<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=EoinKeary</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=EoinKeary"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/EoinKeary"/>
		<updated>2026-04-17T15:55:36Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:EoinKeary&amp;diff=241396</id>
		<title>User:EoinKeary</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:EoinKeary&amp;diff=241396"/>
				<updated>2018-06-19T09:25:29Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Has been with OWASP for a number of years now, since 2004/5&amp;lt;br&amp;gt;[[About The Open Web Application Security Project|OWASP Global Board]] : Eoin was on the Global Board of OWASP from 2009 to  2015 and vice chair in 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Lead for the OWASP Code review guide. &amp;lt;br&amp;gt;Lead for The OWASP Testing guide V2.0 (2007)'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP CISO Survey Originator'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland board member 2004 - 2009''' &lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland and EU Event Chair 2007-2009'''&amp;lt;br&amp;gt;You can get in touch with me on &amp;quot;eoin.keary at Owasp dot org&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Director &amp;amp; Founder of [https://www.edgescan.com edgescan.com] &amp;lt;br&amp;gt;[[About The Open Web Application Security Project|Member of the OWASP Global Board]] 2009-2015&lt;br /&gt;
&lt;br /&gt;
=About = &lt;br /&gt;
OWASP board member since 2009. &lt;br /&gt;
Elected to position of global Vice Chair, September 2011.&lt;br /&gt;
&lt;br /&gt;
A long time member of OWASP. Based in Dublin and director of [http://www.bccriskadvisory.com BCC Risk Advisory Ltd.]&lt;br /&gt;
&lt;br /&gt;
LinkedIn profile [http://www.linkedin.com/in/eoinkeary click here] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Eoin Keary has been with OWASP since 2004. He is based in Ireland and runs a software security practice, bccriskadvisory.com.&lt;br /&gt;
&lt;br /&gt;
He is currently on the global board of the OWASP foundation, he was elected to the board in 2009.&lt;br /&gt;
During this time Eoin assisted in founding the OWASP legal entity in Europe and has helped provide structure to OWASPs finances and strategy.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Eoin currently leads the reboot project which aims to improve current OWASP projects and start new ones. &lt;br /&gt;
&lt;br /&gt;
Eoin believes the projects OWASP delivers are a key aspect of the foundation and also very important in helping both developers and security professionals in building more secure software.&lt;br /&gt;
&lt;br /&gt;
Eoin previously lead the OWASP Testing Guide and  currently the OWASP Code Review Guide and also contributed to other OWASP projects such as &lt;br /&gt;
OWASP SAMM, &lt;br /&gt;
OWASP CISO Guide &amp;amp; &lt;br /&gt;
CISO Survey, &lt;br /&gt;
OWASP Cheat sheets, and the &lt;br /&gt;
OWASP ASVS &amp;amp; ZAP as a reviewer.&lt;br /&gt;
&lt;br /&gt;
Eoin also founded the OWASP Dublin chapter in 2006 and the OWASP Ireland event in 2008 which is in its 4th year and also hosted OWASP EU in 2011.&lt;br /&gt;
&lt;br /&gt;
Eoin believes OWASP needs to focus more on outreach to the software development community and also involve itself more with the industries which rely on software to achieve business and social goals by assisting organisations, CISO's and security communities in writing and defending software infrastructure.&lt;br /&gt;
&lt;br /&gt;
To this end,  Eoin frequently delivers free technical and executive awareness workshops to help organisations achieve their goals in a secure manner.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''My involvement in OWASP to date.............'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland Chapter leader and founder since 2004'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Have held regular meetings, promoted OWASP and application security in general.&amp;lt;br&amp;gt;I have developed a stong community within Ireland in terms of secure development such that large organisations are aware of OWASP and invite me for comment and involvement in application security awareness efforts. I am involved in ongoing efforts to consolidate the security community with groups such as IISF, IAI and ISSA.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Testing guide leader (2005-2007)'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Handed over from Daniel Cuthbert in 2005.&amp;lt;br&amp;gt;Lead the testing guide effort, transferred it to wiki from word document in 2006.&amp;lt;br&amp;gt;Wrote significant portions of the guide.&amp;lt;br&amp;gt;Handed guide to Matteo Meucci in 2007&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Code review guide (V1.1) leader - &amp;quot;Worlds first open source code review guide&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lead and founder of guide.&amp;lt;br&amp;gt;Authored 70% of currrent code review guide.&amp;lt;br&amp;gt;Considered the most comprehensive code review guide on the web.&amp;lt;br&amp;gt;Ongoing project currently at V1.1&amp;lt;br&amp;gt;Tools such as OWASP code crawler are inspired by the guide.&amp;lt;br&amp;gt;Used by US Gov agencies, Insustry Security standards etc.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP ASVS Reviewer'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Reviewed and supplied suggestions for most recent release of ASVS.&amp;lt;br&amp;gt;Presented viability of ASVS to industry leads in terms of integration of standard into strategic direction.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP SAMM Contributor'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Along with team members, suggested rewrite of SAMM questionaire based on experience of using in the field.&amp;lt;br&amp;gt;With the aim of overall maturity of the SAMM document and process.&amp;lt;br&amp;gt;I have fostered the SAMM approach into a number of large european organisations.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland 2009,2010,OWASP EU 2011'''&amp;lt;br&amp;gt;Organiser of successful event which has made a large impact on local application security community.&amp;lt;br&amp;gt;Event covered costs and was within budget.&amp;lt;br&amp;gt;Achieved media coverage with many local and business &amp;quot;broad sheet&amp;quot; newspapaers.&amp;lt;br&amp;gt;Managed to gather an impressive panel of speakers for such a modest event. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Cheat Sheet Author and reviewer -2011/2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''OWASP Workshop Trainer - 2010/2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''OWASP Reboot project leader 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:EoinKeary&amp;diff=241395</id>
		<title>User:EoinKeary</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:EoinKeary&amp;diff=241395"/>
				<updated>2018-06-19T08:49:48Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Has been with OWASP for a number of years now, since 2004/5&amp;lt;br&amp;gt;[[About The Open Web Application Security Project|OWASP Global Board]] : Eoin was on the Global Board of OWASP from 2009 to  2015 and vice chair in 2011&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Lead for the OWASP Code review guide. &amp;lt;br&amp;gt;Lead for The OWASP Testing guide V2.0 (2007)'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP CISO Survey Originator'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland board member 2004 - 2009''' &lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland and EU Event Chair 2007-2009'''&amp;lt;br&amp;gt;You can get in touch with me on &amp;quot;eoin.keary at Owasp dot org&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Director &amp;amp; Founder of [[Www.edgescan.com|edgescan.com]]&amp;lt;br&amp;gt;[[About The Open Web Application Security Project|Member of the OWASP Global Board]] 2009-2015&lt;br /&gt;
&lt;br /&gt;
=About = &lt;br /&gt;
OWASP board member since 2009. &lt;br /&gt;
Elected to position of global Vice Chair, September 2011.&lt;br /&gt;
&lt;br /&gt;
A long time member of OWASP. Based in Dublin and director of [http://www.bccriskadvisory.com BCC Risk Advisory Ltd.]&lt;br /&gt;
&lt;br /&gt;
LinkedIn profile [http://www.linkedin.com/in/eoinkeary click here] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Eoin Keary has been with OWASP since 2004. He is based in Ireland and runs a software security practice, bccriskadvisory.com.&lt;br /&gt;
&lt;br /&gt;
He is currently on the global board of the OWASP foundation, he was elected to the board in 2009.&lt;br /&gt;
During this time Eoin assisted in founding the OWASP legal entity in Europe and has helped provide structure to OWASPs finances and strategy.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Eoin currently leads the reboot project which aims to improve current OWASP projects and start new ones. &lt;br /&gt;
&lt;br /&gt;
Eoin believes the projects OWASP delivers are a key aspect of the foundation and also very important in helping both developers and security professionals in building more secure software.&lt;br /&gt;
&lt;br /&gt;
Eoin previously lead the OWASP Testing Guide and  currently the OWASP Code Review Guide and also contributed to other OWASP projects such as &lt;br /&gt;
OWASP SAMM, &lt;br /&gt;
OWASP CISO Guide &amp;amp; &lt;br /&gt;
CISO Survey, &lt;br /&gt;
OWASP Cheat sheets, and the &lt;br /&gt;
OWASP ASVS &amp;amp; ZAP as a reviewer.&lt;br /&gt;
&lt;br /&gt;
Eoin also founded the OWASP Dublin chapter in 2006 and the OWASP Ireland event in 2008 which is in its 4th year and also hosted OWASP EU in 2011.&lt;br /&gt;
&lt;br /&gt;
Eoin believes OWASP needs to focus more on outreach to the software development community and also involve itself more with the industries which rely on software to achieve business and social goals by assisting organisations, CISO's and security communities in writing and defending software infrastructure.&lt;br /&gt;
&lt;br /&gt;
To this end,  Eoin frequently delivers free technical and executive awareness workshops to help organisations achieve their goals in a secure manner.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''My involvement in OWASP to date.............'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland Chapter leader and founder since 2004'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Have held regular meetings, promoted OWASP and application security in general.&amp;lt;br&amp;gt;I have developed a stong community within Ireland in terms of secure development such that large organisations are aware of OWASP and invite me for comment and involvement in application security awareness efforts. I am involved in ongoing efforts to consolidate the security community with groups such as IISF, IAI and ISSA.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Testing guide leader (2005-2007)'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Handed over from Daniel Cuthbert in 2005.&amp;lt;br&amp;gt;Lead the testing guide effort, transferred it to wiki from word document in 2006.&amp;lt;br&amp;gt;Wrote significant portions of the guide.&amp;lt;br&amp;gt;Handed guide to Matteo Meucci in 2007&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Code review guide (V1.1) leader - &amp;quot;Worlds first open source code review guide&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lead and founder of guide.&amp;lt;br&amp;gt;Authored 70% of currrent code review guide.&amp;lt;br&amp;gt;Considered the most comprehensive code review guide on the web.&amp;lt;br&amp;gt;Ongoing project currently at V1.1&amp;lt;br&amp;gt;Tools such as OWASP code crawler are inspired by the guide.&amp;lt;br&amp;gt;Used by US Gov agencies, Insustry Security standards etc.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP ASVS Reviewer'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Reviewed and supplied suggestions for most recent release of ASVS.&amp;lt;br&amp;gt;Presented viability of ASVS to industry leads in terms of integration of standard into strategic direction.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP SAMM Contributor'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Along with team members, suggested rewrite of SAMM questionaire based on experience of using in the field.&amp;lt;br&amp;gt;With the aim of overall maturity of the SAMM document and process.&amp;lt;br&amp;gt;I have fostered the SAMM approach into a number of large european organisations.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland 2009,2010,OWASP EU 2011'''&amp;lt;br&amp;gt;Organiser of successful event which has made a large impact on local application security community.&amp;lt;br&amp;gt;Event covered costs and was within budget.&amp;lt;br&amp;gt;Achieved media coverage with many local and business &amp;quot;broad sheet&amp;quot; newspapaers.&amp;lt;br&amp;gt;Managed to gather an impressive panel of speakers for such a modest event. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Cheat Sheet Author and reviewer -2011/2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''OWASP Workshop Trainer - 2010/2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''OWASP Reboot project leader 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Eoin_Keary&amp;diff=237022</id>
