followed as Threat Modeling Process starting from Defining Application Requirement, Application Architecture, and Modeling Threats looking at CIA feature of Security Basics. The aim covered to look towards gathering the information needed from application development teams in order to mock out the potential threats that are inherit in the software application they build starting from the very inception of the software birth. &lt;br /&gt;
Giving the demonstration of Threat Analysis and Modeling Tool v2.0 with the basic example of its functionality, Dharmesh presented the Threat Modeling in real scenario. &lt;br /&gt;
&lt;br /&gt;
Dharmesh's Presentation&lt;br /&gt;
[http://www.owasp.org/images/6/6c/Dharmesh_Threat_Modeling.ppt Download]&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa explained how password can be lost or manipulated in a real life scenario and it dealt with the countermeasures to be taken to avoid it. The topics covered under it included Stealing Password using different methods as – Browser’s Refresh, Browser’s Memory, Remember feature, Forget Password feature and last but not the least SQL Injection. The role of Browser’s Viewing Tool available showed a clear picture of how password could be easily cracked.&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/21/5_ways_to_lose_your_user%27s_password.ppt Download]&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=37147</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=37147"/>
				<updated>2008-08-25T05:57:47Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: /* Upcoming OWASP Mumbai Chapter Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (91-98670-75327) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
91-98670-75327&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP Mumbai Chapter Meeting ==&lt;br /&gt;
&lt;br /&gt;
Date : 15th September 2008&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Registrations:&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 OWASP Chapter Meetings are FREE to attend. &lt;br /&gt;
 Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.&lt;br /&gt;
 Your Name:&lt;br /&gt;
 Your Organization/Institution:&lt;br /&gt;
 Your Designation:&lt;br /&gt;
 Your Contact No.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Call for Presentations: OWASP Mumbai September 2008 Meet&amp;lt;/u&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 OWASP Mumbai Chapter calls for papers for presentation for its upcoming meet in September 2008.  &lt;br /&gt;
 If you are interested in speaking at the event, sharing your thoughts, send in your topic brief (100 words) and your brief profile.&lt;br /&gt;
 &lt;br /&gt;
 Venue for the meet shall be communicated shortly. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;u&amp;gt;Interested in Sponsoring??&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Send a mail to dharmeshmm at owasp dot org to understand the sponsorship details.&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''&lt;br /&gt;
&lt;br /&gt;
The second OWASP Mumbai Chapter Meet was held at TechMahindra premises in Chandivali. Mr. Richard on behalf of TechMahindra gave a warm welcome to all the delegates to the OWASP Mumbai Local Chapter –II. Accompanying him, Mr. Dharmesh of Mastek Ltd – Mumbai Chapter Head gave a brief description about the goals of OWASP Mumbai Chapter and the road ahead.&lt;br /&gt;
&lt;br /&gt;
Presentations:&lt;br /&gt;
&lt;br /&gt;
1. ''Significance of Random Numbers in Application Security'': '''Richard Lewis''', e-Security Consultant with Tech Mahindra, started with the practical usage of random numbers. He explained how good random number generation prevents applications from malfunctioning, increases strength of cryptographic operations which in turn increases entropy associated with the key. He went on to explain how random numbers automate otherwise manual tasks and how it increases the security of application. He explained the concepts of entropy and to which level it should be reached in an application. In the end he talked about the various sources of random numbers. He showed developers the simple mathematics required to calculate minimum password lengths, given the security requirements.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/1/13/RichardLewis_RandomNumberSignificance.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
2. ''Java Decompilation'': '''Girish Kulkarni''', e-Security Consultant with Tech Mahindra went through Java Decompilation utility and techniques to defeat decompilation. Use of obfuscators, byte code encryptor/decryptor and generating executable from source were some of the techniques that he explained.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/3/3e/Girish_LockingDownJavaByteCode.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
3. ''/GS Security Check in Visual Studio'': '''Chanda Dutta''', '''Divya Makhija''', '''Sugita Kumari''', '''Upma Sharma''' from Tech Mahindra, presented the usage of /GS security check in Visual Studio. Chanda started the presentation by giving an introduction to /GS Security Check feature of Visual Studio. She explained what is /GS Buffer Security Check, the need of /GS and what it can prevent. Sugita further explained how /GS works and what is canary with process of how to using a canary can prevent buffer overrun. Upma then demonstrated a simulation explaining normal working of buffer overflow and how can it be prevented. Divya explained the various limitations of /GS as how the features of /GS can be exploited and summarized the /GS Buffer Security Check features and functionalities. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/a/ad/GS_Switch_in_Visual_Studio.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
'''Venue and Sponsor Details:'''&lt;br /&gt;
&lt;br /&gt;
[http://www.techmahindra.com Tech Mahindra Ltd.].&lt;br /&gt;
&lt;br /&gt;
Tech Mahindra Limited.&lt;br /&gt;
Wing 1, Oberoi Estate Gardens,&lt;br /&gt;
Chandivali, Andheri (E),&lt;br /&gt;
Mumbai 400 072, Maharashtra, India.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''&lt;br /&gt;
&lt;br /&gt;
With the welcome address by Anuradha, the first meeting of Mumbai Chapter embarked. Right from giving a brief introduction about OWASP and its aim, Anuradha explained the focus of OWASP as a voluntary organization aiming at contributing to the knowledge as a part of sharing it. Apart from it, Anuradha briefed about OWASP Top 10 Project and OWASP Guide to building Secure Application.&lt;br /&gt;
&lt;br /&gt;
Richard presented on Secure Coding Fundamentals and elucidated the Cost factor inculcated due to insecure code resulting in Network Cost, Productivity Cost and so on. Further explaining the basic reasons of threat to code, he explained how the mistakes done by the Programmers, I/O, API Abuse, Environment &amp;amp; Configuration and Time &amp;amp; State were responsible for Security flaws in an application. Moving ahead, Richard laid down a few principles to be followed as Secure Coding – General Guidelines for all the languages and specific Secure Coding Guidelines for C &amp;amp; C++, Java and .NET&lt;br /&gt;
&lt;br /&gt;
Richard's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/28/RichardLewis_SecureCodingFundamentals.ppt Download]&lt;br /&gt;
&lt;br /&gt;
With Threat Analysis &amp;amp; Modeling Process, Dharmesh explained the steps followed as Threat Modeling Process starting from Defining Application Requirement, Application Architecture, and Modeling Threats looking at CIA feature of Security Basics. The aim covered to look towards gathering the information needed from application development teams in order to mock out the potential threats that are inherit in the software application they build starting from the very inception of the software birth. &lt;br /&gt;
Giving the demonstration of Threat Analysis and Modeling Tool v2.0 with the basic example of its functionality, Dharmesh presented the Threat Modeling in real scenario. &lt;br /&gt;
&lt;br /&gt;
Dharmesh's Presentation&lt;br /&gt;
[http://www.owasp.org/images/6/6c/Dharmesh_Threat_Modeling.ppt Download]&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa explained how password can be lost or manipulated in a real life scenario and it dealt with the countermeasures to be taken to avoid it. The topics covered under it included Stealing Password using different methods as – Browser’s Refresh, Browser’s Memory, Remember feature, Forget Password feature and last but not the least SQL Injection. The role of Browser’s Viewing Tool available showed a clear picture of how password could be easily cracked.&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/21/5_ways_to_lose_your_user%27s_password.ppt Download]&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=37146</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=37146"/>
				<updated>2008-08-25T05:56:50Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (91-98670-75327) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
91-98670-75327&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP Mumbai Chapter Meeting ==&lt;br /&gt;
&lt;br /&gt;
Date : 15th September 2008&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Registrations:&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 OWASP Chapter Meetings are FREE to attend. &lt;br /&gt;
 Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.&lt;br /&gt;
 Your Name:&lt;br /&gt;
 Your Organization/Institution:&lt;br /&gt;
 Your Designation:&lt;br /&gt;
 Your Contact No.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Call for Presentations: OWASP Mumbai September 2008 Meet&amp;lt;/u&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 OWASP Mumbai Chapter calls for papers for presentation for its upcoming meet in September 2008.  &lt;br /&gt;
 If you are interested in speaking at the event, sharing your thoughts, send in your topic brief (100 words) and your brief profile. Venue for the meet shall be communicated shortly. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;u&amp;gt;Interested in Sponsoring??&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Send a mail to dharmeshmm at owasp dot org to understand the sponsorship details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''&lt;br /&gt;
&lt;br /&gt;
The second OWASP Mumbai Chapter Meet was held at TechMahindra premises in Chandivali. Mr. Richard on behalf of TechMahindra gave a warm welcome to all the delegates to the OWASP Mumbai Local Chapter –II. Accompanying him, Mr. Dharmesh of Mastek Ltd – Mumbai Chapter Head gave a brief description about the goals of OWASP Mumbai Chapter and the road ahead.&lt;br /&gt;
&lt;br /&gt;
Presentations:&lt;br /&gt;
&lt;br /&gt;
1. ''Significance of Random Numbers in Application Security'': '''Richard Lewis''', e-Security Consultant with Tech Mahindra, started with the practical usage of random numbers. He explained how good random number generation prevents applications from malfunctioning, increases strength of cryptographic operations which in turn increases entropy associated with the key. He went on to explain how random numbers automate otherwise manual tasks and how it increases the security of application. He explained the concepts of entropy and to which level it should be reached in an application. In the end he talked about the various sources of random numbers. He showed developers the simple mathematics required to calculate minimum password lengths, given the security requirements.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/1/13/RichardLewis_RandomNumberSignificance.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
2. ''Java Decompilation'': '''Girish Kulkarni''', e-Security Consultant with Tech Mahindra went through Java Decompilation utility and techniques to defeat decompilation. Use of obfuscators, byte code encryptor/decryptor and generating executable from source were some of the techniques that he explained.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/3/3e/Girish_LockingDownJavaByteCode.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
3. ''/GS Security Check in Visual Studio'': '''Chanda Dutta''', '''Divya Makhija''', '''Sugita Kumari''', '''Upma Sharma''' from Tech Mahindra, presented the usage of /GS security check in Visual Studio. Chanda started the presentation by giving an introduction to /GS Security Check feature of Visual Studio. She explained what is /GS Buffer Security Check, the need of /GS and what it can prevent. Sugita further explained how /GS works and what is canary with process of how to using a canary can prevent buffer overrun. Upma then demonstrated a simulation explaining normal working of buffer overflow and how can it be prevented. Divya explained the various limitations of /GS as how the features of /GS can be exploited and summarized the /GS Buffer Security Check features and functionalities. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/a/ad/GS_Switch_in_Visual_Studio.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
'''Venue and Sponsor Details:'''&lt;br /&gt;
&lt;br /&gt;
[http://www.techmahindra.com Tech Mahindra Ltd.].&lt;br /&gt;
&lt;br /&gt;
Tech Mahindra Limited.&lt;br /&gt;
Wing 1, Oberoi Estate Gardens,&lt;br /&gt;
Chandivali, Andheri (E),&lt;br /&gt;
Mumbai 400 072, Maharashtra, India.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''&lt;br /&gt;
&lt;br /&gt;
With the welcome address by Anuradha, the first meeting of Mumbai Chapter embarked. Right from giving a brief introduction about OWASP and its aim, Anuradha explained the focus of OWASP as a voluntary organization aiming at contributing to the knowledge as a part of sharing it. Apart from it, Anuradha briefed about OWASP Top 10 Project and OWASP Guide to building Secure Application.&lt;br /&gt;