		<title>Eoin Keary</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Eoin_Keary&amp;diff=237022"/>
				<updated>2018-01-24T09:50:18Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[OWASP Board History|OWASP board member]] since 2009. &lt;br /&gt;
Elected to position of global Vice Chair, September 2011.&lt;br /&gt;
&lt;br /&gt;
OWASP Board tenure from 2009 to 2015&lt;br /&gt;
&lt;br /&gt;
A long time member of OWASP, Based in Dublin Ireland and CEO/Founder of [http://www.bccriskadvisory.com BCC Risk Advisory Ltd.] and [https://www.edgescan.com edgescan]&lt;br /&gt;
&lt;br /&gt;
LinkedIn profile [http://www.linkedin.com/in/eoinkeary click here] &lt;br /&gt;
[https://www.edgescan.com edgescan]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Eoin Keary has been with OWASP since 2004. He is based in Ireland and runs a software security practice, bccriskadvisory.com and [https://www.edgescan.com edgescan.com]&lt;br /&gt;
&lt;br /&gt;
He was on the Global Board of the OWASP foundation from 2009 to 2015. He was the first democratically elected to the board member in 2009.&lt;br /&gt;
During this time Eoin assisted in founding the OWASP legal entity in Europe and has helped provide structure to OWASPs finances and strategy.&lt;br /&gt;
&lt;br /&gt;
Eoin believes the projects OWASP delivers are a key aspect of the foundation and also very important in helping both developers and security professionals in building more secure software.&lt;br /&gt;
&lt;br /&gt;
Eoin previously lead the [[OWASP Testing Project|OWASP Testing Guide]] and  currently the [[OWASP Code Review Guide Table of Contents|OWASP Code Review Guide]] and also contributed to other OWASP projects such as &lt;br /&gt;
[[OWASP SAMM Project|OWASP SAMM]], &lt;br /&gt;
[[OWASP CISO Guide]] &amp;amp; &lt;br /&gt;
CISO Survey, &lt;br /&gt;
[[OWASP Cheat sheets]], and the &lt;br /&gt;
[[OWASP ASVS Assessment tool|OWASP ASVS]] &amp;amp; [[OWASP Zed Attack Proxy Project|ZAP]] as a reviewer.&lt;br /&gt;
&lt;br /&gt;
Eoin also founded the [[OWASP Ireland AppSec 2009 Conference|OWASP Ireland]] chapter in 2006 and the OWASP Ireland event in 2008 which is in its 4th year and also hosted [[OWASP EU]] in 2011.&lt;br /&gt;
&lt;br /&gt;
Eoin believes OWASP needs to focus more on outreach to the software development community and also involve itself more with the industries which rely on software to achieve business and social goals by assisting organisations, CISO's and security communities in writing and defending software infrastructure.&lt;br /&gt;
&lt;br /&gt;
To this end,  Eoin frequently delivers free technical and executive awareness workshops to help organisations achieve their goals in a secure manner.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''My involvement in OWASP to date.............'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland Chapter leader and founder since 2004'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Have held regular meetings, promoted OWASP and application security in general.&amp;lt;br&amp;gt;I have developed a stong community within Ireland in terms of secure development such that large organisations are aware of OWASP and invite me for comment and involvement in application security awareness efforts. I am involved in ongoing efforts to consolidate the security community with groups such as IISF, IAI and ISSA.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Testing guide leader (2005-2007)'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Handed over from Daniel Cuthbert in 2005.&amp;lt;br&amp;gt;Lead the testing guide effort, transferred it to wiki from word document in 2006.&amp;lt;br&amp;gt;Wrote significant portions of the guide.&amp;lt;br&amp;gt;Handed guide to Matteo Meucci in 2007&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Code review guide (V1.1) leader - &amp;quot;Worlds first open source code review guide&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lead and founder of guide.&amp;lt;br&amp;gt;Authored 70% of currrent code review guide.&amp;lt;br&amp;gt;Considered the most comprehensive code review guide on the web.&amp;lt;br&amp;gt;Ongoing project currently at V1.1&amp;lt;br&amp;gt;Tools such as OWASP code crawler are inspired by the guide.&amp;lt;br&amp;gt;Used by US Gov agencies, Insustry Security standards etc.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP ASVS Reviewer'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Reviewed and supplied suggestions for most recent release of ASVS.&amp;lt;br&amp;gt;Presented viability of ASVS to industry leads in terms of integration of standard into strategic direction.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP SAMM Contributor'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Along with team members, suggested rewrite of SAMM questionaire based on experience of using in the field.&amp;lt;br&amp;gt;With the aim of overall maturity of the SAMM document and process.&amp;lt;br&amp;gt;I have fostered the SAMM approach into a number of large european organisations.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland 2009,2010,OWASP EU 2011'''&amp;lt;br&amp;gt;Organiser of successful event which has made a large impact on local application security community.&amp;lt;br&amp;gt;Event covered costs and was within budget.&amp;lt;br&amp;gt;Achieved media coverage with many local and business &amp;quot;broad sheet&amp;quot; newspapaers.&amp;lt;br&amp;gt;Managed to gather an impressive panel of speakers for such a modest event. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Cheat Sheet Author and reviewer -2011/2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''OWASP Workshop Trainer - 2010/2015'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''OWASP Reboot project leader 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Vulnerability_Scanning_Tools&amp;diff=235158</id>
		<title>Category:Vulnerability Scanning Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Vulnerability_Scanning_Tools&amp;diff=235158"/>
				<updated>2017-11-07T13:38:51Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: added digifort upon request&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description  ==&lt;br /&gt;
&lt;br /&gt;
Web Application Vulnerability Scanners are automated tools that scan web applications, normally from the outside, to look for security vulnerabilities such as [[Cross-site scripting]], [[SQL Injection]], [[Command Injection]], [[Path Traversal]] and insecure server configuration. This category of tools is frequently referred to as [https://www.techopedia.com/definition/30958/dynamic-application-security-testing-dast Dynamic Application Security Testing] (DAST) Tools. A large number of both commercial and open source tools of this type are available and all of these tools have their own strengths and weaknesses.  If you are interested in the effectiveness of DAST tools, check out the OWASP [[Benchmark]] project, which is scientifically measuring the effectiveness of all types of vulnerability detection tools, including DAST.&lt;br /&gt;
&lt;br /&gt;
Here we provide a list of vulnerability scanning tools currently available in the market.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Disclaimer:''' The tools listing in the table below are presented in an alphabetical order. &amp;lt;b&amp;gt;OWASP does not endorse any of the Vendors or Scanning Tools by listing them in the table below. We have made every effort to provide this information as accurately as possible. If you are the vendor of a tool below and think this information is incomplete or incorrect, please send an e-mail to our [mailto:owasp_ha_vulnerability_scanner_project@lists.owasp.org mailing list] and we will make every effort to correct this information.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.acunetix.com/ Acunetix WVS] || tool_owner = Acunetix || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.edgescan.com/ edgescan] || tool_owner = edgescan|| tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www-03.ibm.com/software/products/en/appscan-standard AppScan] || tool_owner = IBM || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.trustwave.com/Products/Application-Security/App-Scanner-Family/App-Scanner-Enterprise/ App Scanner] || tool_owner = Trustwave || tool_licence = Commercial || tool_platforms = Windows }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.rapid7.com/products/appspider/ AppSpider] || tool_owner = Rapid7 || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.scanmyserver.com/ AVDS] || tool_owner = Beyond Security || tool_licence = Commercial / Free (Limited Capability)|| tool_platforms = SaaS }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blueclosure.com BlueClosure BC Detect] || tool_owner = BlueClosure || tool_licence = Commercial, 2 weeks trial || tool_platforms = Most platforms supported}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.portswigger.net/ Burp Suite] || tool_owner = PortSwiger || tool_licence = Commercial / Free (Limited Capability)|| tool_platforms = Most platforms supported }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://contrastsecurity.com Contrast] || tool_owner = Contrast Security || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = SaaS or On-Premises }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://detectify.com/ Detectify] || tool_owner = Detectify || tool_licence = Commercial || tool_platforms = SaaS }}&lt;br /&gt;
&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.digifort.se/en/scanner Digifort- Inspect] || tool_owner = Digifort|| tool_licence = Commercial || tool_platforms = SaaS }}&lt;br /&gt;
&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.gamasec.com/Gamascan.aspx GamaScan] || tool_owner = GamaSec || tool_licence = Commercial || tool_platforms = Windows }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://rgaucher.info/beta/grabber/ Grabber] || tool_owner = Romain Gaucher || tool_licence = Open Source || tool_platforms = Python 2.4, BeautifulSoup and PyXML}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://sourceforge.net/p/grendel/code/ci/c59780bfd41bdf34cc13b27bc3ce694fd3cb7456/tree/ Grendel-Scan] || tool_owner = David Byrne || tool_licence = Open Source || tool_platforms = Windows, Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.golismero.com GoLismero] || tool_owner = GoLismero Team || tool_licence = GPLv2.0 || tool_platforms = Windows, Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.ikare-monitoring.com/ IKare] || tool_owner = ITrust || tool_licence = Commercial || tool_platforms = N/A }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.indusface.com/index.php/products/web-application-scanning Indusface Web Application Scanning] || tool_owner = Indusface || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.nstalker.com/ N-Stealth] || tool_owner = N-Stalker || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.mavitunasecurity.com/ Netsparker] || tool_owner = MavitunaSecurity || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.rapid7.com/products/nexpose-community-edition.jsp Nexpose] || tool_owner = Rapid7 || tool_licence = Commercial / Free (Limited Capability)|| tool_platforms = Windows/Linux}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.cirt.net/nikto2 Nikto] || tool_owner = CIRT || tool_licence = Open Source|| tool_platforms = Unix/Linux}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.milescan.com/ ParosPro] || tool_owner = MileSCAN || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.websecurify.com/desktop/proxy.html Proxy.app] || tool_owner = Websecurify || tool_licence = Commercial || tool_platforms = Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.qualys.com/products/qg_suite/was/ QualysGuard] || tool_owner = Qualys || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.beyondtrust.com/Products/RetinaNetworkSecurityScanner/ Retina] || tool_owner = BeyondTrust || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.orvant.com Securus] || tool_owner = Orvant, Inc || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.whitehatsec.com/home/services/services.html Sentinel] || tool_owner = WhiteHat Security || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.parasoft.com/products/article.jsp?articleId=3169&amp;amp;redname=webtesting&amp;amp;referred=webtesting SOATest] || tool_owner = Parasoft || tool_licence = Commercial || tool_platforms = Windows / Linux / Solaris}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.tinfoilsecurity.com Tinfoil Security] || tool_owner = Tinfoil Security, Inc. || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = SaaS or On-Premises}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.trustwave.com/external-vulnerability-scanning.php Trustkeeper Scanner] || tool_owner = Trustwave SpiderLabs || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://subgraph.com/vega/ Vega] || tool_owner = Subgraph || tool_licence = Open Source || tool_platforms = Windows, Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://wapiti.sourceforge.net/ Wapiti] || tool_owner = Informática Gesfor || tool_licence = Open Source || tool_platforms = Windows, Unix/Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.tripwire.com/it-security-software/enterprise-vulnerability-management/web-application-vulnerability-scanning/ WebApp360] || tool_owner = TripWire || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://webcookies.org WebCookies] || tool_owner = WebCookies || tool_licence = Free|| tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www8.hp.com/us/en/software-solutions/software.html?compURI=1341991#.Uuf0KBAo4iw WebInspect] || tool_owner = HP || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.websecurify.com/desktop/webreaver.html WebReaver] || tool_owner = Websecurify || tool_licence = Commercial || tool_platforms = Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.german-websecurity.com/en/products/webscanservice/product-details/overview/ WebScanService] || tool_owner = German Web Security || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://suite.websecurify.com/ Websecurify Suite] || tool_owner = Websecurify || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = Windows, Linux, Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.sensepost.com/research/wikto/ Wikto] || tool_owner = Sensepost || tool_licence = Open Source || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.w3af.org/ w3af] || tool_owner = w3af.org || tool_licence = GPLv2.0 || tool_platforms = Linux and Mac}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.owasp.org/index.php/OWASP_Xenotix_XSS_Exploit_Framework Xenotix XSS Exploit Framework] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project Zed Attack Proxy] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Windows, Unix/Linux and Macintosh}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*[[Source_Code_Analysis_Tools | SAST Tools]] - Similar Information on Static Application Security Testing (SAST) Tools&lt;br /&gt;
*http://projects.webappsec.org/Web-Application-Security-Scanner-Evaluation-Criteria&lt;br /&gt;
*http://www.slideshare.net/lbsuto/accuracy-and-timecostsofwebappscanners&lt;br /&gt;
*http://samate.nist.gov/index.php/Web_Application_Vulnerability_Scanners.html&lt;br /&gt;
*http://www.tssci-security.com/archives/2007/11/24/2007-security-testing-tools-in-review/&lt;br /&gt;
*http://www.softwareqatest.com/qatweb1.html#SECURITY&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Eoin_Keary&amp;diff=235089</id>
		<title>Eoin Keary</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Eoin_Keary&amp;diff=235089"/>
				<updated>2017-11-06T10:28:57Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[OWASP Board History|OWASP board member]] since 2009. &lt;br /&gt;
Elected to position of global Vice Chair, September 2011.&lt;br /&gt;
&lt;br /&gt;
OWASP Board tenure from 2009 to 2015&lt;br /&gt;
&lt;br /&gt;
A long time member of OWASP, Based in Dublin Ireland and CEO/Founder of [http://www.bccriskadvisory.com BCC Risk Advisory Ltd.] and [https://www.edgescan.com edgescan]&lt;br /&gt;
&lt;br /&gt;
LinkedIn profile [http://www.linkedin.com/in/eoinkeary click here] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Eoin Keary has been with OWASP since 2004. He is based in Ireland and runs a software security practice, bccriskadvisory.com and [https://www.edgescan.com edgescan.com]&lt;br /&gt;
&lt;br /&gt;
He was on the Global Board of the OWASP foundation from 2009 to 2015. He was the first democratically elected to the board member in 2009.&lt;br /&gt;
During this time Eoin assisted in founding the OWASP legal entity in Europe and has helped provide structure to OWASPs finances and strategy.&lt;br /&gt;
&lt;br /&gt;
Eoin believes the projects OWASP delivers are a key aspect of the foundation and also very important in helping both developers and security professionals in building more secure software.&lt;br /&gt;
&lt;br /&gt;
Eoin previously lead the [[OWASP Testing Project|OWASP Testing Guide]] and  currently the [[OWASP Code Review Guide Table of Contents|OWASP Code Review Guide]] and also contributed to other OWASP projects such as &lt;br /&gt;
[[OWASP SAMM Project|OWASP SAMM]], &lt;br /&gt;
[[OWASP CISO Guide]] &amp;amp; &lt;br /&gt;
CISO Survey, &lt;br /&gt;
[[OWASP Cheat sheets]], and the &lt;br /&gt;
[[OWASP ASVS Assessment tool|OWASP ASVS]] &amp;amp; [[OWASP Zed Attack Proxy Project|ZAP]] as a reviewer.&lt;br /&gt;
&lt;br /&gt;
Eoin also founded the [[OWASP Ireland AppSec 2009 Conference|OWASP Ireland]] chapter in 2006 and the OWASP Ireland event in 2008 which is in its 4th year and also hosted [[OWASP EU]] in 2011.&lt;br /&gt;
&lt;br /&gt;
Eoin believes OWASP needs to focus more on outreach to the software development community and also involve itself more with the industries which rely on software to achieve business and social goals by assisting organisations, CISO's and security communities in writing and defending software infrastructure.&lt;br /&gt;
&lt;br /&gt;
To this end,  Eoin frequently delivers free technical and executive awareness workshops to help organisations achieve their goals in a secure manner.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''My involvement in OWASP to date.............'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland Chapter leader and founder since 2004'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Have held regular meetings, promoted OWASP and application security in general.&amp;lt;br&amp;gt;I have developed a stong community within Ireland in terms of secure development such that large organisations are aware of OWASP and invite me for comment and involvement in application security awareness efforts. I am involved in ongoing efforts to consolidate the security community with groups such as IISF, IAI and ISSA.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Testing guide leader (2005-2007)'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Handed over from Daniel Cuthbert in 2005.&amp;lt;br&amp;gt;Lead the testing guide effort, transferred it to wiki from word document in 2006.&amp;lt;br&amp;gt;Wrote significant portions of the guide.&amp;lt;br&amp;gt;Handed guide to Matteo Meucci in 2007&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Code review guide (V1.1) leader - &amp;quot;Worlds first open source code review guide&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lead and founder of guide.&amp;lt;br&amp;gt;Authored 70% of currrent code review guide.&amp;lt;br&amp;gt;Considered the most comprehensive code review guide on the web.&amp;lt;br&amp;gt;Ongoing project currently at V1.1&amp;lt;br&amp;gt;Tools such as OWASP code crawler are inspired by the guide.&amp;lt;br&amp;gt;Used by US Gov agencies, Insustry Security standards etc.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP ASVS Reviewer'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Reviewed and supplied suggestions for most recent release of ASVS.&amp;lt;br&amp;gt;Presented viability of ASVS to industry leads in terms of integration of standard into strategic direction.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP SAMM Contributor'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Along with team members, suggested rewrite of SAMM questionaire based on experience of using in the field.&amp;lt;br&amp;gt;With the aim of overall maturity of the SAMM document and process.&amp;lt;br&amp;gt;I have fostered the SAMM approach into a number of large european organisations.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland 2009,2010,OWASP EU 2011'''&amp;lt;br&amp;gt;Organiser of successful event which has made a large impact on local application security community.&amp;lt;br&amp;gt;Event covered costs and was within budget.&amp;lt;br&amp;gt;Achieved media coverage with many local and business &amp;quot;broad sheet&amp;quot; newspapaers.&amp;lt;br&amp;gt;Managed to gather an impressive panel of speakers for such a modest event. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Cheat Sheet Author and reviewer -2011/2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''OWASP Workshop Trainer - 2010/2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''OWASP Reboot project leader 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Eoin_Keary&amp;diff=235088</id>
		<title>Eoin Keary</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Eoin_Keary&amp;diff=235088"/>
				<updated>2017-11-06T10:26:24Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: Updated bio&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP board member since 2009. &lt;br /&gt;
Elected to position of global Vice Chair, September 2011.&lt;br /&gt;
&lt;br /&gt;
OWASP Board tenure from 2009 to 2015&lt;br /&gt;
&lt;br /&gt;
A long time member of OWASP, Based in Dublin Ireland and CEO/Founder of [http://www.bccriskadvisory.com BCC Risk Advisory Ltd.] and [https://www.edgescan.com edgescan]&lt;br /&gt;
&lt;br /&gt;
LinkedIn profile [http://www.linkedin.com/in/eoinkeary click here] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Eoin Keary has been with OWASP since 2004. He is based in Ireland and runs a software security practice, bccriskadvisory.com and [https://www.edgescan.com edgescan.com]&lt;br /&gt;
&lt;br /&gt;
He was on the Global Board of the OWASP foundation from 2009 to 2015. He was the first democratically elected to the board member in 2009.&lt;br /&gt;
During this time Eoin assisted in founding the OWASP legal entity in Europe and has helped provide structure to OWASPs finances and strategy.&lt;br /&gt;
&lt;br /&gt;
Eoin believes the projects OWASP delivers are a key aspect of the foundation and also very important in helping both developers and security professionals in building more secure software.&lt;br /&gt;
&lt;br /&gt;
Eoin previously lead the [[OWASP Testing Project|OWASP Testing Guide]] and  currently the [[OWASP Code Review Guide Table of Contents|OWASP Code Review Guide]] and also contributed to other OWASP projects such as &lt;br /&gt;
[[OWASP SAMM Project|OWASP SAMM]], &lt;br /&gt;
[[OWASP CISO Guide]] &amp;amp; &lt;br /&gt;
CISO Survey, &lt;br /&gt;
[[OWASP Cheat sheets]], and the &lt;br /&gt;
[[OWASP ASVS Assessment tool|OWASP ASVS]] &amp;amp; [[OWASP Zed Attack Proxy Project|ZAP]] as a reviewer.&lt;br /&gt;
&lt;br /&gt;
Eoin also founded the [[OWASP Ireland AppSec 2009 Conference|OWASP Ireland]] chapter in 2006 and the OWASP Ireland event in 2008 which is in its 4th year and also hosted [[OWASP EU]] in 2011.&lt;br /&gt;
&lt;br /&gt;
Eoin believes OWASP needs to focus more on outreach to the software development community and also involve itself more with the industries which rely on software to achieve business and social goals by assisting organisations, CISO's and security communities in writing and defending software infrastructure.&lt;br /&gt;
&lt;br /&gt;