&lt;br /&gt;
Richard presented on Secure Coding Fundamentals and elucidated the Cost factor inculcated due to insecure code resulting in Network Cost, Productivity Cost and so on. Further explaining the basic reasons of threat to code, he explained how the mistakes done by the Programmers, I/O, API Abuse, Environment &amp;amp; Configuration and Time &amp;amp; State were responsible for Security flaws in an application. Moving ahead, Richard laid down a few principles to be followed as Secure Coding – General Guidelines for all the languages and specific Secure Coding Guidelines for C &amp;amp; C++, Java and .NET&lt;br /&gt;
&lt;br /&gt;
Richard's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/28/RichardLewis_SecureCodingFundamentals.ppt Download]&lt;br /&gt;
&lt;br /&gt;
With Threat Analysis &amp;amp; Modeling Process, Dharmesh explained the steps followed as Threat Modeling Process starting from Defining Application Requirement, Application Architecture, and Modeling Threats looking at CIA feature of Security Basics. The aim covered to look towards gathering the information needed from application development teams in order to mock out the potential threats that are inherit in the software application they build starting from the very inception of the software birth. &lt;br /&gt;
Giving the demonstration of Threat Analysis and Modeling Tool v2.0 with the basic example of its functionality, Dharmesh presented the Threat Modeling in real scenario. &lt;br /&gt;
&lt;br /&gt;
Dharmesh's Presentation&lt;br /&gt;
[http://www.owasp.org/images/6/6c/Dharmesh_Threat_Modeling.ppt Download]&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa explained how password can be lost or manipulated in a real life scenario and it dealt with the countermeasures to be taken to avoid it. The topics covered under it included Stealing Password using different methods as – Browser’s Refresh, Browser’s Memory, Remember feature, Forget Password feature and last but not the least SQL Injection. The role of Browser’s Viewing Tool available showed a clear picture of how password could be easily cracked.&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/21/5_ways_to_lose_your_user%27s_password.ppt Download]&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=24111</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=24111"/>
				<updated>2008-01-03T08:15:45Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (91-98670-75327) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6,&amp;lt;br&amp;gt;&lt;br /&gt;
SEEPZ, Andheri (E), Mumbai 400 096.&amp;lt;br&amp;gt;&lt;br /&gt;
91-98670-75327&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''&lt;br /&gt;
&lt;br /&gt;
The second OWASP Mumbai Chapter Meet was held at TechMahindra premises in Chandivali. Mr. Richard on behalf of TechMahindra gave a warm welcome to all the delegates to the OWASP Mumbai Local Chapter –II. Accompanying him, Mr. Dharmesh of Mastek Ltd – Mumbai Chapter Head gave a brief description about the goals of OWASP Mumbai Chapter and the road ahead.&lt;br /&gt;
&lt;br /&gt;
Presentations:&lt;br /&gt;
&lt;br /&gt;
1. ''Significance of Random Numbers in Application Security'': '''Richard Lewis''', e-Security Consultant with Tech Mahindra, started with the practical usage of random numbers. He explained how good random number generation prevents applications from malfunctioning, increases strength of cryptographic operations which in turn increases entropy associated with the key. He went on to explain how random numbers automate otherwise manual tasks and how it increases the security of application. He explained the concepts of entropy and to which level it should be reached in an application. In the end he talked about the various sources of random numbers. He showed developers the simple mathematics required to calculate minimum password lengths, given the security requirements.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/1/13/RichardLewis_RandomNumberSignificance.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
2. ''Java Decompilation'': '''Girish Kulkarni''', e-Security Consultant with Tech Mahindra went through Java Decompilation utility and techniques to defeat decompilation. Use of obfuscators, byte code encryptor/decryptor and generating executable from source were some of the techniques that he explained.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/3/3e/Girish_LockingDownJavaByteCode.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
3. ''/GS Security Check in Visual Studio'': '''Chanda Dutta''', '''Divya Makhija''', '''Sugita Kumari''', '''Upma Sharma''' from Tech Mahindra, presented the usage of /GS security check in Visual Studio. Chanda started the presentation by giving an introduction to /GS Security Check feature of Visual Studio. She explained what is /GS Buffer Security Check, the need of /GS and what it can prevent. Sugita further explained how /GS works and what is canary with process of how to using a canary can prevent buffer overrun. Upma then demonstrated a simulation explaining normal working of buffer overflow and how can it be prevented. Divya explained the various limitations of /GS as how the features of /GS can be exploited and summarized the /GS Buffer Security Check features and functionalities. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/a/ad/GS_Switch_in_Visual_Studio.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
'''Venue and Sponsor Details:'''&lt;br /&gt;
&lt;br /&gt;
[http://www.techmahindra.com Tech Mahindra Ltd.].&lt;br /&gt;
&lt;br /&gt;
Tech Mahindra Limited.&lt;br /&gt;
Wing 1, Oberoi Estate Gardens,&lt;br /&gt;
Chandivali, Andheri (E),&lt;br /&gt;
Mumbai 400 072, Maharashtra, India.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''&lt;br /&gt;
&lt;br /&gt;
With the welcome address by Anuradha, the first meeting of Mumbai Chapter embarked. Right from giving a brief introduction about OWASP and its aim, Anuradha explained the focus of OWASP as a voluntary organization aiming at contributing to the knowledge as a part of sharing it. Apart from it, Anuradha briefed about OWASP Top 10 Project and OWASP Guide to building Secure Application.&lt;br /&gt;
&lt;br /&gt;
Richard presented on Secure Coding Fundamentals and elucidated the Cost factor inculcated due to insecure code resulting in Network Cost, Productivity Cost and so on. Further explaining the basic reasons of threat to code, he explained how the mistakes done by the Programmers, I/O, API Abuse, Environment &amp;amp; Configuration and Time &amp;amp; State were responsible for Security flaws in an application. Moving ahead, Richard laid down a few principles to be followed as Secure Coding – General Guidelines for all the languages and specific Secure Coding Guidelines for C &amp;amp; C++, Java and .NET&lt;br /&gt;
&lt;br /&gt;
Richard's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/28/RichardLewis_SecureCodingFundamentals.ppt Download]&lt;br /&gt;
&lt;br /&gt;
With Threat Analysis &amp;amp; Modeling Process, Dharmesh explained the steps followed as Threat Modeling Process starting from Defining Application Requirement, Application Architecture, and Modeling Threats looking at CIA feature of Security Basics. The aim covered to look towards gathering the information needed from application development teams in order to mock out the potential threats that are inherit in the software application they build starting from the very inception of the software birth. &lt;br /&gt;
Giving the demonstration of Threat Analysis and Modeling Tool v2.0 with the basic example of its functionality, Dharmesh presented the Threat Modeling in real scenario. &lt;br /&gt;
&lt;br /&gt;
Dharmesh's Presentation&lt;br /&gt;
[http://www.owasp.org/images/6/6c/Dharmesh_Threat_Modeling.ppt Download]&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa explained how password can be lost or manipulated in a real life scenario and it dealt with the countermeasures to be taken to avoid it. The topics covered under it included Stealing Password using different methods as – Browser’s Refresh, Browser’s Memory, Remember feature, Forget Password feature and last but not the least SQL Injection. The role of Browser’s Viewing Tool available showed a clear picture of how password could be easily cracked.&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/21/5_ways_to_lose_your_user%27s_password.ppt Download]&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=24110</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=24110"/>
				<updated>2008-01-03T08:14:39Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (91-98670-75327) of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;The Chapter Mailing Address is:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Dharmesh Mehta&amp;lt;br&amp;gt;&lt;br /&gt;
Mastek Ltd, Unit 183, SDF 6&amp;lt;br&amp;gt;&lt;br /&gt;
Andheri (E), Mumbai 400 096&amp;lt;br&amp;gt;&lt;br /&gt;
91-98670-75327&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''&lt;br /&gt;
&lt;br /&gt;
The second OWASP Mumbai Chapter Meet was held at TechMahindra premises in Chandivali. Mr. Richard on behalf of TechMahindra gave a warm welcome to all the delegates to the OWASP Mumbai Local Chapter –II. Accompanying him, Mr. Dharmesh of Mastek Ltd – Mumbai Chapter Head gave a brief description about the goals of OWASP Mumbai Chapter and the road ahead.&lt;br /&gt;
&lt;br /&gt;
Presentations:&lt;br /&gt;
&lt;br /&gt;
1. ''Significance of Random Numbers in Application Security'': '''Richard Lewis''', e-Security Consultant with Tech Mahindra, started with the practical usage of random numbers. He explained how good random number generation prevents applications from malfunctioning, increases strength of cryptographic operations which in turn increases entropy associated with the key. He went on to explain how random numbers automate otherwise manual tasks and how it increases the security of application. He explained the concepts of entropy and to which level it should be reached in an application. In the end he talked about the various sources of random numbers. He showed developers the simple mathematics required to calculate minimum password lengths, given the security requirements.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/1/13/RichardLewis_RandomNumberSignificance.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
2. ''Java Decompilation'': '''Girish Kulkarni''', e-Security Consultant with Tech Mahindra went through Java Decompilation utility and techniques to defeat decompilation. Use of obfuscators, byte code encryptor/decryptor and generating executable from source were some of the techniques that he explained.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/3/3e/Girish_LockingDownJavaByteCode.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
3. ''/GS Security Check in Visual Studio'': '''Chanda Dutta''', '''Divya Makhija''', '''Sugita Kumari''', '''Upma Sharma''' from Tech Mahindra, presented the usage of /GS security check in Visual Studio. Chanda started the presentation by giving an introduction to /GS Security Check feature of Visual Studio. She explained what is /GS Buffer Security Check, the need of /GS and what it can prevent. Sugita further explained how /GS works and what is canary with process of how to using a canary can prevent buffer overrun. Upma then demonstrated a simulation explaining normal working of buffer overflow and how can it be prevented. Divya explained the various limitations of /GS as how the features of /GS can be exploited and summarized the /GS Buffer Security Check features and functionalities. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/a/ad/GS_Switch_in_Visual_Studio.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
'''Venue and Sponsor Details:'''&lt;br /&gt;
&lt;br /&gt;
[http://www.techmahindra.com Tech Mahindra Ltd.].&lt;br /&gt;
&lt;br /&gt;
Tech Mahindra Limited.&lt;br /&gt;
Wing 1, Oberoi Estate Gardens,&lt;br /&gt;
Chandivali, Andheri (E),&lt;br /&gt;
Mumbai 400 072, Maharashtra, India.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''&lt;br /&gt;
&lt;br /&gt;
With the welcome address by Anuradha, the first meeting of Mumbai Chapter embarked. Right from giving a brief introduction about OWASP and its aim, Anuradha explained the focus of OWASP as a voluntary organization aiming at contributing to the knowledge as a part of sharing it. Apart from it, Anuradha briefed about OWASP Top 10 Project and OWASP Guide to building Secure Application.&lt;br /&gt;
&lt;br /&gt;
Richard presented on Secure Coding Fundamentals and elucidated the Cost factor inculcated due to insecure code resulting in Network Cost, Productivity Cost and so on. Further explaining the basic reasons of threat to code, he explained how the mistakes done by the Programmers, I/O, API Abuse, Environment &amp;amp; Configuration and Time &amp;amp; State were responsible for Security flaws in an application. Moving ahead, Richard laid down a few principles to be followed as Secure Coding – General Guidelines for all the languages and specific Secure Coding Guidelines for C &amp;amp; C++, Java and .NET&lt;br /&gt;
&lt;br /&gt;
Richard's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/28/RichardLewis_SecureCodingFundamentals.ppt Download]&lt;br /&gt;
&lt;br /&gt;