To this end,  Eoin frequently delivers free technical and executive awareness workshops to help organisations achieve their goals in a secure manner.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''My involvement in OWASP to date.............'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland Chapter leader and founder since 2004'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Have held regular meetings, promoted OWASP and application security in general.&amp;lt;br&amp;gt;I have developed a stong community within Ireland in terms of secure development such that large organisations are aware of OWASP and invite me for comment and involvement in application security awareness efforts. I am involved in ongoing efforts to consolidate the security community with groups such as IISF, IAI and ISSA.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Testing guide leader (2005-2007)'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Handed over from Daniel Cuthbert in 2005.&amp;lt;br&amp;gt;Lead the testing guide effort, transferred it to wiki from word document in 2006.&amp;lt;br&amp;gt;Wrote significant portions of the guide.&amp;lt;br&amp;gt;Handed guide to Matteo Meucci in 2007&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Code review guide (V1.1) leader - &amp;quot;Worlds first open source code review guide&amp;quot;'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lead and founder of guide.&amp;lt;br&amp;gt;Authored 70% of currrent code review guide.&amp;lt;br&amp;gt;Considered the most comprehensive code review guide on the web.&amp;lt;br&amp;gt;Ongoing project currently at V1.1&amp;lt;br&amp;gt;Tools such as OWASP code crawler are inspired by the guide.&amp;lt;br&amp;gt;Used by US Gov agencies, Insustry Security standards etc.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP ASVS Reviewer'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Reviewed and supplied suggestions for most recent release of ASVS.&amp;lt;br&amp;gt;Presented viability of ASVS to industry leads in terms of integration of standard into strategic direction.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP SAMM Contributor'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Along with team members, suggested rewrite of SAMM questionaire based on experience of using in the field.&amp;lt;br&amp;gt;With the aim of overall maturity of the SAMM document and process.&amp;lt;br&amp;gt;I have fostered the SAMM approach into a number of large european organisations.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''OWASP Ireland 2009,2010,OWASP EU 2011'''&amp;lt;br&amp;gt;Organiser of successful event which has made a large impact on local application security community.&amp;lt;br&amp;gt;Event covered costs and was within budget.&amp;lt;br&amp;gt;Achieved media coverage with many local and business &amp;quot;broad sheet&amp;quot; newspapaers.&amp;lt;br&amp;gt;Managed to gather an impressive panel of speakers for such a modest event. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Cheat Sheet Author and reviewer -2011/2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''OWASP Workshop Trainer - 2010/2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''OWASP Reboot project leader 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Vulnerability_Scanning_Tools&amp;diff=234650</id>
		<title>Category:Vulnerability Scanning Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Vulnerability_Scanning_Tools&amp;diff=234650"/>
				<updated>2017-10-26T09:19:41Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description  ==&lt;br /&gt;
&lt;br /&gt;
Web Application Vulnerability Scanners are automated tools that scan web applications, normally from the outside, to look for security vulnerabilities such as [[Cross-site scripting]], [[SQL Injection]], [[Command Injection]], [[Path Traversal]] and insecure server configuration. This category of tools is frequently referred to as [https://www.techopedia.com/definition/30958/dynamic-application-security-testing-dast Dynamic Application Security Testing] (DAST) Tools. A large number of both commercial and open source tools of this type are available and all of these tools have their own strengths and weaknesses.  If you are interested in the effectiveness of DAST tools, check out the OWASP [[Benchmark]] project, which is scientifically measuring the effectiveness of all types of vulnerability detection tools, including DAST.&lt;br /&gt;
&lt;br /&gt;
Here we provide a list of vulnerability scanning tools currently available in the market.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Disclaimer:''' The tools listing in the table below are presented in an alphabetical order. &amp;lt;b&amp;gt;OWASP does not endorse any of the Vendors or Scanning Tools by listing them in the table below. We have made every effort to provide this information as accurately as possible. If you are the vendor of a tool below and think this information is incomplete or incorrect, please send an e-mail to our [mailto:owasp_ha_vulnerability_scanner_project@lists.owasp.org mailing list] and we will make every effort to correct this information.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.acunetix.com/ Acunetix WVS] || tool_owner = Acunetix || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.edgescan.com/ edgescan] || tool_owner = edgescan|| tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www-03.ibm.com/software/products/en/appscan-standard AppScan] || tool_owner = IBM || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.trustwave.com/Products/Application-Security/App-Scanner-Family/App-Scanner-Enterprise/ App Scanner] || tool_owner = Trustwave || tool_licence = Commercial || tool_platforms = Windows }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.rapid7.com/products/appspider/ AppSpider] || tool_owner = Rapid7 || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.scanmyserver.com/ AVDS] || tool_owner = Beyond Security || tool_licence = Commercial / Free (Limited Capability)|| tool_platforms = SaaS }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blueclosure.com BlueClosure BC Detect] || tool_owner = BlueClosure || tool_licence = Commercial, 2 weeks trial || tool_platforms = Most platforms supported}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.portswigger.net/ Burp Suite] || tool_owner = PortSwiger || tool_licence = Commercial / Free (Limited Capability)|| tool_platforms = Most platforms supported }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://contrastsecurity.com Contrast] || tool_owner = Contrast Security || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = SaaS or On-Premises }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://detectify.com/ Detectify] || tool_owner = Detectify || tool_licence = Commercial || tool_platforms = SaaS }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.gamasec.com/Gamascan.aspx GamaScan] || tool_owner = GamaSec || tool_licence = Commercial || tool_platforms = Windows }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://rgaucher.info/beta/grabber/ Grabber] || tool_owner = Romain Gaucher || tool_licence = Open Source || tool_platforms = Python 2.4, BeautifulSoup and PyXML}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://sourceforge.net/p/grendel/code/ci/c59780bfd41bdf34cc13b27bc3ce694fd3cb7456/tree/ Grendel-Scan] || tool_owner = David Byrne || tool_licence = Open Source || tool_platforms = Windows, Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.golismero.com GoLismero] || tool_owner = GoLismero Team || tool_licence = GPLv2.0 || tool_platforms = Windows, Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.ikare-monitoring.com/ IKare] || tool_owner = ITrust || tool_licence = Commercial || tool_platforms = N/A }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.indusface.com/index.php/products/web-application-scanning Indusface Web Application Scanning] || tool_owner = Indusface || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.nstalker.com/ N-Stealth] || tool_owner = N-Stalker || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.mavitunasecurity.com/ Netsparker] || tool_owner = MavitunaSecurity || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.rapid7.com/products/nexpose-community-edition.jsp Nexpose] || tool_owner = Rapid7 || tool_licence = Commercial / Free (Limited Capability)|| tool_platforms = Windows/Linux}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.cirt.net/nikto2 Nikto] || tool_owner = CIRT || tool_licence = Open Source|| tool_platforms = Unix/Linux}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.milescan.com/ ParosPro] || tool_owner = MileSCAN || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.websecurify.com/desktop/proxy.html Proxy.app] || tool_owner = Websecurify || tool_licence = Commercial || tool_platforms = Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.qualys.com/products/qg_suite/was/ QualysGuard] || tool_owner = Qualys || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.beyondtrust.com/Products/RetinaNetworkSecurityScanner/ Retina] || tool_owner = BeyondTrust || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.orvant.com Securus] || tool_owner = Orvant, Inc || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.whitehatsec.com/home/services/services.html Sentinel] || tool_owner = WhiteHat Security || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.parasoft.com/products/article.jsp?articleId=3169&amp;amp;redname=webtesting&amp;amp;referred=webtesting SOATest] || tool_owner = Parasoft || tool_licence = Commercial || tool_platforms = Windows / Linux / Solaris}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.tinfoilsecurity.com Tinfoil Security] || tool_owner = Tinfoil Security, Inc. || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = SaaS or On-Premises}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.trustwave.com/external-vulnerability-scanning.php Trustkeeper Scanner] || tool_owner = Trustwave SpiderLabs || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://subgraph.com/vega/ Vega] || tool_owner = Subgraph || tool_licence = Open Source || tool_platforms = Windows, Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://wapiti.sourceforge.net/ Wapiti] || tool_owner = Informática Gesfor || tool_licence = Open Source || tool_platforms = Windows, Unix/Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.tripwire.com/it-security-software/enterprise-vulnerability-management/web-application-vulnerability-scanning/ WebApp360] || tool_owner = TripWire || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://webcookies.org WebCookies] || tool_owner = WebCookies || tool_licence = Free|| tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www8.hp.com/us/en/software-solutions/software.html?compURI=1341991#.Uuf0KBAo4iw WebInspect] || tool_owner = HP || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.websecurify.com/desktop/webreaver.html WebReaver] || tool_owner = Websecurify || tool_licence = Commercial || tool_platforms = Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.german-websecurity.com/en/products/webscanservice/product-details/overview/ WebScanService] || tool_owner = German Web Security || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://suite.websecurify.com/ Websecurify Suite] || tool_owner = Websecurify || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = Windows, Linux, Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.sensepost.com/research/wikto/ Wikto] || tool_owner = Sensepost || tool_licence = Open Source || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.w3af.org/ w3af] || tool_owner = w3af.org || tool_licence = GPLv2.0 || tool_platforms = Linux and Mac}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.owasp.org/index.php/OWASP_Xenotix_XSS_Exploit_Framework Xenotix XSS Exploit Framework] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project Zed Attack Proxy] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Windows, Unix/Linux and Macintosh}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*[[Source_Code_Analysis_Tools | SAST Tools]] - Similar Information on Static Application Security Testing (SAST) Tools&lt;br /&gt;
*http://projects.webappsec.org/Web-Application-Security-Scanner-Evaluation-Criteria&lt;br /&gt;
*http://www.slideshare.net/lbsuto/accuracy-and-timecostsofwebappscanners&lt;br /&gt;
*http://samate.nist.gov/index.php/Web_Application_Vulnerability_Scanners.html&lt;br /&gt;
*http://www.tssci-security.com/archives/2007/11/24/2007-security-testing-tools-in-review/&lt;br /&gt;
*http://www.softwareqatest.com/qatweb1.html#SECURITY&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Vulnerability_Scanning_Tools&amp;diff=231859</id>
		<title>Category:Vulnerability Scanning Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Vulnerability_Scanning_Tools&amp;diff=231859"/>
				<updated>2017-07-26T10:53:38Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description  ==&lt;br /&gt;