With Threat Analysis &amp;amp; Modeling Process, Dharmesh explained the steps followed as Threat Modeling Process starting from Defining Application Requirement, Application Architecture, and Modeling Threats looking at CIA feature of Security Basics. The aim covered to look towards gathering the information needed from application development teams in order to mock out the potential threats that are inherit in the software application they build starting from the very inception of the software birth. &lt;br /&gt;
Giving the demonstration of Threat Analysis and Modeling Tool v2.0 with the basic example of its functionality, Dharmesh presented the Threat Modeling in real scenario. &lt;br /&gt;
&lt;br /&gt;
Dharmesh's Presentation&lt;br /&gt;
[http://www.owasp.org/images/6/6c/Dharmesh_Threat_Modeling.ppt Download]&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa explained how password can be lost or manipulated in a real life scenario and it dealt with the countermeasures to be taken to avoid it. The topics covered under it included Stealing Password using different methods as – Browser’s Refresh, Browser’s Memory, Remember feature, Forget Password feature and last but not the least SQL Injection. The role of Browser’s Viewing Tool available showed a clear picture of how password could be easily cracked.&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/21/5_ways_to_lose_your_user%27s_password.ppt Download]&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=23835</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=23835"/>
				<updated>2007-12-04T13:36:48Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade &lt;br /&gt;
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services&lt;br /&gt;
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China). &lt;br /&gt;
&lt;br /&gt;
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks &amp;amp; exploits most of the time.&lt;br /&gt;
&lt;br /&gt;
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management &amp;amp; implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''&lt;br /&gt;
&lt;br /&gt;
The second OWASP Mumbai Chapter Meet was held at TechMahindra premises in Chandivali. Mr. Richard on behalf of TechMahindra gave a warm welcome to all the delegates to the OWASP Mumbai Local Chapter –II. Accompanying him, Mr. Dharmesh of Mastek Ltd – Mumbai Chapter Head gave a brief description about the goals of OWASP Mumbai Chapter and the road ahead.&lt;br /&gt;
&lt;br /&gt;
Presentations:&lt;br /&gt;
&lt;br /&gt;
1. ''Significance of Random Numbers in Application Security'': '''Richard Lewis''', e-Security Consultant with Tech Mahindra, started with the practical usage of random numbers. He explained how good random number generation prevents applications from malfunctioning, increases strength of cryptographic operations which in turn increases entropy associated with the key. He went on to explain how random numbers automate otherwise manual tasks and how it increases the security of application. He explained the concepts of entropy and to which level it should be reached in an application. In the end he talked about the various sources of random numbers. He showed developers the simple mathematics required to calculate minimum password lengths, given the security requirements.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/1/13/RichardLewis_RandomNumberSignificance.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
2. ''Java Decompilation'': '''Girish Kulkarni''', e-Security Consultant with Tech Mahindra went through Java Decompilation utility and techniques to defeat decompilation. Use of obfuscators, byte code encryptor/decryptor and generating executable from source were some of the techniques that he explained.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/3/3e/Girish_LockingDownJavaByteCode.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
3. ''/GS Security Check in Visual Studio'': '''Chanda Dutta''', '''Divya Makhija''', '''Sugita Kumari''', '''Upma Sharma''' from Tech Mahindra, presented the usage of /GS security check in Visual Studio. Chanda started the presentation by giving an introduction to /GS Security Check feature of Visual Studio. She explained what is /GS Buffer Security Check, the need of /GS and what it can prevent. Sugita further explained how /GS works and what is canary with process of how to using a canary can prevent buffer overrun. Upma then demonstrated a simulation explaining normal working of buffer overflow and how can it be prevented. Divya explained the various limitations of /GS as how the features of /GS can be exploited and summarized the /GS Buffer Security Check features and functionalities. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/a/ad/GS_Switch_in_Visual_Studio.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
'''Venue and Sponsor Details:'''&lt;br /&gt;
&lt;br /&gt;
[http://www.techmahindra.com Tech Mahindra Ltd.].&lt;br /&gt;
&lt;br /&gt;
Tech Mahindra Limited.&lt;br /&gt;
Wing 1, Oberoi Estate Gardens,&lt;br /&gt;
Chandivali, Andheri (E),&lt;br /&gt;
Mumbai 400 072, Maharashtra, India.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Minutes of Meeting - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''&lt;br /&gt;
&lt;br /&gt;
With the welcome address by Anuradha, the first meeting of Mumbai Chapter embarked. Right from giving a brief introduction about OWASP and its aim, Anuradha explained the focus of OWASP as a voluntary organization aiming at contributing to the knowledge as a part of sharing it. Apart from it, Anuradha briefed about OWASP Top 10 Project and OWASP Guide to building Secure Application.&lt;br /&gt;
&lt;br /&gt;
Richard presented on Secure Coding Fundamentals and elucidated the Cost factor inculcated due to insecure code resulting in Network Cost, Productivity Cost and so on. Further explaining the basic reasons of threat to code, he explained how the mistakes done by the Programmers, I/O, API Abuse, Environment &amp;amp; Configuration and Time &amp;amp; State were responsible for Security flaws in an application. Moving ahead, Richard laid down a few principles to be followed as Secure Coding – General Guidelines for all the languages and specific Secure Coding Guidelines for C &amp;amp; C++, Java and .NET&lt;br /&gt;
&lt;br /&gt;
Richard's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/28/RichardLewis_SecureCodingFundamentals.ppt Download]&lt;br /&gt;
&lt;br /&gt;
With Threat Analysis &amp;amp; Modeling Process, Dharmesh explained the steps followed as Threat Modeling Process starting from Defining Application Requirement, Application Architecture, and Modeling Threats looking at CIA feature of Security Basics. The aim covered to look towards gathering the information needed from application development teams in order to mock out the potential threats that are inherit in the software application they build starting from the very inception of the software birth. &lt;br /&gt;
Giving the demonstration of Threat Analysis and Modeling Tool v2.0 with the basic example of its functionality, Dharmesh presented the Threat Modeling in real scenario. &lt;br /&gt;
&lt;br /&gt;
Dharmesh's Presentation&lt;br /&gt;
[http://www.owasp.org/images/6/6c/Dharmesh_Threat_Modeling.ppt Download]&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa explained how password can be lost or manipulated in a real life scenario and it dealt with the countermeasures to be taken to avoid it. The topics covered under it included Stealing Password using different methods as – Browser’s Refresh, Browser’s Memory, Remember feature, Forget Password feature and last but not the least SQL Injection. The role of Browser’s Viewing Tool available showed a clear picture of how password could be easily cracked.&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/21/5_ways_to_lose_your_user%27s_password.ppt Download]&lt;br /&gt;
&lt;br /&gt;
'''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Effective_Software_Security_Management.pdf&amp;diff=23603</id>
		<title>File:Effective Software Security Management.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Effective_Software_Security_Management.pdf&amp;diff=23603"/>
				<updated>2007-11-21T15:52:59Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: uploaded a new version of &amp;quot;Image:Effective Software Security Management.pdf&amp;quot;: This is a paper describing effective software security management.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a white paper published by Dharmesh Mehta on Effective Software Security Management.&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Papers&amp;diff=23595</id>
		<title>Category:OWASP Papers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Papers&amp;diff=23595"/>
				<updated>2007-11-21T13:02:51Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: /* Papers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Papers Program ==&lt;br /&gt;
    &lt;br /&gt;
In an effort to promote more in-depth work in application security, the OWASP Papers program is now accepting paper submissions. Papers submitted to the OWASP Papers program will be reviewed by a team of senior application security experts. These reviewers will provide constructive feedback on submissions in the hopes of achieving a publishable quality paper. Papers that are approved by the review team will be published on the OWASP website and will be candidates for presentation at the next OWASP AppSec conference.   &lt;br /&gt;
    &lt;br /&gt;
== A note on plagiarism ==&lt;br /&gt;
&lt;br /&gt;
Plagiarism is representing another person's work as one's own. According to [http://www.dianahacker.com/ Diana Hacker], &amp;quot;Three acts are plagiarism: (1) failing to cite quotations and borrowed ideas, (2) failing to enclose borrowed language in quotation marks and (3) failing to put summaries and paraphrases in your own words.&amp;quot; Plagiarism is inconsistent with OWASP's goals and will result in permanent removal of your material from our site. Please report suspected plagiarism to [mailto:owasp@owasp.org owasp@owasp.org] with as many details as possible.   &lt;br /&gt;
    &lt;br /&gt;
== Submitting a paper ==&lt;br /&gt;
    &lt;br /&gt;
To submit a paper, please use the following [[Media:Paper_template.doc | template for Microsoft Word / Open Office]] documents. All submissions should be sent to [mailto:owasp@owasp.org owasp@owasp.org]. By submitting a paper, you agree to having OWASP publish the paper on the OWASP website and that you will not distribute the paper via other channels. Your paper will be made available under the Creative Commons Share-Alike Attribution license.   &lt;br /&gt;
    &lt;br /&gt;
== Papers ==&lt;br /&gt;
    &lt;br /&gt;
&amp;lt;!--   &lt;br /&gt;
; [http://link Title] (Author)   &lt;br /&gt;
: Brief description   &lt;br /&gt;
--&amp;gt;   &lt;br /&gt;
&lt;br /&gt;
; [https://www.owasp.org/images/2/28/Effective_Software_Security_Management.pdf Effective Software Security Management PDF Version] (Dharmesh Mehta)   &lt;br /&gt;
: Discusses practical, flexible and understandable approach to aligning application security in SDLC.    &lt;br /&gt;
&lt;br /&gt;
; [http://www.owasp.org/images/b/b6/Jeopardy_in_Web_2.0_-_The_Next_Generation_Web_Applications.pdf Jeopardy in Web 2.0 - The Next Generation Web PDF Version] (Dharmesh Mehta)   &lt;br /&gt;
: Discusses attacks against Web 2.0 - The Next Generation Web   &lt;br /&gt;
    &lt;br /&gt;
; [http://www.owasp.org/index.php/OWASP_Papers/Jeopardy_in_Web_2_0 Jeopardy in Web 2.0 - The Next Generation Web HTML Version] (Dharmesh Mehta)   &lt;br /&gt;
: Discusses attacks against Web 2.0 - The Next Generation Web   &lt;br /&gt;
    &lt;br /&gt;
; [http://www.owasp.org/images/1/16/Document_Security_in_Web_Applications.doc Document Security in Web Applications] (Andres Desa)&lt;br /&gt;
: Discusses issues with protecting data in document form, such as Word, Excel, and PDF.&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Effective_Software_Security_Management.pdf&amp;diff=23594</id>
		<title>File:Effective Software Security Management.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Effective_Software_Security_Management.pdf&amp;diff=23594"/>
				<updated>2007-11-21T12:59:11Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: This is a white paper published by Dharmesh Mehta on Effective Software Security Management.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a white paper published by Dharmesh Mehta on Effective Software Security Management.&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Week_September_2007&amp;diff=22297</id>
		<title>OWASP Week September 2007</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Week_September_2007&amp;diff=22297"/>
				<updated>2007-10-10T13:06:07Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: /* Pictures */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page will contain the outcome of the multiple OWASP Chapter events that will occur during during the week 5th Sep -&amp;gt; 12 Sep (see [[OWASP Day]])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentations (links to) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Washington DC ====&lt;br /&gt;
&lt;br /&gt;
All presentations can be found at the link below. &lt;br /&gt;
&lt;br /&gt;
[[Washington_DC_LIVE-O]]&lt;br /&gt;
&lt;br /&gt;
==== Belgium ====&lt;br /&gt;
&lt;br /&gt;
===== Getting started with WebGoat &amp;amp; WebScarab (Erwin Geirnaert) =====&lt;br /&gt;
Download [[:Image:OWASPDay2007Belgium_WebGoat-WebScarab.ppt|presentation]].&lt;br /&gt;
&lt;br /&gt;
In this tutorial you will learn how to use WebScarab to solve the lessons in WebGoat.&lt;br /&gt;
&lt;br /&gt;
Following points will be explained:&lt;br /&gt;
* Configure WebScarab as a local proxy&lt;br /&gt;
* Intercepte HTTP requests and responses&lt;br /&gt;
* Modify HTTP requests to solve the lesson “Hidden field manipulation”&lt;br /&gt;
* Modify HTTP responses to solve the lesson “Bypass client-side Javascript validation”&lt;br /&gt;
* Use the session analysis tab in WebScarab&lt;br /&gt;
* Use the web services tab in WebScarab&lt;br /&gt;
* Use WebScarab to analyze Ajax XML messages&lt;br /&gt;
&lt;br /&gt;
'''!! Prerequisites:'''&lt;br /&gt;
* Bring your own laptop with you! &lt;br /&gt;
* Download [[OWASP_WebScarab_Project#Download|WebScarab]] onto your laptop&lt;br /&gt;
* Download [[OWASP_WebGoat_Project#Download|WebGoat]] onto your laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Erwin Geirnaert is CEO and co-founder of [http://www.zionsecurity.com ZION Security]. He is a renowned application security expert and has presented on various conferences like Javapolis, Eurostar, Owasp,… about web security. He is board member of OWASP Belux and actively involved in various OWASP projects like OWASP Java and OWASP WebGoat. Because of his technical experience he loves to do security testing, code review, reverse engineering,.. for Fortune 1000 companies in Europe. More information can be found on his LinkedIn profile: http://www.linkedin.com/in/erwingeirnaert.&lt;br /&gt;
&lt;br /&gt;
===== OWASP Evaluation and Certification Criteria Draft (Mark Curphey) =====&lt;br /&gt;
Download [[:Image:OWASP_Day_-_Belgium_-_Curphey.pdf|presentation]].&lt;br /&gt;
&lt;br /&gt;
As opposed to me continuing saying what’s wrong with PCI DSS, it seems to me that OWASP is a perfect forum to simply create and publish a “better criteria”. This can either be adopted and implemented by an organization like OWASP or considered to be incorporated into the PCI or other security standards. We won't get bogged down in the politics up-front, but hold something good up to the world for people to adopt. This project would of course draw on and bring together many of the other OWASP Projects including the Guide (What is a secure web app), Testing Guides (How to test for a secure web app), WebGoat (part of how to certify an individual understands and can find web app issues) etc. Many of those projects may not be complete or a perfect fit today, but this project can bring a common connecting theme to a lot of very valuable IP that OWASP has built over the years. I will also create it in such as way that a corporate could adopt/adapt it themseles as well as an industry. Where other OWASP projects are not complete or currently suitable I will build a requirements doc that can be considered by those teams if they feel appropriate. &lt;br /&gt;
&lt;br /&gt;
[http://securitybuddha.com/about/ Mark Curphey] ran Foundstone consulting from 2003 until late 2006 during which time the company was sold to McAfee.  Before joining Foundstone Mark was the Director of Information Security at Charles Schwab (responsible for the software security program) and has also worked for ISS and several financial services companies in Europe. Mark has a Masters degree in information security from Royal Holloway, University of London and was the original founder of the Open Web Application Security Project (OWASP).&lt;br /&gt;
&lt;br /&gt;
===== Automated Web FOO or FUD? (David Kierznowski) =====&lt;br /&gt;
Download [[:Image:OWASPDay2007-Belgium-dwk.ppt|presentation]].&lt;br /&gt;
&lt;br /&gt;
We take a look into automated web application testing technologies and their effectiveness against real life applications. &lt;br /&gt;
&lt;br /&gt;
Also, we look into one of GNUCITIZENs latest projects, The Technika Security Framework (TSF), which will enable users to automate security testing directly from their browser.&lt;br /&gt;
&lt;br /&gt;
[http://gnucitizen.org/about/dk David Kierznowski] currently works as a Senior Security Analyst for a leading penetration testing company in the UK. He has worked in the security industry for the past 6 years. David is also the founder of both [http://michaeldaw.org michaeldaw.org] and [http://blogsecurity.net blogsecurity.net] and is an active member of the [http://gnucitizen.org GNUCITIZEN] group.&lt;br /&gt;
&lt;br /&gt;
===== OWASP Pantera Unleashed (Simon Roses Femerling) =====&lt;br /&gt;
Download [[:Image:OWASPDay2007Belgium_Pantera_Unleash.ppt|presentation]].&lt;br /&gt;
&lt;br /&gt;
The presentation will provide a glimpse into what Pantera can offer when performing blackbox web assessments. In the age of Web 2.0 we need powerful tools that provide us rich and accurate information and allows us to manipulate that information into our advantage, that's what Pantera is all about. &lt;br /&gt;
&lt;br /&gt;
Simon Roses Femerling is a Security Technologist at the [http://blogs.msdn.com/ace_team/ ACE Team] at Microsoft. Former PwC and @Stake. He has many years of security experience where he has authored and cooperated in several security Open Source projects and advisories. Simon is natural from wonderful Mallorca Island in the Mediterranean Sea. He holds a postgraduate in E-Commerce from Harvard University and a B.S. from Suffolk University at Boston, Massachusetts.&lt;br /&gt;
&lt;br /&gt;
===== CLASP, SDL and Touchpoints Compared (Bart De Win) =====&lt;br /&gt;
Presentation pending paper publication.&lt;br /&gt;
&lt;br /&gt;
Over the years, specific methodologies and techniques for secure software &lt;br /&gt;
engineering have been proposed, yet dedicated processes have become available &lt;br /&gt;
only recently. In this presentation, the highlights of an activity-driven &lt;br /&gt;
comparison of three high-profile processes for the development of secure &lt;br /&gt;
software are presented.&lt;br /&gt;
&lt;br /&gt;
Bart De Win is a postdoctoral researcher in the research group DistriNet, Department of Computer Science at the Katholieke Universiteit Leuven. His research interests are in secure software engineering, including software development processes, aspect-oriented software development and model driven security.&lt;br /&gt;
&lt;br /&gt;
===== Threats of e-insecurity in Belgium and the Belgian response (Luc Beirens, FCCU) =====&lt;br /&gt;
Download [[:Image:OWASP_Day_Belgium_FCCU_e-insecurity.pdf|presentation]].&lt;br /&gt;
&lt;br /&gt;
The presentation will give a short overview of the actual threats on the e-society in Belgium.&lt;br /&gt;
How are public and private sector organized (or not) to tacle the different problems ?&lt;br /&gt;
What are the tasks of the police within this framework ?&lt;br /&gt;
&lt;br /&gt;
Since 1991, chief superintendent Luc Beirens is engaged in computer forensics and cyber crime investigations.  He is head of the Federal Computer Crime Unit of the Federal Police since 2001. Aside consulting his detectives in current cyber crime investigations, he is responsible for the reorganization, the equipment and the training of Belgian police services concerned with cyber crime investigations. As member of the European Working Party on Information Technology Crime (EWPITC) of Interpol since 1995 and the EUROPOL cyber crime expert group since 2001, he has cooperated in writing several documents concerning computer forensics and cyber crime investigations. He lectures in these fields at several police academies and universities.&lt;br /&gt;
His is involved in several organizations and platforms that are concerned with e-security, ICT forensics and cyber crime combating. Before his detective career, he has worked from 1987 till 1995 as analyst and project manager on the development of the Police Information System of the Belgian Gendarmerie.  He holds master degrees in criminology and information technology.&lt;br /&gt;
&lt;br /&gt;
===== For my next trick... hacking Web2.0 (pdp) =====&lt;br /&gt;
Download [[:Image:OWASP_Day_Belgium_2007-pdp.ppt|presentation]].&lt;br /&gt;
&lt;br /&gt;
Web2.0, if I can summarize it with a few simple words, is all about communication, distribution, information, agents, clients and servers. Those who understand the 2.0 fundamentals have the power to manipulate the global Web to suit their needs - hackers, the new digital breed of the 2.0 world. Web2.0 hacking is a mean for communicating and distributing critical information in a better way. It can be used to build ghost infrastructures from where to launch attacks - anonymously, no traces, nothing. Web2.0 hacking is also about the thin line between client-side and server-side security. It is about the endpoints and the electronic highways. It is about reaching the masses and yet being able to perform attacks on specific targets. Web2.0 hacking is also about distribution and influence, covert channels, bots, IA, ghosts inside the electronic frame. Web2.0 hacking is also a movement, a cyber subculture where individuals show their technical abilities, and understandings of the world and use that to manipulate their way through the system.&lt;br /&gt;
&lt;br /&gt;
Web2.0 hacking practices should never be related to AJAX and JavaScript exploitation techniques only. Although it is true that client-side security has a significant part of the Web2.0 ecosystem, it is important to realize its role. There are far too many other aspects that we need to look into. My aim is to cover these aspects and reveal the hidden dangers.&lt;br /&gt;
&lt;br /&gt;
[http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), is the founder and leading contributer of the [http://gnucitizen.org GNUCITIZEN] group. He is a senior IT security consultant based in London, UK. His day-to-day work involves identifying vulnerabilities, building attack strategies and creating attack tools and penetration testing infrastructures. Petko is known in the underground circles as pdp or architect but his name is well known in the IT security industry for his strong technical background and creative thinking. He has been working for some of the world's top companies, providing consultancy on the latest security vulnerabilities and attack technologies.&lt;br /&gt;
&lt;br /&gt;
==== San Antonio ====&lt;br /&gt;
&lt;br /&gt;
Here is the Bruce Jenkins presentation on Developing an Application Security Strategy for Large Enterprise Systems:&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Fortify-bjenkins-AppSecStrategy-20070906.pdf]&lt;br /&gt;
&lt;br /&gt;
==== Israel ====&lt;br /&gt;
&lt;br /&gt;
'''OWASP IL 8th meeting at the OWASP week''' - '''[http://www.owasp.org/index.php/8th_OWASP_IL_chapter_meeting Meeting program and presentations.]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Turkey ====&lt;br /&gt;
&lt;br /&gt;
'''Introduction'''&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/6/66/OWASP_DAY_TR.sub.ppt Turkish Subtitle] by Bedirhan Urgun (delete .ppt extension) for [http://www.owasp.org/downloads/OWASP_Day.wmv  Jeff Williams's OWASP Day Intro movie] &lt;br /&gt;
&lt;br /&gt;
''' Privacy in Governmental Insitutions - A Current State Analysis'''&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/b/bc/OWASP2007_KamudaPrivacy.ppt OWASP2007_KamudaPrivacy.ppt‎]&lt;br /&gt;
&lt;br /&gt;
Presentation discusses the understanding of the privacy concept settled in governmental institutions and deliberate on general information security problems related with privacy issues. Getting off with general privacy problems, in specific, information about the privacy issues related to web applications is given. Moreover, concrete suggestions on providing a solid privacy in these institutions are presented.&lt;br /&gt;
&lt;br /&gt;
Hayrettin BAHŞİ&lt;br /&gt;
Chief Researcher CC Lab-UEKAE TUBITAK&lt;br /&gt;
&lt;br /&gt;
''' Secure Web Application Development '''&lt;br /&gt;
* [https://www.owasp.org/images/4/4b/Guvenli_Web_Uygulamalarinin_Gelistirilmesi2.ppt Guvenli_Web_Uygulamalarinin_Gelistirilmesi.ppt] &lt;br /&gt;
&lt;br /&gt;
Presentation points out the vitality of security phases and touchpoints in SDLC, web applications' in specific. It goes over the principles, patterns, threat modeling as well as other important factors that comprise specification, development, testing phases of a secure application process. &lt;br /&gt;
&lt;br /&gt;
Korhan GÜRLER Chief Researcher PRO-G&lt;br /&gt;
&lt;br /&gt;
'''Discussion'''&lt;br /&gt;
&lt;br /&gt;
Answers to Panel questions can be found at [http://www.owasp.org/index.php/Turkey] under the title of Artifacts - OWASP DAY: on the topic of &amp;quot;Privacy in the 21st Century&amp;quot; - September 8 (Turkey 2007)&lt;br /&gt;
&lt;br /&gt;
==== Italy ====&lt;br /&gt;
All presentations can be found [http://www.owasp.org/index.php/Italy#September_10th.2C_2007_-_OWASP_Day_WorldWide:_.22Privacy_in_the_21st_Century.22 here]&lt;br /&gt;
&lt;br /&gt;
==== Rochester ====&lt;br /&gt;
&lt;br /&gt;
2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
Abstract: Web application security vulnerabilities remain by the far the most frequently reported vulnerability category. In spite of wide spread use, and very frequent vulnerabilities, most web applications are still not being securely developed and deployed. The presentation will demonstrate why experts estimate the percentage of vulnerable web application range from 75% to 99% and review the 2007 OWASP top 10 web applications security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Ottawa ====&lt;br /&gt;
&lt;br /&gt;
* Presentation: What is Cardspace? By Christian Beauclair - Microsoft&lt;br /&gt;
&lt;br /&gt;