&lt;br /&gt;
Web Application Vulnerability Scanners are automated tools that scan web applications, normally from the outside, to look for security vulnerabilities such as [[Cross-site scripting]], [[SQL Injection]], [[Command Injection]], [[Path Traversal]] and insecure server configuration. This category of tools is frequently referred to as [https://www.techopedia.com/definition/30958/dynamic-application-security-testing-dast Dynamic Application Security Testing] (DAST) Tools. A large number of both commercial and open source tools of this type are available and all of these tools have their own strengths and weaknesses.  If you are interested in the effectiveness of DAST tools, check out the OWASP [[Benchmark]] project, which is scientifically measuring the effectiveness of all types of vulnerability detection tools, including DAST.&lt;br /&gt;
&lt;br /&gt;
Here we provide a list of vulnerability scanning tools currently available in the market.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Disclaimer:''' The tools listing in the table below are presented in an alphabetical order. &amp;lt;b&amp;gt;OWASP does not endorse any of the Vendors or Scanning Tools by listing them in the table below. We have made every effort to provide this information as accurately as possible. If you are the vendor of a tool below and think this information is incomplete or incorrect, please send an e-mail to our [mailto:owasp_ha_vulnerability_scanner_project@lists.owasp.org mailing list] and we will make every effort to correct this information.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tools Listing  ==&lt;br /&gt;
&lt;br /&gt;
{{:Template:OWASP Tool Headings}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.acunetix.com/ Acunetix WVS] || tool_owner = Acunetix || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.edgescan.com/ edgescan] || tool_owner = edgescan|| tool_licence = Commercial / Free (Limited Capability) || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www-03.ibm.com/software/products/en/appscan-standard AppScan] || tool_owner = IBM || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.trustwave.com/Products/Application-Security/App-Scanner-Family/App-Scanner-Enterprise/ App Scanner] || tool_owner = Trustwave || tool_licence = Commercial || tool_platforms = Windows }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.rapid7.com/products/appspider/ AppSpider] || tool_owner = Rapid7 || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.scanmyserver.com/ AVDS] || tool_owner = Beyond Security || tool_licence = Commercial / Free (Limited Capability)|| tool_platforms = SaaS }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.blueclosure.com BlueClosure BC Detect] || tool_owner = BlueClosure || tool_licence = Commercial, 2 weeks trial || tool_platforms = Most platforms supported}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.portswigger.net/ Burp Suite] || tool_owner = PortSwiger || tool_licence = Commercial / Free (Limited Capability)|| tool_platforms = Most platforms supported }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://contrastsecurity.com Contrast] || tool_owner = Contrast Security || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = SaaS or On-Premises }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://detectify.com/ Detectify] || tool_owner = Detectify || tool_licence = Commercial || tool_platforms = SaaS }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.gamasec.com/Gamascan.aspx GamaScan] || tool_owner = GamaSec || tool_licence = Commercial || tool_platforms = Windows }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://rgaucher.info/beta/grabber/ Grabber] || tool_owner = Romain Gaucher || tool_licence = Open Source || tool_platforms = Python 2.4, BeautifulSoup and PyXML}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://sourceforge.net/p/grendel/code/ci/c59780bfd41bdf34cc13b27bc3ce694fd3cb7456/tree/ Grendel-Scan] || tool_owner = David Byrne || tool_licence = Open Source || tool_platforms = Windows, Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.golismero.com GoLismero] || tool_owner = GoLismero Team || tool_licence = GPLv2.0 || tool_platforms = Windows, Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.ikare-monitoring.com/ IKare] || tool_owner = ITrust || tool_licence = Commercial || tool_platforms = N/A }}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.indusface.com/index.php/products/web-application-scanning Indusface Web Application Scanning] || tool_owner = Indusface || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.nstalker.com/ N-Stealth] || tool_owner = N-Stalker || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.mavitunasecurity.com/ Netsparker] || tool_owner = MavitunaSecurity || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.rapid7.com/products/nexpose-community-edition.jsp Nexpose] || tool_owner = Rapid7 || tool_licence = Commercial / Free (Limited Capability)|| tool_platforms = Windows/Linux}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.cirt.net/nikto2 Nikto] || tool_owner = CIRT || tool_licence = Open Source|| tool_platforms = Unix/Linux}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.milescan.com/ ParosPro] || tool_owner = MileSCAN || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.websecurify.com/desktop/proxy.html Proxy.app] || tool_owner = Websecurify || tool_licence = Commercial || tool_platforms = Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.qualys.com/products/qg_suite/was/ QualysGuard] || tool_owner = Qualys || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.beyondtrust.com/Products/RetinaNetworkSecurityScanner/ Retina] || tool_owner = BeyondTrust || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.orvant.com Securus] || tool_owner = Orvant, Inc || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.whitehatsec.com/home/services/services.html Sentinel] || tool_owner = WhiteHat Security || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.parasoft.com/products/article.jsp?articleId=3169&amp;amp;redname=webtesting&amp;amp;referred=webtesting SOATest] || tool_owner = Parasoft || tool_licence = Commercial || tool_platforms = Windows / Linux / Solaris}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.tinfoilsecurity.com Tinfoil Security] || tool_owner = Tinfoil Security, Inc. || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = SaaS or On-Premises}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.trustwave.com/external-vulnerability-scanning.php Trustkeeper Scanner] || tool_owner = Trustwave SpiderLabs || tool_licence = Commercial || tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://subgraph.com/vega/ Vega] || tool_owner = Subgraph || tool_licence = Open Source || tool_platforms = Windows, Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://wapiti.sourceforge.net/ Wapiti] || tool_owner = Informática Gesfor || tool_licence = Open Source || tool_platforms = Windows, Unix/Linux and Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.tripwire.com/it-security-software/enterprise-vulnerability-management/web-application-vulnerability-scanning/ WebApp360] || tool_owner = TripWire || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://webcookies.org WebCookies] || tool_owner = WebCookies || tool_licence = Free|| tool_platforms = SaaS}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www8.hp.com/us/en/software-solutions/software.html?compURI=1341991#.Uuf0KBAo4iw WebInspect] || tool_owner = HP || tool_licence = Commercial || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.websecurify.com/desktop/webreaver.html WebReaver] || tool_owner = Websecurify || tool_licence = Commercial || tool_platforms = Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.german-websecurity.com/en/products/webscanservice/product-details/overview/ WebScanService] || tool_owner = German Web Security || tool_licence = Commercial || tool_platforms = N/A}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://suite.websecurify.com/ Websecurify Suite] || tool_owner = Websecurify || tool_licence = Commercial / Free (Limited Capability) || tool_platforms = Windows, Linux, Macintosh}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.sensepost.com/research/wikto/ Wikto] || tool_owner = Sensepost || tool_licence = Open Source || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [http://www.w3af.org/ w3af] || tool_owner = w3af.org || tool_licence = GPLv2.0 || tool_platforms = Linux and Mac}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.owasp.org/index.php/OWASP_Xenotix_XSS_Exploit_Framework Xenotix XSS Exploit Framework] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Windows}}&lt;br /&gt;
{{OWASP Tool Info || tool_name = [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project Zed Attack Proxy] || tool_owner = OWASP || tool_licence = Open Source || tool_platforms = Windows, Unix/Linux and Macintosh}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*[[Source_Code_Analysis_Tools | SAST Tools]] - Similar Information on Static Application Security Testing (SAST) Tools&lt;br /&gt;
*http://projects.webappsec.org/Web-Application-Security-Scanner-Evaluation-Criteria&lt;br /&gt;
*http://www.slideshare.net/lbsuto/accuracy-and-timecostsofwebappscanners&lt;br /&gt;
*http://samate.nist.gov/index.php/Web_Application_Vulnerability_Scanners.html&lt;br /&gt;
*http://www.tssci-security.com/archives/2007/11/24/2007-security-testing-tools-in-review/&lt;br /&gt;
*http://www.softwareqatest.com/qatweb1.html#SECURITY&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Tools_Project]]&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_CISO_Survey&amp;diff=206325</id>
		<title>OWASP CISO Survey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_CISO_Survey&amp;diff=206325"/>
				<updated>2016-01-13T10:20:41Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: /* Other contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| width=&amp;quot;70%&amp;quot; style=&amp;quot;background:#d9e9f9&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
= New CISO Survey 2014 Questionnaire is out! = &lt;br /&gt;
&lt;br /&gt;
Please help us and share it with your security manager to fill it out&lt;br /&gt;
Questionnaire is available in: &lt;br /&gt;
* English: https://www.surveymonkey.com/s/CISOSurvey2014&lt;br /&gt;
* Chinese: https://www.surveymonkey.com/s/CISOSurvey2014cn&lt;br /&gt;
* Hebrew: https://www.surveymonkey.com/s/CISOSurvey2014iw&lt;br /&gt;
* Japanese: https://jp.surveymonkey.com/s/CISOSurvey2014jp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= The CISO Survey and Report 2013 =&lt;br /&gt;
&lt;br /&gt;
CISO Survey 2013 Version 1.0 is published in January 2014.&lt;br /&gt;
&lt;br /&gt;
== Contents ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Preamble&lt;br /&gt;
** [[CISO Survey 2013: Foreword|Foreword]]&lt;br /&gt;
** [[CISO Survey 2013: Executive Summary|Executive Summary]]&lt;br /&gt;
** [[CISO Survey 2013: Introduction|Introduction]]&lt;br /&gt;
&lt;br /&gt;
* The CISO Survey Report&lt;br /&gt;
** [[CISO Survey 2013: Threats and risks|Threats and risks]]&lt;br /&gt;
** [[CISO Survey 2013: Investments and challenges|Investments and challenges]]&lt;br /&gt;
** [[CISO Survey 2013: Tools and technology|Tools and technology]]&lt;br /&gt;
** [[CISO Survey 2013: Governance and control|Governance and control]]&lt;br /&gt;
** [[CISO Survey 2013: Conclusions|Conclusions]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Supporting Information&lt;br /&gt;
** [[CISO Survey 2013: References|References]]&lt;br /&gt;
** [[CISO AppSec Guide: About OWASP|About OWASP]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Appendix&lt;br /&gt;
** [[CISO AppSec Guide: Quick Reference to OWASP Guides &amp;amp; Projects|Appendix A: Quick Reference to OWASP Guides &amp;amp; Projects]]&lt;br /&gt;
** [[CISO Survey 2013: OWASP project list | Appendix B: References to selection of OWASP Guides and Projects]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
&lt;br /&gt;
The OWASP CISO Survey Report is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Register to receive future updates and survey reports ==&lt;br /&gt;
&lt;br /&gt;
If you wish to receive only updates about future releases of the OWASP CISO Survey and related CISO projects, you can register your email address here: https://docs.google.com/forms/d/1DBYIpWcx6IAZNHOXufdkLZKLIQXetwgbxxd7h_mqWN0/viewform &lt;br /&gt;
(or in short URL: http://ow.ly/tHeT9 )&lt;br /&gt;
&lt;br /&gt;