The impact of phishing and other forms of online identity phraud has grown enormously in the last few years. Today, people are starting to curb their activities online due to fears of phishing and phraud and because they just can’t be bothered to fight through today’s online authentication systems such as multiple usernames and passwords, Captcha control and OTP tokens. In this session we’ll explore some of the core issues facing our identities online and then discuss how technologies such as Windows CardSpace enable users to authenticate and/or present personal information more easily and safely to sites that they know are legitimate.&lt;br /&gt;
&lt;br /&gt;
==== Seattle ====&lt;br /&gt;
All presentations can be found [https://www.owasp.org/index.php/Seattle#Last_Event_06_Sep_.28Thurs.29 here].&lt;br /&gt;
&lt;br /&gt;
==== Mumbai ====&lt;br /&gt;
* Welcome Keynote : Dharmesh Mehta, Mastek Ltd.[[https://www.owasp.org/images/a/ab/Keynote.pdf  Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
* Black Vector of Web Exploitation : Aditya Sood, Sec Niche [[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
* End User Privacy Breaches : Rishi Narang, ThirdBrigade [[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
* Privacy on the Web - The road ahead in the 21st century : Yogesh Badwe, Orange Business Services [[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
== Pictures ==&lt;br /&gt;
OWASP Mumbai Chapter [http://www.owasp.org/images/5/50/OWASP_DAY.JPG SNAPS]&lt;br /&gt;
&lt;br /&gt;
== Chapter event reports ==&lt;br /&gt;
&lt;br /&gt;
==== Belgium ====&lt;br /&gt;
* How many participants: 80+&lt;br /&gt;
* How long did the event last: 8 hours&lt;br /&gt;
* Pictures: (to upload)&lt;br /&gt;
* Presentations: on the chapter page&lt;br /&gt;
* Answers to Panel's questions: &lt;br /&gt;
&lt;br /&gt;
==== London ====&lt;br /&gt;
* How many participants: 15&lt;br /&gt;
* How long did the event last: 2 1/2 hours&lt;br /&gt;
* Pictures: (Ivan to upload)&lt;br /&gt;
* Presentations: (pdp to upload)&lt;br /&gt;
* Answers to Panel's questions: (Ivan to provide)&lt;br /&gt;
&lt;br /&gt;
====Washington DC ====&lt;br /&gt;
* How many participants: 50&lt;br /&gt;
* How long did the event last: 5 hours&lt;br /&gt;
* Pictures: none&lt;br /&gt;
* Presentations: Links above&lt;br /&gt;
* Answers to Panel's questions: No time for a panel&lt;br /&gt;
&lt;br /&gt;
==== Mumbai ====&lt;br /&gt;
* How many participants: 38&lt;br /&gt;
* How long did the event last: 3 hours&lt;br /&gt;
* Pictures: [http://www.owasp.org/images/5/50/OWASP_DAY.JPG VIEW HERE]&lt;br /&gt;
* Presentations: on the chapter page&lt;br /&gt;
&lt;br /&gt;
==== San Antonio ====&lt;br /&gt;
* How many participants: 25&lt;br /&gt;
* How long did the event last: 1 1/2 hours&lt;br /&gt;
* Presentation: Bruce Jenkins &amp;quot;Developing an Application Security Strategy for Large Enterprise Systems&amp;quot; [http://www.owasp.org/index.php/Image:Fortify-bjenkins-AppSecStrategy-20070906.pdf]&lt;br /&gt;
&lt;br /&gt;
==== Turkey ====&lt;br /&gt;
* How many participants: 10&lt;br /&gt;
* How long did the event last: 3.5 hours&lt;br /&gt;
* Pictures: (on Bunyamin)&lt;br /&gt;
* Presentations: (look above)&lt;br /&gt;
* Answers to Discussion questions: (look above)&lt;br /&gt;
&lt;br /&gt;
==== Israel ====&lt;br /&gt;
* How many participants: 60&lt;br /&gt;
* How long did the event last: 3 hours&lt;br /&gt;
* Pictures: We seems to have no geeks with 2M phone cameras (and the leader forgot his :-()&lt;br /&gt;
* Presentations: [http://www.owasp.org/index.php/8th_OWASP_IL_chapter_meeting Meeting program and presentations.]&lt;br /&gt;
&lt;br /&gt;
==== Italy ====&lt;br /&gt;
* How many participants: nearly 110 (160 subscriptions)&lt;br /&gt;
* How long did the event last: 4.5 hours&lt;br /&gt;
* Pictures: &lt;br /&gt;
* Presentations: [http://www.owasp.org/index.php/Italy#September_10th.2C_2007_-_OWASP_Day_WorldWide:_.22Privacy_in_the_21st_Century.22 here]&lt;br /&gt;
&lt;br /&gt;
==== Rochester ====&lt;br /&gt;
* How many participants: 11&lt;br /&gt;
* How long did the event last: 2 hours&lt;br /&gt;
* Presentation: 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
* Meeting Minutes:  [[Media:2007-09-10_Rochester_OWASP-Meeting-Minutes.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==== Ottawa ====&lt;br /&gt;
* How many participants: 10&lt;br /&gt;
* How long did the event last: 2.5 hours&lt;br /&gt;
* Presentation: What is Cardspace? By Christian Beauclair - Microsoft&lt;br /&gt;
&lt;br /&gt;
 [[Media:Windows_CardSpace_for_OWASP.zip|PowerPoint]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Week_September_2007&amp;diff=22296</id>
		<title>OWASP Week September 2007</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Week_September_2007&amp;diff=22296"/>
				<updated>2007-10-10T13:05:44Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: /* Pictures (links to) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page will contain the outcome of the multiple OWASP Chapter events that will occur during during the week 5th Sep -&amp;gt; 12 Sep (see [[OWASP Day]])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentations (links to) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Washington DC ====&lt;br /&gt;
&lt;br /&gt;
All presentations can be found at the link below. &lt;br /&gt;
&lt;br /&gt;
[[Washington_DC_LIVE-O]]&lt;br /&gt;
&lt;br /&gt;
==== Belgium ====&lt;br /&gt;
&lt;br /&gt;
===== Getting started with WebGoat &amp;amp; WebScarab (Erwin Geirnaert) =====&lt;br /&gt;
Download [[:Image:OWASPDay2007Belgium_WebGoat-WebScarab.ppt|presentation]].&lt;br /&gt;
&lt;br /&gt;
In this tutorial you will learn how to use WebScarab to solve the lessons in WebGoat.&lt;br /&gt;
&lt;br /&gt;
Following points will be explained:&lt;br /&gt;
* Configure WebScarab as a local proxy&lt;br /&gt;
* Intercepte HTTP requests and responses&lt;br /&gt;
* Modify HTTP requests to solve the lesson “Hidden field manipulation”&lt;br /&gt;
* Modify HTTP responses to solve the lesson “Bypass client-side Javascript validation”&lt;br /&gt;
* Use the session analysis tab in WebScarab&lt;br /&gt;
* Use the web services tab in WebScarab&lt;br /&gt;
* Use WebScarab to analyze Ajax XML messages&lt;br /&gt;
&lt;br /&gt;
'''!! Prerequisites:'''&lt;br /&gt;
* Bring your own laptop with you! &lt;br /&gt;
* Download [[OWASP_WebScarab_Project#Download|WebScarab]] onto your laptop&lt;br /&gt;
* Download [[OWASP_WebGoat_Project#Download|WebGoat]] onto your laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Erwin Geirnaert is CEO and co-founder of [http://www.zionsecurity.com ZION Security]. He is a renowned application security expert and has presented on various conferences like Javapolis, Eurostar, Owasp,… about web security. He is board member of OWASP Belux and actively involved in various OWASP projects like OWASP Java and OWASP WebGoat. Because of his technical experience he loves to do security testing, code review, reverse engineering,.. for Fortune 1000 companies in Europe. More information can be found on his LinkedIn profile: http://www.linkedin.com/in/erwingeirnaert.&lt;br /&gt;
&lt;br /&gt;
===== OWASP Evaluation and Certification Criteria Draft (Mark Curphey) =====&lt;br /&gt;
Download [[:Image:OWASP_Day_-_Belgium_-_Curphey.pdf|presentation]].&lt;br /&gt;
&lt;br /&gt;
As opposed to me continuing saying what’s wrong with PCI DSS, it seems to me that OWASP is a perfect forum to simply create and publish a “better criteria”. This can either be adopted and implemented by an organization like OWASP or considered to be incorporated into the PCI or other security standards. We won't get bogged down in the politics up-front, but hold something good up to the world for people to adopt. This project would of course draw on and bring together many of the other OWASP Projects including the Guide (What is a secure web app), Testing Guides (How to test for a secure web app), WebGoat (part of how to certify an individual understands and can find web app issues) etc. Many of those projects may not be complete or a perfect fit today, but this project can bring a common connecting theme to a lot of very valuable IP that OWASP has built over the years. I will also create it in such as way that a corporate could adopt/adapt it themseles as well as an industry. Where other OWASP projects are not complete or currently suitable I will build a requirements doc that can be considered by those teams if they feel appropriate. &lt;br /&gt;
&lt;br /&gt;
[http://securitybuddha.com/about/ Mark Curphey] ran Foundstone consulting from 2003 until late 2006 during which time the company was sold to McAfee.  Before joining Foundstone Mark was the Director of Information Security at Charles Schwab (responsible for the software security program) and has also worked for ISS and several financial services companies in Europe. Mark has a Masters degree in information security from Royal Holloway, University of London and was the original founder of the Open Web Application Security Project (OWASP).&lt;br /&gt;
&lt;br /&gt;
===== Automated Web FOO or FUD? (David Kierznowski) =====&lt;br /&gt;
Download [[:Image:OWASPDay2007-Belgium-dwk.ppt|presentation]].&lt;br /&gt;
&lt;br /&gt;
We take a look into automated web application testing technologies and their effectiveness against real life applications. &lt;br /&gt;
&lt;br /&gt;
Also, we look into one of GNUCITIZENs latest projects, The Technika Security Framework (TSF), which will enable users to automate security testing directly from their browser.&lt;br /&gt;
&lt;br /&gt;
[http://gnucitizen.org/about/dk David Kierznowski] currently works as a Senior Security Analyst for a leading penetration testing company in the UK. He has worked in the security industry for the past 6 years. David is also the founder of both [http://michaeldaw.org michaeldaw.org] and [http://blogsecurity.net blogsecurity.net] and is an active member of the [http://gnucitizen.org GNUCITIZEN] group.&lt;br /&gt;
&lt;br /&gt;
===== OWASP Pantera Unleashed (Simon Roses Femerling) =====&lt;br /&gt;
Download [[:Image:OWASPDay2007Belgium_Pantera_Unleash.ppt|presentation]].&lt;br /&gt;
&lt;br /&gt;
The presentation will provide a glimpse into what Pantera can offer when performing blackbox web assessments. In the age of Web 2.0 we need powerful tools that provide us rich and accurate information and allows us to manipulate that information into our advantage, that's what Pantera is all about. &lt;br /&gt;
&lt;br /&gt;
Simon Roses Femerling is a Security Technologist at the [http://blogs.msdn.com/ace_team/ ACE Team] at Microsoft. Former PwC and @Stake. He has many years of security experience where he has authored and cooperated in several security Open Source projects and advisories. Simon is natural from wonderful Mallorca Island in the Mediterranean Sea. He holds a postgraduate in E-Commerce from Harvard University and a B.S. from Suffolk University at Boston, Massachusetts.&lt;br /&gt;
&lt;br /&gt;
===== CLASP, SDL and Touchpoints Compared (Bart De Win) =====&lt;br /&gt;
Presentation pending paper publication.&lt;br /&gt;
&lt;br /&gt;
Over the years, specific methodologies and techniques for secure software &lt;br /&gt;
engineering have been proposed, yet dedicated processes have become available &lt;br /&gt;
only recently. In this presentation, the highlights of an activity-driven &lt;br /&gt;
comparison of three high-profile processes for the development of secure &lt;br /&gt;
software are presented.&lt;br /&gt;
&lt;br /&gt;
Bart De Win is a postdoctoral researcher in the research group DistriNet, Department of Computer Science at the Katholieke Universiteit Leuven. His research interests are in secure software engineering, including software development processes, aspect-oriented software development and model driven security.&lt;br /&gt;
&lt;br /&gt;
===== Threats of e-insecurity in Belgium and the Belgian response (Luc Beirens, FCCU) =====&lt;br /&gt;
Download [[:Image:OWASP_Day_Belgium_FCCU_e-insecurity.pdf|presentation]].&lt;br /&gt;
&lt;br /&gt;
The presentation will give a short overview of the actual threats on the e-society in Belgium.&lt;br /&gt;
How are public and private sector organized (or not) to tacle the different problems ?&lt;br /&gt;
What are the tasks of the police within this framework ?&lt;br /&gt;
&lt;br /&gt;
Since 1991, chief superintendent Luc Beirens is engaged in computer forensics and cyber crime investigations.  He is head of the Federal Computer Crime Unit of the Federal Police since 2001. Aside consulting his detectives in current cyber crime investigations, he is responsible for the reorganization, the equipment and the training of Belgian police services concerned with cyber crime investigations. As member of the European Working Party on Information Technology Crime (EWPITC) of Interpol since 1995 and the EUROPOL cyber crime expert group since 2001, he has cooperated in writing several documents concerning computer forensics and cyber crime investigations. He lectures in these fields at several police academies and universities.&lt;br /&gt;
His is involved in several organizations and platforms that are concerned with e-security, ICT forensics and cyber crime combating. Before his detective career, he has worked from 1987 till 1995 as analyst and project manager on the development of the Police Information System of the Belgian Gendarmerie.  He holds master degrees in criminology and information technology.&lt;br /&gt;
&lt;br /&gt;
===== For my next trick... hacking Web2.0 (pdp) =====&lt;br /&gt;
Download [[:Image:OWASP_Day_Belgium_2007-pdp.ppt|presentation]].&lt;br /&gt;
&lt;br /&gt;
Web2.0, if I can summarize it with a few simple words, is all about communication, distribution, information, agents, clients and servers. Those who understand the 2.0 fundamentals have the power to manipulate the global Web to suit their needs - hackers, the new digital breed of the 2.0 world. Web2.0 hacking is a mean for communicating and distributing critical information in a better way. It can be used to build ghost infrastructures from where to launch attacks - anonymously, no traces, nothing. Web2.0 hacking is also about the thin line between client-side and server-side security. It is about the endpoints and the electronic highways. It is about reaching the masses and yet being able to perform attacks on specific targets. Web2.0 hacking is also about distribution and influence, covert channels, bots, IA, ghosts inside the electronic frame. Web2.0 hacking is also a movement, a cyber subculture where individuals show their technical abilities, and understandings of the world and use that to manipulate their way through the system.&lt;br /&gt;
&lt;br /&gt;
Web2.0 hacking practices should never be related to AJAX and JavaScript exploitation techniques only. Although it is true that client-side security has a significant part of the Web2.0 ecosystem, it is important to realize its role. There are far too many other aspects that we need to look into. My aim is to cover these aspects and reveal the hidden dangers.&lt;br /&gt;
&lt;br /&gt;
[http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), is the founder and leading contributer of the [http://gnucitizen.org GNUCITIZEN] group. He is a senior IT security consultant based in London, UK. His day-to-day work involves identifying vulnerabilities, building attack strategies and creating attack tools and penetration testing infrastructures. Petko is known in the underground circles as pdp or architect but his name is well known in the IT security industry for his strong technical background and creative thinking. He has been working for some of the world's top companies, providing consultancy on the latest security vulnerabilities and attack technologies.&lt;br /&gt;
&lt;br /&gt;
==== San Antonio ====&lt;br /&gt;
&lt;br /&gt;
Here is the Bruce Jenkins presentation on Developing an Application Security Strategy for Large Enterprise Systems:&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Fortify-bjenkins-AppSecStrategy-20070906.pdf]&lt;br /&gt;
&lt;br /&gt;
==== Israel ====&lt;br /&gt;
&lt;br /&gt;
'''OWASP IL 8th meeting at the OWASP week''' - '''[http://www.owasp.org/index.php/8th_OWASP_IL_chapter_meeting Meeting program and presentations.]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Turkey ====&lt;br /&gt;
&lt;br /&gt;
'''Introduction'''&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/6/66/OWASP_DAY_TR.sub.ppt Turkish Subtitle] by Bedirhan Urgun (delete .ppt extension) for [http://www.owasp.org/downloads/OWASP_Day.wmv  Jeff Williams's OWASP Day Intro movie] &lt;br /&gt;
&lt;br /&gt;
''' Privacy in Governmental Insitutions - A Current State Analysis'''&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/b/bc/OWASP2007_KamudaPrivacy.ppt OWASP2007_KamudaPrivacy.ppt‎]&lt;br /&gt;
&lt;br /&gt;
Presentation discusses the understanding of the privacy concept settled in governmental institutions and deliberate on general information security problems related with privacy issues. Getting off with general privacy problems, in specific, information about the privacy issues related to web applications is given. Moreover, concrete suggestions on providing a solid privacy in these institutions are presented.&lt;br /&gt;
&lt;br /&gt;
Hayrettin BAHŞİ&lt;br /&gt;
Chief Researcher CC Lab-UEKAE TUBITAK&lt;br /&gt;
&lt;br /&gt;
''' Secure Web Application Development '''&lt;br /&gt;
* [https://www.owasp.org/images/4/4b/Guvenli_Web_Uygulamalarinin_Gelistirilmesi2.ppt Guvenli_Web_Uygulamalarinin_Gelistirilmesi.ppt] &lt;br /&gt;
&lt;br /&gt;
Presentation points out the vitality of security phases and touchpoints in SDLC, web applications' in specific. It goes over the principles, patterns, threat modeling as well as other important factors that comprise specification, development, testing phases of a secure application process. &lt;br /&gt;
&lt;br /&gt;
Korhan GÜRLER Chief Researcher PRO-G&lt;br /&gt;
&lt;br /&gt;
'''Discussion'''&lt;br /&gt;
&lt;br /&gt;
Answers to Panel questions can be found at [http://www.owasp.org/index.php/Turkey] under the title of Artifacts - OWASP DAY: on the topic of &amp;quot;Privacy in the 21st Century&amp;quot; - September 8 (Turkey 2007)&lt;br /&gt;
&lt;br /&gt;
==== Italy ====&lt;br /&gt;
All presentations can be found [http://www.owasp.org/index.php/Italy#September_10th.2C_2007_-_OWASP_Day_WorldWide:_.22Privacy_in_the_21st_Century.22 here]&lt;br /&gt;
&lt;br /&gt;
==== Rochester ====&lt;br /&gt;
&lt;br /&gt;
2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
Abstract: Web application security vulnerabilities remain by the far the most frequently reported vulnerability category. In spite of wide spread use, and very frequent vulnerabilities, most web applications are still not being securely developed and deployed. The presentation will demonstrate why experts estimate the percentage of vulnerable web application range from 75% to 99% and review the 2007 OWASP top 10 web applications security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Ottawa ====&lt;br /&gt;
&lt;br /&gt;
* Presentation: What is Cardspace? By Christian Beauclair - Microsoft&lt;br /&gt;
&lt;br /&gt;
The impact of phishing and other forms of online identity phraud has grown enormously in the last few years. Today, people are starting to curb their activities online due to fears of phishing and phraud and because they just can’t be bothered to fight through today’s online authentication systems such as multiple usernames and passwords, Captcha control and OTP tokens. In this session we’ll explore some of the core issues facing our identities online and then discuss how technologies such as Windows CardSpace enable users to authenticate and/or present personal information more easily and safely to sites that they know are legitimate.&lt;br /&gt;
&lt;br /&gt;
==== Seattle ====&lt;br /&gt;
All presentations can be found [https://www.owasp.org/index.php/Seattle#Last_Event_06_Sep_.28Thurs.29 here].&lt;br /&gt;
&lt;br /&gt;
==== Mumbai ====&lt;br /&gt;
* Welcome Keynote : Dharmesh Mehta, Mastek Ltd.[[https://www.owasp.org/images/a/ab/Keynote.pdf  Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
* Black Vector of Web Exploitation : Aditya Sood, Sec Niche [[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
* End User Privacy Breaches : Rishi Narang, ThirdBrigade [[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
* Privacy on the Web - The road ahead in the 21st century : Yogesh Badwe, Orange Business Services [[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
== Pictures ==&lt;br /&gt;
Mumbai [http://www.owasp.org/images/5/50/OWASP_DAY.JPG SNAPS]&lt;br /&gt;
&lt;br /&gt;
== Chapter event reports ==&lt;br /&gt;
&lt;br /&gt;
==== Belgium ====&lt;br /&gt;
* How many participants: 80+&lt;br /&gt;
* How long did the event last: 8 hours&lt;br /&gt;
* Pictures: (to upload)&lt;br /&gt;
* Presentations: on the chapter page&lt;br /&gt;
* Answers to Panel's questions: &lt;br /&gt;
&lt;br /&gt;
==== London ====&lt;br /&gt;
* How many participants: 15&lt;br /&gt;
* How long did the event last: 2 1/2 hours&lt;br /&gt;
* Pictures: (Ivan to upload)&lt;br /&gt;
* Presentations: (pdp to upload)&lt;br /&gt;
* Answers to Panel's questions: (Ivan to provide)&lt;br /&gt;
&lt;br /&gt;
====Washington DC ====&lt;br /&gt;
* How many participants: 50&lt;br /&gt;
* How long did the event last: 5 hours&lt;br /&gt;
* Pictures: none&lt;br /&gt;
* Presentations: Links above&lt;br /&gt;
* Answers to Panel's questions: No time for a panel&lt;br /&gt;
&lt;br /&gt;
==== Mumbai ====&lt;br /&gt;
* How many participants: 38&lt;br /&gt;
* How long did the event last: 3 hours&lt;br /&gt;
* Pictures: [http://www.owasp.org/images/5/50/OWASP_DAY.JPG VIEW HERE]&lt;br /&gt;
* Presentations: on the chapter page&lt;br /&gt;
&lt;br /&gt;
==== San Antonio ====&lt;br /&gt;
* How many participants: 25&lt;br /&gt;
* How long did the event last: 1 1/2 hours&lt;br /&gt;
* Presentation: Bruce Jenkins &amp;quot;Developing an Application Security Strategy for Large Enterprise Systems&amp;quot; [http://www.owasp.org/index.php/Image:Fortify-bjenkins-AppSecStrategy-20070906.pdf]&lt;br /&gt;
&lt;br /&gt;
==== Turkey ====&lt;br /&gt;
* How many participants: 10&lt;br /&gt;
* How long did the event last: 3.5 hours&lt;br /&gt;
* Pictures: (on Bunyamin)&lt;br /&gt;
* Presentations: (look above)&lt;br /&gt;
* Answers to Discussion questions: (look above)&lt;br /&gt;
&lt;br /&gt;
==== Israel ====&lt;br /&gt;
* How many participants: 60&lt;br /&gt;
* How long did the event last: 3 hours&lt;br /&gt;
* Pictures: We seems to have no geeks with 2M phone cameras (and the leader forgot his :-()&lt;br /&gt;
* Presentations: [http://www.owasp.org/index.php/8th_OWASP_IL_chapter_meeting Meeting program and presentations.]&lt;br /&gt;
&lt;br /&gt;
==== Italy ====&lt;br /&gt;
* How many participants: nearly 110 (160 subscriptions)&lt;br /&gt;
* How long did the event last: 4.5 hours&lt;br /&gt;
* Pictures: &lt;br /&gt;
* Presentations: [http://www.owasp.org/index.php/Italy#September_10th.2C_2007_-_OWASP_Day_WorldWide:_.22Privacy_in_the_21st_Century.22 here]&lt;br /&gt;
&lt;br /&gt;
==== Rochester ====&lt;br /&gt;
* How many participants: 11&lt;br /&gt;
* How long did the event last: 2 hours&lt;br /&gt;
* Presentation: 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
* Meeting Minutes:  [[Media:2007-09-10_Rochester_OWASP-Meeting-Minutes.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==== Ottawa ====&lt;br /&gt;
* How many participants: 10&lt;br /&gt;
* How long did the event last: 2.5 hours&lt;br /&gt;
* Presentation: What is Cardspace? By Christian Beauclair - Microsoft&lt;br /&gt;
&lt;br /&gt;
 [[Media:Windows_CardSpace_for_OWASP.zip|PowerPoint]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Week_September_2007&amp;diff=22295</id>
		<title>OWASP Week September 2007</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Week_September_2007&amp;diff=22295"/>
				<updated>2007-10-10T13:04:38Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: /* Mumbai */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page will contain the outcome of the multiple OWASP Chapter events that will occur during during the week 5th Sep -&amp;gt; 12 Sep (see [[OWASP Day]])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentations (links to) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Washington DC ====&lt;br /&gt;
&lt;br /&gt;
All presentations can be found at the link below. &lt;br /&gt;
&lt;br /&gt;
[[Washington_DC_LIVE-O]]&lt;br /&gt;
&lt;br /&gt;
==== Belgium ====&lt;br /&gt;
&lt;br /&gt;
===== Getting started with WebGoat &amp;amp; WebScarab (Erwin Geirnaert) =====&lt;br /&gt;
Download [[:Image:OWASPDay2007Belgium_WebGoat-WebScarab.ppt|presentation]].&lt;br /&gt;
&lt;br /&gt;
In this tutorial you will learn how to use WebScarab to solve the lessons in WebGoat.&lt;br /&gt;
&lt;br /&gt;
Following points will be explained:&lt;br /&gt;
* Configure WebScarab as a local proxy&lt;br /&gt;
* Intercepte HTTP requests and responses&lt;br /&gt;
* Modify HTTP requests to solve the lesson “Hidden field manipulation”&lt;br /&gt;
* Modify HTTP responses to solve the lesson “Bypass client-side Javascript validation”&lt;br /&gt;
* Use the session analysis tab in WebScarab&lt;br /&gt;
* Use the web services tab in WebScarab&lt;br /&gt;
* Use WebScarab to analyze Ajax XML messages&lt;br /&gt;
&lt;br /&gt;
'''!! Prerequisites:'''&lt;br /&gt;
* Bring your own laptop with you! &lt;br /&gt;
* Download [[OWASP_WebScarab_Project#Download|WebScarab]] onto your laptop&lt;br /&gt;
* Download [[OWASP_WebGoat_Project#Download|WebGoat]] onto your laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Erwin Geirnaert is CEO and co-founder of [http://www.zionsecurity.com ZION Security]. He is a renowned application security expert and has presented on various conferences like Javapolis, Eurostar, Owasp,… about web security. He is board member of OWASP Belux and actively involved in various OWASP projects like OWASP Java and OWASP WebGoat. Because of his technical experience he loves to do security testing, code review, reverse engineering,.. for Fortune 1000 companies in Europe. More information can be found on his LinkedIn profile: http://www.linkedin.com/in/erwingeirnaert.&lt;br /&gt;
&lt;br /&gt;
===== OWASP Evaluation and Certification Criteria Draft (Mark Curphey) =====&lt;br /&gt;
Download [[:Image:OWASP_Day_-_Belgium_-_Curphey.pdf|presentation]].&lt;br /&gt;
&lt;br /&gt;
As opposed to me continuing saying what’s wrong with PCI DSS, it seems to me that OWASP is a perfect forum to simply create and publish a “better criteria”. This can either be adopted and implemented by an organization like OWASP or considered to be incorporated into the PCI or other security standards. We won't get bogged down in the politics up-front, but hold something good up to the world for people to adopt. This project would of course draw on and bring together many of the other OWASP Projects including the Guide (What is a secure web app), Testing Guides (How to test for a secure web app), WebGoat (part of how to certify an individual understands and can find web app issues) etc. Many of those projects may not be complete or a perfect fit today, but this project can bring a common connecting theme to a lot of very valuable IP that OWASP has built over the years. I will also create it in such as way that a corporate could adopt/adapt it themseles as well as an industry. Where other OWASP projects are not complete or currently suitable I will build a requirements doc that can be considered by those teams if they feel appropriate. &lt;br /&gt;