(Your contact details will of course be kept strictly confidential and only used to send you updates about new releases of OWASP CISO projects and invitations to participate in the OWASP CISO Survey. And you can of course unsubscribe from this service at any time.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;100&amp;quot; style=&amp;quot;max-height:200px;overflow:hidden;background:#fff;margin:0;padding:0;&amp;quot; cellpadding=&amp;quot;0&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100px;max-height:300px;border:0;margin:0;padding-left:6px;padding-right:6px;overflow:visible;&amp;quot;&amp;gt;[[File:CISO-Guide-bar.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;30%&amp;quot; style=&amp;quot;background:#eeeeee&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
[[File:Ciso_survey_report_2013n_300x200.jpg|link=https://www.owasp.org/index.php/File:Owasp-ciso-report-2013-1.0.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Credits =&lt;br /&gt;
&lt;br /&gt;
== Project lead and main author ==&lt;br /&gt;
&lt;br /&gt;
* [[User:Tgondrom|Tobias Gondrom]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other contributors ==&lt;br /&gt;
&lt;br /&gt;
Co-authors, contributors and reviewers:&lt;br /&gt;
&lt;br /&gt;
* [[User:Marco-cincy|Marco Morana]]&lt;br /&gt;
* [[User:Stephanie_Tan|Stephanie Tan]]&lt;br /&gt;
* [[User:Clerkendweller|Colin Watson]]&lt;br /&gt;
* [[User:EoinKeary|Eoin Keary]] - Survey Originator / Original Author.&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_CISO_Survey_Project#tab=Acknowledgements And further Acknowledgements]: many more helping hands from OWASP chapters around the world and the former Global Industry Committee, providing input, designing questions, translating and sending out the survey questions around the globe. Thank you all! We couldn't have done it without you!&lt;br /&gt;
&lt;br /&gt;
= Further Information =&lt;br /&gt;
&lt;br /&gt;
== CISO Survey ==&lt;br /&gt;
&lt;br /&gt;
The OWASP CISO Survey is also available as&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Owasp-ciso-report-2013-1.0.pdf Free downloadable PDF] &lt;br /&gt;
* [http://www.lulu.com/shop/owasp-foundation/ciso-survey-and-report-2013/paperback/product-21480821.html At cost print on demand color booklet].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For full information about the OWASP CISO Survey Report Project, including mailing list details, the forward plan, how to contribute, the project status, and alternative media, see the project page:&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_CISO_Survey_Project CISO Survey Project Page]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== CISO Guide ==&lt;br /&gt;
The contributors from the [[Application Security Guide For CISOs]] also provided invaluable input for this survey report.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP CISO Survey Project]]&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet&amp;diff=198403</id>
		<title>XSS (Cross Site Scripting) Prevention Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet&amp;diff=198403"/>
				<updated>2015-08-04T21:02:39Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: /* Authors and Primary Editors */  - re-added my credit (JSON xss).&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
This article provides a simple positive model for preventing [[XSS]] using output escaping/encoding properly. While there are a huge number of XSS attack vectors, following a few simple rules can completely defend against this serious attack. This article does not explore the technical or business impact of XSS. Suffice it to say that it can lead to an attacker gaining the ability to do anything a victim can do through their browser.&lt;br /&gt;
&lt;br /&gt;
Both [[XSS#Stored_and_Reflected_XSS_Attacks | reflected and stored XSS]] can be addressed by performing the appropriate validation and escaping on the server-side. [[DOM Based XSS]] can be addressed with a special subset of rules described in the [[DOM based XSS Prevention Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
For a cheatsheet on the attack vectors related to XSS, please refer to the [[XSS Filter Evasion Cheat Sheet]]. More background on browser security and the various browsers can be found in the [http://code.google.com/p/browsersec/ Browser Security Handbook].&lt;br /&gt;
&lt;br /&gt;
Before reading this cheatsheet, it is important to have a fundamental understanding of [[Injection Theory]].&lt;br /&gt;
&lt;br /&gt;
== A Positive XSS Prevention Model ==&lt;br /&gt;
&lt;br /&gt;
This article treats an HTML page like a template, with slots where a developer is allowed to put untrusted data. These slots cover the vast majority of the common places where a developer might want to put untrusted data. Putting untrusted data in other places in the HTML is not allowed. This is a &amp;quot;whitelist&amp;quot; model, that denies everything that is not specifically allowed.&lt;br /&gt;
&lt;br /&gt;
Given the way browsers parse HTML, each of the different types of slots has slightly different security rules. When you put untrusted data into these slots, you need to take certain steps to make sure that the data does not break out of that slot into a context that allows code execution. In a way, this approach treats an HTML document like a parameterized database query - the data is kept in specific places and is isolated from code contexts with escaping.&lt;br /&gt;
&lt;br /&gt;
This document sets out the most common types of slots and the rules for putting untrusted data into them safely. Based on the various specifications, known XSS vectors, and a great deal of manual testing with all the popular browsers, we have determined that the rule proposed here are safe.&lt;br /&gt;
&lt;br /&gt;
The slots are defined and a few examples of each are provided. Developers SHOULD NOT put data into any other slots without a very careful analysis to ensure that what they are doing is safe. Browser parsing is extremely tricky and many innocuous looking characters can be significant in the right context.&lt;br /&gt;
&lt;br /&gt;
== Why Can't I Just HTML Entity Encode Untrusted Data? ==&lt;br /&gt;
&lt;br /&gt;
HTML entity encoding is okay for untrusted data that you put in the body of the HTML document, such as inside a &amp;amp;lt;div&amp;gt; tag.  It even sort of works for untrusted data that goes into attributes, particularly if you're religious about using quotes around your attributes.  But HTML entity encoding doesn't work if you're putting untrusted data inside a &amp;amp;lt;script&amp;gt; tag anywhere, or an event handler attribute like onmouseover, or inside CSS, or in a URL.  So even if you use an HTML entity encoding method everywhere, you are still most likely vulnerable to XSS.  '''You MUST use the escape syntax for the part of the HTML document you're putting untrusted data into.'''  That's what the rules below are all about.&lt;br /&gt;
&lt;br /&gt;
== You Need a Security Encoding Library ==&lt;br /&gt;
&lt;br /&gt;
Writing these encoders is not tremendously difficult, but there are quite a few hidden pitfalls. For example, you might be tempted to use some of the escaping shortcuts like \&amp;quot; in JavaScript. However, these values are dangerous and may be misinterpreted by the nested parsers in the browser. You might also forget to escape the escape character, which attackers can use to neutralize your attempts to be safe. OWASP recommends using a security-focused encoding library to make sure these rules are properly implemented.&lt;br /&gt;
&lt;br /&gt;
Microsoft provides an encoding library named the [http://wpl.codeplex.com Microsoft Anti-Cross Site Scripting Library] for the .NET platform and ASP.NET Framework has built-in [http://msdn.microsoft.com/en-us/library/ms972969.aspx#securitybarriers_topic6 ValidateRequest] function that provides '''limited''' sanitization.&lt;br /&gt;
&lt;br /&gt;
The OWASP [[ESAPI]] project has created an escaping library for Java. OWASP also provides the [[OWASP Java Encoder Project]] for high-performance encoding.&lt;br /&gt;
&lt;br /&gt;
= XSS Prevention Rules = &lt;br /&gt;
&lt;br /&gt;
The following rules are intended to prevent all XSS in your application. While these rules do not allow absolute freedom in putting untrusted data into an HTML document, they should cover the vast majority of common use cases. You do not have to allow '''all''' the rules in your organization. Many organizations may find that '''allowing only Rule #1 and Rule #2 are sufficient for their needs'''. Please add a note to the discussion page if there is an additional context that is often required and can be secured with escaping.&lt;br /&gt;
&lt;br /&gt;
Do NOT simply escape the list of example characters provided in the various rules. It is NOT sufficient to escape only that list. Blacklist approaches are quite fragile.  The whitelist rules here have been carefully designed to provide protection even against future vulnerabilities introduced by browser changes.&lt;br /&gt;
&lt;br /&gt;
== RULE #0 - Never Insert Untrusted Data Except in Allowed Locations ==&lt;br /&gt;
&lt;br /&gt;
The first rule is to '''deny all''' - don't put untrusted data into your HTML document unless it is within one of the slots defined in Rule #1 through Rule #5. The reason for Rule #0 is that there are so many strange contexts within HTML that the list of escaping rules gets very complicated. We can't think of any good reason to put untrusted data in these contexts. This includes &amp;quot;nested contexts&amp;quot; like a URL inside a javascript -- the encoding rules for those locations are tricky and dangerous.  If you insist on putting untrusted data into nested contexts, please do a lot of cross-browser testing and let us know what you find out.&lt;br /&gt;
&lt;br /&gt;
  &amp;amp;lt;script&amp;gt;'''...NEVER PUT UNTRUSTED DATA HERE...'''&amp;lt;/script&amp;gt;   directly in a script&lt;br /&gt;
  &lt;br /&gt;
  &amp;amp;lt;!--'''...NEVER PUT UNTRUSTED DATA HERE...'''--&amp;gt;             inside an HTML comment&lt;br /&gt;
  &lt;br /&gt;
  &amp;amp;lt;div '''...NEVER PUT UNTRUSTED DATA HERE...'''=test /&amp;gt;       in an attribute name&lt;br /&gt;
  &lt;br /&gt;
  &amp;amp;lt;'''NEVER PUT UNTRUSTED DATA HERE...''' href=&amp;quot;/test&amp;quot; /&amp;gt;   in a tag name&lt;br /&gt;
  &lt;br /&gt;
  &amp;amp;lt;style&amp;gt;'''...NEVER PUT UNTRUSTED DATA HERE...'''&amp;lt;/style&amp;gt;   directly in CSS&lt;br /&gt;
&lt;br /&gt;
Most importantly, never accept actual JavaScript code from an untrusted source and then run it. For example, a parameter named &amp;quot;callback&amp;quot; that contains a JavaScript code snippet.  No amount of escaping can fix that.&lt;br /&gt;
&lt;br /&gt;
== RULE #1 - HTML Escape Before Inserting Untrusted Data into HTML Element Content ==&lt;br /&gt;
&lt;br /&gt;
Rule #1 is for when you want to put untrusted data directly into the HTML body somewhere. This includes inside normal tags like div, p, b, td, etc. Most web frameworks have a method for HTML escaping for the characters detailed below. However, this is '''absolutely not sufficient for other HTML contexts.'''  You need to implement the other rules detailed here as well.&lt;br /&gt;
&lt;br /&gt;
  &amp;amp;lt;body&amp;gt;'''...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...'''&amp;lt;/body&amp;gt;&lt;br /&gt;
  &lt;br /&gt;
  &amp;amp;lt;div&amp;gt;'''...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...'''&amp;lt;/div&amp;gt;&lt;br /&gt;
  &lt;br /&gt;
  any other normal HTML elements&lt;br /&gt;
&lt;br /&gt;
Escape the following characters with HTML entity encoding to prevent switching into any execution context, such as script, style, or event handlers. Using hex entities is recommended in the spec. In addition to the 5 characters significant in XML (&amp;amp;, &amp;lt;, &amp;gt;, &amp;quot;, '), the forward slash is included as it helps to end an HTML entity.&lt;br /&gt;
&lt;br /&gt;
  &amp;amp; --&amp;gt; &amp;amp;amp;amp;&lt;br /&gt;
  &amp;lt; --&amp;gt; &amp;amp;amp;lt;&lt;br /&gt;
  &amp;gt; --&amp;gt; &amp;amp;amp;gt;&lt;br /&gt;
  &amp;quot; --&amp;gt; &amp;amp;amp;quot;&lt;br /&gt;
  ' --&amp;gt; &amp;amp;amp;#x27;     &amp;amp;amp;apos; not recommended because its not in the HTML spec (See: [http://www.w3.org/TR/html4/sgml/entities.html section 24.4.1]) &amp;amp;amp;apos; is in the XML and XHTML specs.&lt;br /&gt;
  / --&amp;gt; &amp;amp;amp;#x2F;     forward slash is included as it helps end an HTML entity&lt;br /&gt;