&lt;br /&gt;
[http://securitybuddha.com/about/ Mark Curphey] ran Foundstone consulting from 2003 until late 2006 during which time the company was sold to McAfee.  Before joining Foundstone Mark was the Director of Information Security at Charles Schwab (responsible for the software security program) and has also worked for ISS and several financial services companies in Europe. Mark has a Masters degree in information security from Royal Holloway, University of London and was the original founder of the Open Web Application Security Project (OWASP).&lt;br /&gt;
&lt;br /&gt;
===== Automated Web FOO or FUD? (David Kierznowski) =====&lt;br /&gt;
Download [[:Image:OWASPDay2007-Belgium-dwk.ppt|presentation]].&lt;br /&gt;
&lt;br /&gt;
We take a look into automated web application testing technologies and their effectiveness against real life applications. &lt;br /&gt;
&lt;br /&gt;
Also, we look into one of GNUCITIZENs latest projects, The Technika Security Framework (TSF), which will enable users to automate security testing directly from their browser.&lt;br /&gt;
&lt;br /&gt;
[http://gnucitizen.org/about/dk David Kierznowski] currently works as a Senior Security Analyst for a leading penetration testing company in the UK. He has worked in the security industry for the past 6 years. David is also the founder of both [http://michaeldaw.org michaeldaw.org] and [http://blogsecurity.net blogsecurity.net] and is an active member of the [http://gnucitizen.org GNUCITIZEN] group.&lt;br /&gt;
&lt;br /&gt;
===== OWASP Pantera Unleashed (Simon Roses Femerling) =====&lt;br /&gt;
Download [[:Image:OWASPDay2007Belgium_Pantera_Unleash.ppt|presentation]].&lt;br /&gt;
&lt;br /&gt;
The presentation will provide a glimpse into what Pantera can offer when performing blackbox web assessments. In the age of Web 2.0 we need powerful tools that provide us rich and accurate information and allows us to manipulate that information into our advantage, that's what Pantera is all about. &lt;br /&gt;
&lt;br /&gt;
Simon Roses Femerling is a Security Technologist at the [http://blogs.msdn.com/ace_team/ ACE Team] at Microsoft. Former PwC and @Stake. He has many years of security experience where he has authored and cooperated in several security Open Source projects and advisories. Simon is natural from wonderful Mallorca Island in the Mediterranean Sea. He holds a postgraduate in E-Commerce from Harvard University and a B.S. from Suffolk University at Boston, Massachusetts.&lt;br /&gt;
&lt;br /&gt;
===== CLASP, SDL and Touchpoints Compared (Bart De Win) =====&lt;br /&gt;
Presentation pending paper publication.&lt;br /&gt;
&lt;br /&gt;
Over the years, specific methodologies and techniques for secure software &lt;br /&gt;
engineering have been proposed, yet dedicated processes have become available &lt;br /&gt;
only recently. In this presentation, the highlights of an activity-driven &lt;br /&gt;
comparison of three high-profile processes for the development of secure &lt;br /&gt;
software are presented.&lt;br /&gt;
&lt;br /&gt;
Bart De Win is a postdoctoral researcher in the research group DistriNet, Department of Computer Science at the Katholieke Universiteit Leuven. His research interests are in secure software engineering, including software development processes, aspect-oriented software development and model driven security.&lt;br /&gt;
&lt;br /&gt;
===== Threats of e-insecurity in Belgium and the Belgian response (Luc Beirens, FCCU) =====&lt;br /&gt;
Download [[:Image:OWASP_Day_Belgium_FCCU_e-insecurity.pdf|presentation]].&lt;br /&gt;
&lt;br /&gt;
The presentation will give a short overview of the actual threats on the e-society in Belgium.&lt;br /&gt;
How are public and private sector organized (or not) to tacle the different problems ?&lt;br /&gt;
What are the tasks of the police within this framework ?&lt;br /&gt;
&lt;br /&gt;
Since 1991, chief superintendent Luc Beirens is engaged in computer forensics and cyber crime investigations.  He is head of the Federal Computer Crime Unit of the Federal Police since 2001. Aside consulting his detectives in current cyber crime investigations, he is responsible for the reorganization, the equipment and the training of Belgian police services concerned with cyber crime investigations. As member of the European Working Party on Information Technology Crime (EWPITC) of Interpol since 1995 and the EUROPOL cyber crime expert group since 2001, he has cooperated in writing several documents concerning computer forensics and cyber crime investigations. He lectures in these fields at several police academies and universities.&lt;br /&gt;
His is involved in several organizations and platforms that are concerned with e-security, ICT forensics and cyber crime combating. Before his detective career, he has worked from 1987 till 1995 as analyst and project manager on the development of the Police Information System of the Belgian Gendarmerie.  He holds master degrees in criminology and information technology.&lt;br /&gt;
&lt;br /&gt;
===== For my next trick... hacking Web2.0 (pdp) =====&lt;br /&gt;
Download [[:Image:OWASP_Day_Belgium_2007-pdp.ppt|presentation]].&lt;br /&gt;
&lt;br /&gt;
Web2.0, if I can summarize it with a few simple words, is all about communication, distribution, information, agents, clients and servers. Those who understand the 2.0 fundamentals have the power to manipulate the global Web to suit their needs - hackers, the new digital breed of the 2.0 world. Web2.0 hacking is a mean for communicating and distributing critical information in a better way. It can be used to build ghost infrastructures from where to launch attacks - anonymously, no traces, nothing. Web2.0 hacking is also about the thin line between client-side and server-side security. It is about the endpoints and the electronic highways. It is about reaching the masses and yet being able to perform attacks on specific targets. Web2.0 hacking is also about distribution and influence, covert channels, bots, IA, ghosts inside the electronic frame. Web2.0 hacking is also a movement, a cyber subculture where individuals show their technical abilities, and understandings of the world and use that to manipulate their way through the system.&lt;br /&gt;
&lt;br /&gt;
Web2.0 hacking practices should never be related to AJAX and JavaScript exploitation techniques only. Although it is true that client-side security has a significant part of the Web2.0 ecosystem, it is important to realize its role. There are far too many other aspects that we need to look into. My aim is to cover these aspects and reveal the hidden dangers.&lt;br /&gt;
&lt;br /&gt;
[http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), is the founder and leading contributer of the [http://gnucitizen.org GNUCITIZEN] group. He is a senior IT security consultant based in London, UK. His day-to-day work involves identifying vulnerabilities, building attack strategies and creating attack tools and penetration testing infrastructures. Petko is known in the underground circles as pdp or architect but his name is well known in the IT security industry for his strong technical background and creative thinking. He has been working for some of the world's top companies, providing consultancy on the latest security vulnerabilities and attack technologies.&lt;br /&gt;
&lt;br /&gt;
==== San Antonio ====&lt;br /&gt;
&lt;br /&gt;
Here is the Bruce Jenkins presentation on Developing an Application Security Strategy for Large Enterprise Systems:&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Fortify-bjenkins-AppSecStrategy-20070906.pdf]&lt;br /&gt;
&lt;br /&gt;
==== Israel ====&lt;br /&gt;
&lt;br /&gt;
'''OWASP IL 8th meeting at the OWASP week''' - '''[http://www.owasp.org/index.php/8th_OWASP_IL_chapter_meeting Meeting program and presentations.]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Turkey ====&lt;br /&gt;
&lt;br /&gt;
'''Introduction'''&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/6/66/OWASP_DAY_TR.sub.ppt Turkish Subtitle] by Bedirhan Urgun (delete .ppt extension) for [http://www.owasp.org/downloads/OWASP_Day.wmv  Jeff Williams's OWASP Day Intro movie] &lt;br /&gt;
&lt;br /&gt;
''' Privacy in Governmental Insitutions - A Current State Analysis'''&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/b/bc/OWASP2007_KamudaPrivacy.ppt OWASP2007_KamudaPrivacy.ppt‎]&lt;br /&gt;
&lt;br /&gt;
Presentation discusses the understanding of the privacy concept settled in governmental institutions and deliberate on general information security problems related with privacy issues. Getting off with general privacy problems, in specific, information about the privacy issues related to web applications is given. Moreover, concrete suggestions on providing a solid privacy in these institutions are presented.&lt;br /&gt;
&lt;br /&gt;
Hayrettin BAHŞİ&lt;br /&gt;
Chief Researcher CC Lab-UEKAE TUBITAK&lt;br /&gt;
&lt;br /&gt;
''' Secure Web Application Development '''&lt;br /&gt;
* [https://www.owasp.org/images/4/4b/Guvenli_Web_Uygulamalarinin_Gelistirilmesi2.ppt Guvenli_Web_Uygulamalarinin_Gelistirilmesi.ppt] &lt;br /&gt;
&lt;br /&gt;
Presentation points out the vitality of security phases and touchpoints in SDLC, web applications' in specific. It goes over the principles, patterns, threat modeling as well as other important factors that comprise specification, development, testing phases of a secure application process. &lt;br /&gt;
&lt;br /&gt;
Korhan GÜRLER Chief Researcher PRO-G&lt;br /&gt;
&lt;br /&gt;
'''Discussion'''&lt;br /&gt;
&lt;br /&gt;
Answers to Panel questions can be found at [http://www.owasp.org/index.php/Turkey] under the title of Artifacts - OWASP DAY: on the topic of &amp;quot;Privacy in the 21st Century&amp;quot; - September 8 (Turkey 2007)&lt;br /&gt;
&lt;br /&gt;
==== Italy ====&lt;br /&gt;
All presentations can be found [http://www.owasp.org/index.php/Italy#September_10th.2C_2007_-_OWASP_Day_WorldWide:_.22Privacy_in_the_21st_Century.22 here]&lt;br /&gt;
&lt;br /&gt;
==== Rochester ====&lt;br /&gt;
&lt;br /&gt;
2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
Abstract: Web application security vulnerabilities remain by the far the most frequently reported vulnerability category. In spite of wide spread use, and very frequent vulnerabilities, most web applications are still not being securely developed and deployed. The presentation will demonstrate why experts estimate the percentage of vulnerable web application range from 75% to 99% and review the 2007 OWASP top 10 web applications security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==== Ottawa ====&lt;br /&gt;
&lt;br /&gt;
* Presentation: What is Cardspace? By Christian Beauclair - Microsoft&lt;br /&gt;
&lt;br /&gt;
The impact of phishing and other forms of online identity phraud has grown enormously in the last few years. Today, people are starting to curb their activities online due to fears of phishing and phraud and because they just can’t be bothered to fight through today’s online authentication systems such as multiple usernames and passwords, Captcha control and OTP tokens. In this session we’ll explore some of the core issues facing our identities online and then discuss how technologies such as Windows CardSpace enable users to authenticate and/or present personal information more easily and safely to sites that they know are legitimate.&lt;br /&gt;
&lt;br /&gt;
==== Seattle ====&lt;br /&gt;
All presentations can be found [https://www.owasp.org/index.php/Seattle#Last_Event_06_Sep_.28Thurs.29 here].&lt;br /&gt;
&lt;br /&gt;
==== Mumbai ====&lt;br /&gt;
* Welcome Keynote : Dharmesh Mehta, Mastek Ltd.[[https://www.owasp.org/images/a/ab/Keynote.pdf  Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
* Black Vector of Web Exploitation : Aditya Sood, Sec Niche [[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
* End User Privacy Breaches : Rishi Narang, ThirdBrigade [[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
* Privacy on the Web - The road ahead in the 21st century : Yogesh Badwe, Orange Business Services [[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
== Pictures (links to) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter event reports ==&lt;br /&gt;
&lt;br /&gt;
==== Belgium ====&lt;br /&gt;
* How many participants: 80+&lt;br /&gt;
* How long did the event last: 8 hours&lt;br /&gt;
* Pictures: (to upload)&lt;br /&gt;
* Presentations: on the chapter page&lt;br /&gt;
* Answers to Panel's questions: &lt;br /&gt;
&lt;br /&gt;
==== London ====&lt;br /&gt;
* How many participants: 15&lt;br /&gt;
* How long did the event last: 2 1/2 hours&lt;br /&gt;
* Pictures: (Ivan to upload)&lt;br /&gt;
* Presentations: (pdp to upload)&lt;br /&gt;
* Answers to Panel's questions: (Ivan to provide)&lt;br /&gt;
&lt;br /&gt;
====Washington DC ====&lt;br /&gt;
* How many participants: 50&lt;br /&gt;
* How long did the event last: 5 hours&lt;br /&gt;
* Pictures: none&lt;br /&gt;
* Presentations: Links above&lt;br /&gt;
* Answers to Panel's questions: No time for a panel&lt;br /&gt;
&lt;br /&gt;
==== Mumbai ====&lt;br /&gt;
* How many participants: 38&lt;br /&gt;
* How long did the event last: 3 hours&lt;br /&gt;
* Pictures: [http://www.owasp.org/images/5/50/OWASP_DAY.JPG VIEW HERE]&lt;br /&gt;
* Presentations: on the chapter page&lt;br /&gt;
&lt;br /&gt;
==== San Antonio ====&lt;br /&gt;
* How many participants: 25&lt;br /&gt;
* How long did the event last: 1 1/2 hours&lt;br /&gt;
* Presentation: Bruce Jenkins &amp;quot;Developing an Application Security Strategy for Large Enterprise Systems&amp;quot; [http://www.owasp.org/index.php/Image:Fortify-bjenkins-AppSecStrategy-20070906.pdf]&lt;br /&gt;
&lt;br /&gt;
==== Turkey ====&lt;br /&gt;
* How many participants: 10&lt;br /&gt;
* How long did the event last: 3.5 hours&lt;br /&gt;
* Pictures: (on Bunyamin)&lt;br /&gt;
* Presentations: (look above)&lt;br /&gt;
* Answers to Discussion questions: (look above)&lt;br /&gt;
&lt;br /&gt;
==== Israel ====&lt;br /&gt;
* How many participants: 60&lt;br /&gt;
* How long did the event last: 3 hours&lt;br /&gt;
* Pictures: We seems to have no geeks with 2M phone cameras (and the leader forgot his :-()&lt;br /&gt;
* Presentations: [http://www.owasp.org/index.php/8th_OWASP_IL_chapter_meeting Meeting program and presentations.]&lt;br /&gt;
&lt;br /&gt;
==== Italy ====&lt;br /&gt;
* How many participants: nearly 110 (160 subscriptions)&lt;br /&gt;
* How long did the event last: 4.5 hours&lt;br /&gt;
* Pictures: &lt;br /&gt;
* Presentations: [http://www.owasp.org/index.php/Italy#September_10th.2C_2007_-_OWASP_Day_WorldWide:_.22Privacy_in_the_21st_Century.22 here]&lt;br /&gt;
&lt;br /&gt;
==== Rochester ====&lt;br /&gt;
* How many participants: 11&lt;br /&gt;
* How long did the event last: 2 hours&lt;br /&gt;
* Presentation: 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
* Meeting Minutes:  [[Media:2007-09-10_Rochester_OWASP-Meeting-Minutes.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
==== Ottawa ====&lt;br /&gt;
* How many participants: 10&lt;br /&gt;
* How long did the event last: 2.5 hours&lt;br /&gt;
* Presentation: What is Cardspace? By Christian Beauclair - Microsoft&lt;br /&gt;
&lt;br /&gt;
 [[Media:Windows_CardSpace_for_OWASP.zip|PowerPoint]]&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=22294</id>
		<title>Mumbai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mumbai&amp;diff=22294"/>
				<updated>2007-10-10T13:02:26Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: /* Mumbai Celebrates OWASP Day : OWASP Live 0 : 6th Sep 2007 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] of  Mastek Ltd. &lt;br /&gt;
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}&lt;br /&gt;
&lt;br /&gt;
== Mumbai Celebrates OWASP Day : OWASP Live 0 : 6th Sep 2007==&lt;br /&gt;
''' Event Agenda '''&lt;br /&gt;
&lt;br /&gt;
'''2:30 PM - 3:00 PM'''  Welcome Keynote : Dharmesh Mehta, Mastek Ltd. [[https://www.owasp.org/images/a/ab/Keynote.pdf  Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
'''3:00 PM - 4:00 PM'''  Black Vector of Web Exploitation : Aditya Sood, Sec Niche&lt;br /&gt;
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
'''4:00 PM - 4:45 PM'''  End User Privacy Breaches : Rishi Narang, ThirdBrigade [[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
'''4:45 PM - 5:30 PM'''  Privacy on the Web - The road ahead in the 21st century : Yogesh Badwe, Orange Business Services [[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]&lt;br /&gt;
&lt;br /&gt;
'''5:30 PM - 6:00 PM'''  Snacks &amp;amp; Networking&lt;br /&gt;
 &lt;br /&gt;
''' Sponsor Details '''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.mastek.com MASTEK LIMITED]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/images/5/50/OWASP_DAY.JPG SNAPS]'''&lt;br /&gt;
&lt;br /&gt;
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==&lt;br /&gt;
&lt;br /&gt;
'''Topics presented till date:'''&lt;br /&gt;
&lt;br /&gt;
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek &lt;br /&gt;
&lt;br /&gt;
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks&lt;br /&gt;
&lt;br /&gt;
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra&lt;br /&gt;
&lt;br /&gt;
[http://owasp.mumbai.googlepages.com/ Download Presentations here &amp;gt;&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
== Roster of OWASP Speakers with Profiles ==&lt;br /&gt;
&lt;br /&gt;
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.&lt;br /&gt;
&lt;br /&gt;
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]&lt;br /&gt;
&lt;br /&gt;
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]&lt;br /&gt;
&lt;br /&gt;
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.&lt;br /&gt;
&lt;br /&gt;
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.&lt;br /&gt;
&lt;br /&gt;
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.&lt;br /&gt;
&lt;br /&gt;
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Minutes of Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''&lt;br /&gt;
&lt;br /&gt;
The second OWASP Mumbai Chapter Meet was held at TechMahindra premises in Chandivali. Mr. Richard on behalf of TechMahindra gave a warm welcome to all the delegates to the OWASP Mumbai Local Chapter –II. Accompanying him, Mr. Dharmesh of Mastek Ltd – Mumbai Chapter Head gave a brief description about the goals of OWASP Mumbai Chapter and the road ahead.&lt;br /&gt;
&lt;br /&gt;
Presentations:&lt;br /&gt;
&lt;br /&gt;
1. ''Significance of Random Numbers in Application Security'': '''Richard Lewis''', e-Security Consultant with Tech Mahindra, started with the practical usage of random numbers. He explained how good random number generation prevents applications from malfunctioning, increases strength of cryptographic operations which in turn increases entropy associated with the key. He went on to explain how random numbers automate otherwise manual tasks and how it increases the security of application. He explained the concepts of entropy and to which level it should be reached in an application. In the end he talked about the various sources of random numbers. He showed developers the simple mathematics required to calculate minimum password lengths, given the security requirements.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/1/13/RichardLewis_RandomNumberSignificance.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
2. ''Java Decompilation'': '''Girish Kulkarni''', e-Security Consultant with Tech Mahindra went through Java Decompilation utility and techniques to defeat decompilation. Use of obfuscators, byte code encryptor/decryptor and generating executable from source were some of the techniques that he explained.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/3/3e/Girish_LockingDownJavaByteCode.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
3. ''/GS Security Check in Visual Studio'': '''Chanda Dutta''', '''Divya Makhija''', '''Sugita Kumari''', '''Upma Sharma''' from Tech Mahindra, presented the usage of /GS security check in Visual Studio. Chanda started the presentation by giving an introduction to /GS Security Check feature of Visual Studio. She explained what is /GS Buffer Security Check, the need of /GS and what it can prevent. Sugita further explained how /GS works and what is canary with process of how to using a canary can prevent buffer overrun. Upma then demonstrated a simulation explaining normal working of buffer overflow and how can it be prevented. Divya explained the various limitations of /GS as how the features of /GS can be exploited and summarized the /GS Buffer Security Check features and functionalities. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/a/ad/GS_Switch_in_Visual_Studio.ppt Download Presentation]&lt;br /&gt;
&lt;br /&gt;
The attendees will be receiving the pdf document of attendance noted at the meeting.&lt;br /&gt;
&lt;br /&gt;
 '''Next Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''&lt;br /&gt;
&lt;br /&gt;
Registrations for the event are free. If you are willing to attend, just send a mail to dharmeshmm@owasp.org as a confirmation. &lt;br /&gt;
&lt;br /&gt;
If you would like to speak at the event or sponsor, contact me ASAP. &lt;br /&gt;
&lt;br /&gt;
Theme of Meeting: Securing Web Services&lt;br /&gt;
&lt;br /&gt;
The meeting is scheduled on Monday, 31st July 2006 from 3:00 to 5:00 PM. &lt;br /&gt;
&lt;br /&gt;
'''Venue and Sponsor Details:'''&lt;br /&gt;
&lt;br /&gt;
[http://www.techmahindra.com Tech Mahindra Ltd.].&lt;br /&gt;
&lt;br /&gt;
Tech Mahindra Limited.&lt;br /&gt;
Wing 1, Oberoi Estate Gardens,&lt;br /&gt;
Chandivali, Andheri (E),&lt;br /&gt;
Mumbai 400 072, Maharashtra, India.&lt;br /&gt;
&lt;br /&gt;
If you would like to speak, please drop in a mail at dharmeshmm@owasp.org&lt;br /&gt;
&lt;br /&gt;
 '''CPE Credits for CISSP's '''&lt;br /&gt;
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.&lt;br /&gt;
&lt;br /&gt;
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Minutes of Meeting - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''&lt;br /&gt;
&lt;br /&gt;
With the welcome address by Anuradha, the first meeting of Mumbai Chapter embarked. Right from giving a brief introduction about OWASP and its aim, Anuradha explained the focus of OWASP as a voluntary organization aiming at contributing to the knowledge as a part of sharing it. Apart from it, Anuradha briefed about OWASP Top 10 Project and OWASP Guide to building Secure Application.&lt;br /&gt;
&lt;br /&gt;
Richard presented on Secure Coding Fundamentals and elucidated the Cost factor inculcated due to insecure code resulting in Network Cost, Productivity Cost and so on. Further explaining the basic reasons of threat to code, he explained how the mistakes done by the Programmers, I/O, API Abuse, Environment &amp;amp; Configuration and Time &amp;amp; State were responsible for Security flaws in an application. Moving ahead, Richard laid down a few principles to be followed as Secure Coding – General Guidelines for all the languages and specific Secure Coding Guidelines for C &amp;amp; C++, Java and .NET&lt;br /&gt;
&lt;br /&gt;
Richard's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/28/RichardLewis_SecureCodingFundamentals.ppt Download]&lt;br /&gt;
&lt;br /&gt;
With Threat Analysis &amp;amp; Modeling Process, Dharmesh explained the steps followed as Threat Modeling Process starting from Defining Application Requirement, Application Architecture, and Modeling Threats looking at CIA feature of Security Basics. The aim covered to look towards gathering the information needed from application development teams in order to mock out the potential threats that are inherit in the software application they build starting from the very inception of the software birth. &lt;br /&gt;
Giving the demonstration of Threat Analysis and Modeling Tool v2.0 with the basic example of its functionality, Dharmesh presented the Threat Modeling in real scenario. &lt;br /&gt;
&lt;br /&gt;
Dharmesh's Presentation&lt;br /&gt;
[http://www.owasp.org/images/6/6c/Dharmesh_Threat_Modeling.ppt Download]&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa explained how password can be lost or manipulated in a real life scenario and it dealt with the countermeasures to be taken to avoid it. The topics covered under it included Stealing Password using different methods as – Browser’s Refresh, Browser’s Memory, Remember feature, Forget Password feature and last but not the least SQL Injection. The role of Browser’s Viewing Tool available showed a clear picture of how password could be easily cracked.&lt;br /&gt;
&lt;br /&gt;
Shalini and Runa's Presentation&lt;br /&gt;
[http://www.owasp.org/images/2/21/5_ways_to_lose_your_user%27s_password.ppt Download]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
 '''Mumbai Chapter - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our regular chapter meetings.&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 9:30 AM - 12:00 PM&lt;br /&gt;
&lt;br /&gt;
If you have any items you want added to the agenda, post your ideas to our [https://lists.sourceforge.net/lists/listinfo/owasp-mumbai/ mailing list.] &lt;br /&gt;
&lt;br /&gt;
If you would like to speak at the event or sponsor, contact [mailto:dharmeshmm@gmail.com Dharmesh M Mehta] before 20th June.&lt;br /&gt;
&lt;br /&gt;
'''Agenda'''&lt;br /&gt;
----&lt;br /&gt;
'''''1.      09:30 - 09:45 Introduction : Anuradha Srinivasan, Mastek'''&lt;br /&gt;
&lt;br /&gt;
'''''2.      09:45 - 10:30 Secure Coding Fundamentals : Richard Lewis, Tech Mahindra'''''&lt;br /&gt;
&lt;br /&gt;
10:30 - 11:00 Food and Beverages&lt;br /&gt;
&lt;br /&gt;
'''''3.      11:00 - 11:30 Threat Modeling : Dharmesh M Mehta, Mastek '''''&lt;br /&gt;
&lt;br /&gt;
'''''4.      11:30 - 12:00 5 ways to lose your user's password : Shalini Gupta and Runa Dwibedi, Paladion Networks  '''''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Venue and Sponsor Details:'''&lt;br /&gt;
&lt;br /&gt;
[http://www.mastek.com Mastek Ltd].&lt;br /&gt;
&lt;br /&gt;
Mastek Millennium Center,&lt;br /&gt;
A-7 Sec-I Millennium Business Park,&lt;br /&gt;
&lt;br /&gt;
Mahape, Navi Mumbai - 400 710.&lt;br /&gt;
&lt;br /&gt;
''Please contact [mailto:dharmeshmm@gmail.com Dharmesh M Mehta] before 23th June if you are attending the meeting.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:23, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
OWASP is pleased to announce the arrival of OWASP 2.0!&lt;br /&gt;
&lt;br /&gt;
OWASP 2.0 utilizes the MediaWiki portal to manage and provide&lt;br /&gt;
the latest OWASP related information. Enjoy!&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_DAY.JPG&amp;diff=22293</id>
		<title>File:OWASP DAY.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_DAY.JPG&amp;diff=22293"/>
				<updated>2007-10-10T13:00:22Z</updated>
		
		<summary type="html">&lt;p&gt;Dharmeshmm: OWASP MUMBAI - 2007 OWASP DAY CELEBRATION SNAPS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP MUMBAI - 2007 OWASP DAY CELEBRATION SNAPS&lt;/div&gt;</summary>
		<author><name>Dharmeshmm</name></author>	</entry>

	</feed>