&lt;br /&gt;
See the [http://code.google.com/p/owasp-esapi-java/source/browse/trunk/src/main/java/org/owasp/esapi/codecs/HTMLEntityCodec.java ESAPI reference implementation] of HTML entity escaping and unescaping.&lt;br /&gt;
&lt;br /&gt;
  String safe = ESAPI.encoder().encodeForHTML( request.getParameter( &amp;quot;input&amp;quot; ) );&lt;br /&gt;
&lt;br /&gt;
== RULE #2 - Attribute Escape Before Inserting Untrusted Data into HTML Common Attributes ==&lt;br /&gt;
&lt;br /&gt;
Rule #2 is for putting untrusted data into typical attribute values like width, name, value, etc. This should not be used for complex attributes like href, src, style, or any of the event handlers like onmouseover.  It is extremely important that event handler attributes should follow Rule #3 for HTML JavaScript Data Values.&lt;br /&gt;
&lt;br /&gt;
  &amp;amp;lt;div attr='''...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...'''&amp;gt;content&amp;lt;/div&amp;gt;     inside UNquoted attribute&lt;br /&gt;
  &lt;br /&gt;
  &amp;amp;lt;div attr=''''...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...''''&amp;gt;content&amp;lt;/div&amp;gt;   inside single quoted attribute&lt;br /&gt;
  &lt;br /&gt;
  &amp;amp;lt;div attr=&amp;quot;'''...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...'''&amp;quot;&amp;gt;content&amp;lt;/div&amp;gt;   inside double quoted attribute&lt;br /&gt;
&lt;br /&gt;
Except for alphanumeric characters, escape all characters with ASCII values less than 256 with the &amp;amp;amp;#xHH; format (or a named entity if available) to prevent switching out of the attribute. The reason this rule is so broad is that developers frequently leave attributes unquoted.  Properly quoted attributes can only be escaped with the corresponding quote. Unquoted attributes can be broken out of with many characters, including [space] % * + , - / ; &amp;lt; = &amp;gt; ^ and |.&lt;br /&gt;
&lt;br /&gt;
See the [http://code.google.com/p/owasp-esapi-java/source/browse/trunk/src/main/java/org/owasp/esapi/codecs/HTMLEntityCodec.java ESAPI reference implementation] of HTML entity escaping and unescaping.&lt;br /&gt;
&lt;br /&gt;
  String safe = ESAPI.encoder().encodeForHTMLAttribute( request.getParameter( &amp;quot;input&amp;quot; ) );&lt;br /&gt;
&lt;br /&gt;
== RULE #3 - JavaScript Escape Before Inserting Untrusted Data into JavaScript Data Values ==&lt;br /&gt;
&lt;br /&gt;
Rule #3 concerns dynamically generated JavaScript code - both script blocks and event-handler attributes. The only safe place to put untrusted data into this code is inside a quoted &amp;quot;data value.&amp;quot;  Including untrusted data inside any other JavaScript context is quite dangerous, as it is extremely easy to switch into an execution context with characters including (but not limited to) semi-colon, equals, space, plus, and many more, so use with caution.&lt;br /&gt;
&lt;br /&gt;
  &amp;amp;lt;script&amp;gt;alert(''''...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...'''')&amp;amp;lt;/script&amp;gt;     inside a quoted string&lt;br /&gt;
  &lt;br /&gt;
  &amp;amp;lt;script&amp;gt;x=''''...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...''''&amp;amp;lt;/script&amp;gt;          one side of a quoted expression&lt;br /&gt;
  &lt;br /&gt;
  &amp;amp;lt;div onmouseover=&amp;quot;x=''''...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...''''&amp;quot;&amp;amp;lt;/div&amp;gt;  inside quoted event handler&lt;br /&gt;
&lt;br /&gt;
Please note there are some JavaScript functions that can never safely use untrusted data as input - &amp;lt;b&amp;gt;EVEN IF JAVASCRIPT ESCAPED&amp;lt;/b&amp;gt;! &lt;br /&gt;
&lt;br /&gt;
For example:&lt;br /&gt;
  &amp;amp;lt;script&amp;gt;&lt;br /&gt;
  window.setInterval(''''...EVEN IF YOU ESCAPE UNTRUSTED DATA YOU ARE XSSED HERE...'''');&lt;br /&gt;
  &amp;amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Except for alphanumeric characters, escape all characters less than 256 with the \xHH format to prevent switching out of the data value into the script context or into another attribute. DO NOT use any escaping shortcuts like \&amp;quot; because the quote character may be matched by the HTML attribute parser which runs first. These escaping shortcuts are also susceptible to &amp;quot;escape-the-escape&amp;quot; attacks where the attacker sends \&amp;quot; and the vulnerable code turns that into \\&amp;quot; which enables the quote.&lt;br /&gt;
&lt;br /&gt;
If an event handler is properly quoted, breaking out requires the corresponding quote. However, we have intentionally made this rule quite broad because event handler attributes are often left unquoted.  Unquoted attributes can be broken out of with many characters including [space] % * + , - / ; &amp;lt; = &amp;gt; ^ and |. Also, a &amp;lt;/script&amp;gt; closing tag will close a script block even though it is inside a quoted string because the HTML parser runs before the JavaScript parser.&lt;br /&gt;
&lt;br /&gt;
See the [http://code.google.com/p/owasp-esapi-java/source/browse/trunk/src/main/java/org/owasp/esapi/codecs/JavaScriptCodec.java ESAPI reference implementation] of JavaScript escaping and unescaping.&lt;br /&gt;
&lt;br /&gt;
  String safe = ESAPI.encoder().encodeForJavaScript( request.getParameter( &amp;quot;input&amp;quot; ) );&lt;br /&gt;
&lt;br /&gt;
=== RULE #3.1 - HTML escape JSON values in an HTML context and read the data with JSON.parse ===&lt;br /&gt;
&lt;br /&gt;
In a Web 2.0 world, the need for having data dynamically generated by an application in a javascript context is common.  One strategy is to make an AJAX call to get the values, but this isn't always performant.  Often, an initial block of JSON is loaded into the page to act as a single place to store multiple values.  This data is tricky, though not impossible, to escape correctly without breaking the format and content of the values.&lt;br /&gt;
&lt;br /&gt;
'''Ensure returned ''Content-Type'' header is application/json and not text/html. &lt;br /&gt;
This shall instruct the browser not misunderstand the context and execute injected script'''&lt;br /&gt;
&lt;br /&gt;
'''Bad HTTP response:'''&lt;br /&gt;
&lt;br /&gt;
    HTTP/1.1 200&lt;br /&gt;
    Date: Wed, 06 Feb 2013 10:28:54 GMT&lt;br /&gt;
    Server: Microsoft-IIS/7.5....&lt;br /&gt;
    '''Content-Type: text/html; charset=utf-8''' &amp;lt;-- bad&lt;br /&gt;
    ....&lt;br /&gt;
    Content-Length: 373&lt;br /&gt;
    Keep-Alive: timeout=5, max=100&lt;br /&gt;
    Connection: Keep-Alive&lt;br /&gt;
    {&amp;quot;Message&amp;quot;:&amp;quot;No HTTP resource was found that matches the request URI 'dev.net.ie/api/pay/.html?HouseNumber=9&amp;amp;AddressLine&lt;br /&gt;
    =The+Gardens'''&amp;amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;'''&amp;amp;AddressLine2=foxlodge+woods&amp;amp;TownName=Meath'.&amp;quot;,&amp;quot;MessageDetail&amp;quot;:&amp;quot;No type was found&lt;br /&gt;
    that matches the controller named 'pay'.&amp;quot;}   &amp;lt;-- this script will pop!!&lt;br /&gt;
    &lt;br /&gt;
&lt;br /&gt;
'''Good HTTP response'''&lt;br /&gt;
&lt;br /&gt;
    HTTP/1.1 200&lt;br /&gt;
    Date: Wed, 06 Feb 2013 10:28:54 GMT&lt;br /&gt;
    Server: Microsoft-IIS/7.5....&lt;br /&gt;
    '''Content-Type: application/json; charset=utf-8''' &amp;lt;--good&lt;br /&gt;
    .....&lt;br /&gt;
    .....&lt;br /&gt;
&lt;br /&gt;
A common '''anti-pattern''' one would see:&lt;br /&gt;
&lt;br /&gt;
    &amp;amp;lt;script&amp;gt;&lt;br /&gt;
      var initData = &amp;lt;%= data.to_json %&amp;gt;; // '''Do NOT do this without encoding the data with one of the techniques listed below.'''&lt;br /&gt;
    &amp;amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JSON entity encoding ====&lt;br /&gt;
&lt;br /&gt;
The rules for JSON encoding can be found in the [https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet#Output_Encoding_Rules_Summary Output Encoding Rules Summary]. Note, this will not allow you to use XSS protection provided by CSP 1.0.&lt;br /&gt;
&lt;br /&gt;
==== HTML entity encoding ====&lt;br /&gt;
&lt;br /&gt;
This technique has the advantage that html entity escaping is widely supported and helps separate data from server side code without crossing any context boundaries. Consider placing the JSON block on the page as a normal element and then parsing the innerHTML to get the contents.  The javascript that reads the span can live in an external file, thus making the implementation of CSP enforcement easier.&lt;br /&gt;
&lt;br /&gt;
  &amp;amp;lt;script id=&amp;quot;init_data&amp;quot; type=&amp;quot;application/json&amp;quot;&amp;gt;&lt;br /&gt;
     &amp;amp;lt;%= html_escape(data.to_json) %&amp;gt;&lt;br /&gt;
  &amp;amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  // external js file&lt;br /&gt;
  var dataElement = document.getElementById('init_data');&lt;br /&gt;
  // unescape the content of the span&lt;br /&gt;
  var jsonText = dataElement.textContent || dataElement.innerText  &lt;br /&gt;
  var initData = JSON.parse(html_unescape(jsonText));&lt;br /&gt;
&lt;br /&gt;
An alternative to escaping and unescaping JSON directly in JavaScript, is to normalize JSON server-side by converting '&amp;lt;' to '\u003c' before delivering it to the browser.&lt;br /&gt;
&lt;br /&gt;
== RULE #4 - CSS Escape And Strictly Validate Before Inserting Untrusted Data into HTML Style Property Values ==&lt;br /&gt;
&lt;br /&gt;
Rule #4 is for when you want to put untrusted data into a stylesheet or a style tag. CSS is surprisingly powerful, and can be used for numerous attacks. Therefore, it's important that you only use untrusted data in a property '''value''' and not into other places in style data. You should stay away from putting untrusted data into complex properties like url, behavior, and custom (-moz-binding). You should also not put untrusted data into IE’s expression property value which allows JavaScript.&lt;br /&gt;
&lt;br /&gt;
  &amp;amp;lt;style&amp;gt;selector { property : '''...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...'''; } &amp;amp;lt;/style&amp;gt;     property value&amp;lt;br/&amp;gt;&lt;br /&gt;
  &amp;amp;lt;style&amp;gt;selector { property : &amp;amp;quot;'''...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...'''&amp;amp;quot;; } &amp;amp;lt;/style&amp;gt;   property value&amp;lt;br/&amp;gt;&lt;br /&gt;
  &amp;amp;lt;span style=&amp;amp;quot;property : '''...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...'''&amp;amp;quot;&amp;gt;text&amp;amp;lt;/span&amp;gt;       property value&lt;br /&gt;
&lt;br /&gt;
Please note there are some CSS contexts that can never safely use untrusted data as input - &amp;lt;b&amp;gt;EVEN IF PROPERLY CSS ESCAPED&amp;lt;/b&amp;gt;! You will have to ensure that URLs only start with &amp;quot;http&amp;quot; not &amp;quot;javascript&amp;quot; and that properties never start with &amp;quot;expression&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
For example:&lt;br /&gt;
  { background-url : &amp;quot;javascript:alert(1)&amp;quot;; }  // and all other URLs&lt;br /&gt;
  { text-size: &amp;quot;expression(alert('XSS'))&amp;quot;; }   // only in IE&lt;br /&gt;
&lt;br /&gt;
Except for alphanumeric characters, escape all characters with ASCII values less than 256 with the \HH escaping format. DO NOT use any escaping shortcuts like \&amp;quot; because the quote character may be matched by the HTML attribute parser which runs first. These escaping shortcuts are also susceptible to &amp;quot;escape-the-escape&amp;quot; attacks where the attacker sends \&amp;quot; and the vulnerable code turns that into \\&amp;quot; which enables the quote.&lt;br /&gt;
&lt;br /&gt;
If attribute is quoted, breaking out requires the corresponding quote.  All attributes should be quoted but your encoding should be strong enough to prevent XSS when untrusted data is placed in unquoted contexts. Unquoted attributes can be broken out of with many characters including [space] % * + , - / ; &amp;lt; = &amp;gt; ^ and |.  Also, the &amp;lt;/style&amp;gt; tag will close the style block even though it is inside a quoted string because the HTML parser runs before the JavaScript parser. Please note that we recommend aggressive CSS encoding and validation to prevent XSS attacks for both quoted and unquoted attributes.&lt;br /&gt;
&lt;br /&gt;
See the [http://code.google.com/p/owasp-esapi-java/source/browse/trunk/src/main/java/org/owasp/esapi/codecs/CSSCodec.java ESAPI reference implementation] of CSS escaping and unescaping.&lt;br /&gt;
&lt;br /&gt;
  String safe = ESAPI.encoder().encodeForCSS( request.getParameter( &amp;quot;input&amp;quot; ) );&lt;br /&gt;
&lt;br /&gt;
== RULE #5 - URL Escape Before Inserting Untrusted Data into HTML URL Parameter Values ==&lt;br /&gt;
&lt;br /&gt;
Rule #5 is for when you want to put untrusted data into HTTP GET parameter value. &lt;br /&gt;
&lt;br /&gt;
  &amp;amp;lt;a href=&amp;quot;http&amp;amp;#x3a;&amp;amp;#x2f;&amp;amp;#x2f;www.somesite.com&amp;amp;#x3f;test&amp;amp;#x3d;'''...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...&amp;quot;'''&amp;gt;link&amp;amp;lt;/a &amp;gt;       &lt;br /&gt;
&lt;br /&gt;
Except for alphanumeric characters, escape all characters with ASCII values less than 256 with the %HH escaping format.  Including untrusted data in data: URLs should not be allowed as there is no good way to disable attacks with escaping to prevent switching out of the URL. All attributes should be quoted. Unquoted attributes can be broken out of with many characters including [space] % * + , - / ; &amp;lt; = &amp;gt; ^ and |. Note that entity encoding is useless in this context.&lt;br /&gt;
&lt;br /&gt;
See the [http://code.google.com/p/owasp-esapi-java/source/browse/trunk/src/main/java/org/owasp/esapi/codecs/PercentCodec.java ESAPI reference implementation] of URL escaping and unescaping.&lt;br /&gt;
&lt;br /&gt;
  String safe = ESAPI.encoder().encodeForURL( request.getParameter( &amp;quot;input&amp;quot; ) );&lt;br /&gt;
&lt;br /&gt;
WARNING: Do not encode complete or relative URL's with URL encoding! If untrusted input is meant to be placed into href, src or other URL-based attributes, it should be validated to make sure it does not point to an unexpected protocol, especially Javascript links. URL's should then be encoded based on the context of display like any other piece of data. For example, user driven URL's in HREF links should be attribute encoded. For example:&lt;br /&gt;
&lt;br /&gt;
  String userURL = request.getParameter( &amp;quot;userURL&amp;quot; )&lt;br /&gt;
  boolean isValidURL = ESAPI.validator().isValidInput(&amp;quot;URLContext&amp;quot;, userURL, &amp;quot;URL&amp;quot;, 255, false); &lt;br /&gt;
  if (isValidURL) {  &lt;br /&gt;
      &amp;lt;a href=&amp;quot;&amp;lt;%=encoder.encodeForHTMLAttribute(userURL)%&amp;gt;&amp;quot;&amp;gt;link&amp;lt;/a&amp;gt;&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
== RULE #6 - Sanitize HTML Markup with a Library Designed for the Job ==&lt;br /&gt;
&lt;br /&gt;
If your application handles markup -- untrusted input that is supposed to contain HTML -- it can be very difficult to validate. Encoding is also difficult, since it would break all the tags that are supposed to be in the input. Therefore, you need a library that can parse and clean HTML formatted text.  There are several available at OWASP that are simple to use:&lt;br /&gt;
&lt;br /&gt;
'''HtmlSanitizer''' - https://github.com/mganss/HtmlSanitizer&lt;br /&gt;
&lt;br /&gt;
An open-source .Net library. The HTML is cleaned with a white list approach. All allowed tags and attributes can be configured. The library is unit tested with the [https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet OWASP XSS Filter Evasion Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
   var sanitizer = new HtmlSanitizer();&lt;br /&gt;
   sanitizer.AllowedAttributes.Add(&amp;quot;class&amp;quot;);&lt;br /&gt;
   var sanitized = sanitizer.Sanitize(html);&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP AntiSamy''' - https://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project&lt;br /&gt;
&lt;br /&gt;
Note: not actively maintained! &lt;br /&gt;
&lt;br /&gt;
   import org.owasp.validator.html.*;&lt;br /&gt;
   Policy policy = Policy.getInstance(POLICY_FILE_LOCATION);&lt;br /&gt;
   AntiSamy as = new AntiSamy();&lt;br /&gt;
   CleanResults cr = as.scan(dirtyInput, policy);&lt;br /&gt;
   MyUserDAO.storeUserProfile(cr.getCleanHTML()); // some custom function&lt;br /&gt;
&lt;br /&gt;
'''OWASP Java HTML Sanitizer''' - https://www.owasp.org/index.php/OWASP_Java_HTML_Sanitizer_Project&lt;br /&gt;
&lt;br /&gt;
   import org.owasp.html.Sanitizers;&lt;br /&gt;
   import org.owasp.html.PolicyFactory;&lt;br /&gt;
   PolicyFactory sanitizer = Sanitizers.FORMATTING.and(Sanitizers.BLOCKS);&lt;br /&gt;
   String cleanResults = sanitizer.sanitize(&amp;quot;&amp;amp;lt;p&amp;amp;gt;Hello, &amp;amp;lt;b&amp;amp;gt;World!&amp;amp;lt;/b&amp;amp;gt;&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
For more information on OWASP Java HTML Sanitizer policy construction, see [http://owasp-java-html-sanitizer.googlecode.com/svn/trunk/distrib/javadoc/org/owasp/html/Sanitizers.html http://owasp-java-html-sanitizer.googlecode.com/svn/trunk/distrib/javadoc/org/owasp/html/Sanitizers.html]&lt;br /&gt;
&lt;br /&gt;
'''Other libraries that provide HTML Sanitization include:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
PHP Html Purifier - http://htmlpurifier.org/&amp;lt;br/&amp;gt;&lt;br /&gt;
JavaScript/Node.JS Bleach - https://github.com/ecto/bleach&amp;lt;br/&amp;gt;&lt;br /&gt;
Python Bleach - https://pypi.python.org/pypi/bleach&lt;br /&gt;
&lt;br /&gt;
== RULE #7 - Prevent DOM-based XSS  ==&lt;br /&gt;
&lt;br /&gt;
For details on what DOM-based XSS is, and defenses against this type of XSS flaw, please see the OWASP article on [[DOM based XSS Prevention Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
== Bonus Rule #1: Use HTTPOnly cookie flag ==&lt;br /&gt;
&lt;br /&gt;
Preventing all XSS flaws in an application is hard, as you can see. To help mitigate the impact of an XSS flaw on your site, OWASP also recommends you set the HTTPOnly flag on your session cookie and any custom cookies you have that are not accessed by any Javascript you wrote. This cookie flag is typically on by default in .NET apps, but in other languages you have to set it manually.  For more details on the HTTPOnly cookie flag, including what it does, and how to use it, see the OWASP article on [[HTTPOnly]].&lt;br /&gt;
&lt;br /&gt;
== Bonus Rule #2: Implement Content Security Policy ==&lt;br /&gt;
&lt;br /&gt;
There is another good complex solution to mitigate the impact of an XSS flaw called Content Security Policy. It's a browser side mechanism which &lt;br /&gt;
allows you to create source whitelists for client side resources of your web application, e.g. JavaScript, CSS, images, etc. CSP via special HTTP header instructs the browser to only execute or render resources from those sources. For example this CSP &lt;br /&gt;
&lt;br /&gt;
 Content-Security-Policy: default-src: 'self'; script-src: 'self' static.domain.tld&lt;br /&gt;
&lt;br /&gt;
will instruct web browser to load all resources only from the page's origin and JavaScript source code files additionaly from static.domain.tld. For more details on Content Security Policy, including what it does, and how to use it, see the OWASP article on  [[Content_Security_Policy]]&lt;br /&gt;
&lt;br /&gt;
== Bonus Rule #3: Use an Auto-Escaping Template System ==&lt;br /&gt;
&lt;br /&gt;
Many web application frameworks provide automatic contextual escaping functionality such as [https://docs.angularjs.org/api/ng/service/$sce AngularJS strict contextual escaping] and [https://golang.org/pkg/html/template/ Go Templates]. Use these technologies when you can.&lt;br /&gt;
&lt;br /&gt;
== Bonus Rule #4: Use the X-XSS-Protection Response Header ==&lt;br /&gt;
&lt;br /&gt;
This HTTP response header enables the Cross-site scripting (XSS) filter built into some modern web browsers. This header is usually enabled by default anyway, so the role of this header is to re-enable the filter for this particular website if it was disabled by the user.&lt;br /&gt;
&lt;br /&gt;
= XSS Prevention Rules Summary =&lt;br /&gt;
&lt;br /&gt;
The following snippets of HTML demonstrate how to safely render untrusted data in a variety of different contexts. &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable nowraplinks&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Data Type&lt;br /&gt;
! Context&lt;br /&gt;
! Code Sample&lt;br /&gt;
! Defense&lt;br /&gt;
|-&lt;br /&gt;
| String&lt;br /&gt;
| HTML Body&lt;br /&gt;
| &amp;amp;lt;span&amp;gt;&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;UNTRUSTED DATA&amp;lt;/span&amp;gt;&amp;amp;lt;/span&amp;gt;&lt;br /&gt;
| &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet#RULE_.231_-_HTML_Escape_Before_Inserting_Untrusted_Data_into_HTML_Element_Content HTML Entity Encoding]&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| String&lt;br /&gt;
| Safe HTML Attributes&lt;br /&gt;
| &amp;amp;lt;input type=&amp;quot;text&amp;quot; name=&amp;quot;fname&amp;quot; value=&amp;quot;&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;UNTRUSTED DATA&amp;lt;/span&amp;gt;&amp;quot;&amp;gt;&lt;br /&gt;
| &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet#RULE_.232_-_Attribute_Escape_Before_Inserting_Untrusted_Data_into_HTML_Common_Attributes Aggressive HTML Entity Encoding]&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Only place untrusted data into a whitelist of safe attributes (listed below).&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Strictly validate unsafe attributes such as background, id and name.&amp;lt;/ul&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| String&lt;br /&gt;
| GET Parameter&lt;br /&gt;
| &amp;amp;lt;a href=&amp;quot;/site/search?value=&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;UNTRUSTED DATA&amp;lt;/span&amp;gt;&amp;quot;&amp;gt;clickme&amp;amp;lt;/a&amp;gt;&lt;br /&gt;
| &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet#RULE_.235_-_URL_Escape_Before_Inserting_Untrusted_Data_into_HTML_URL_Parameter_Values URL Encoding]&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| String&lt;br /&gt;
| Untrusted URL in a SRC or HREF attribute&lt;br /&gt;
| &amp;amp;lt;a href=&amp;quot;&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;UNTRUSTED URL&amp;lt;/span&amp;gt;&amp;quot;&amp;gt;clickme&amp;amp;lt;/a&amp;gt;&amp;lt;br/&amp;gt;&amp;amp;lt;iframe src=&amp;quot;&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;UNTRUSTED URL&amp;lt;/span&amp;gt;&amp;quot; /&amp;gt;&lt;br /&gt;
| &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Canonicalize input&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;URL Validation&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Safe URL verification&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Whitelist http and https URL's only ([[Avoid the JavaScript Protocol to Open a new Window]])&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Attribute encoder&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| String&lt;br /&gt;
| CSS Value&lt;br /&gt;
| &amp;amp;lt;div style=&amp;quot;width: &amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;UNTRUSTED DATA&amp;lt;/span&amp;gt;;&amp;quot;&amp;gt;Selection&amp;amp;lt;/div&amp;gt;&lt;br /&gt;
| &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet#RULE_.234_-_CSS_Escape_And_Strictly_Validate_Before_Inserting_Untrusted_Data_into_HTML_Style_Property_Values Strict structural validation]&amp;lt;li&amp;gt;CSS Hex encoding&amp;lt;li&amp;gt;Good design of CSS Features&amp;lt;/ul&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| String&lt;br /&gt;
| JavaScript Variable&lt;br /&gt;
| &amp;amp;lt;script&amp;gt;var currentValue='&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;UNTRUSTED DATA&amp;lt;/span&amp;gt;';&amp;amp;lt;/script&amp;gt;&amp;lt;br/&amp;gt;&amp;amp;lt;script&amp;gt;someFunction('&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;UNTRUSTED DATA&amp;lt;/span&amp;gt;');&amp;amp;lt;/script&amp;gt;&lt;br /&gt;
| &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;Ensure JavaScript variables are quoted&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;JavaScript Hex Encoding&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;JavaScript Unicode Encoding&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;Avoid backslash encoding (\&amp;quot; or \' or \\)&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| HTML&lt;br /&gt;
| HTML Body&lt;br /&gt;
| &amp;amp;lt;div&amp;gt;&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;UNTRUSTED HTML&amp;lt;/span&amp;gt;&amp;amp;lt;/div&amp;gt;&lt;br /&gt;
| &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet#RULE_.236_-_Use_an_HTML_Policy_engine_to_validate_or_clean_user-driven_HTML_in_an_outbound_way HTML Validation (JSoup, AntiSamy, HTML Sanitizer)]&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| String&lt;br /&gt;
| DOM XSS&lt;br /&gt;
| &amp;amp;lt;script&amp;gt;document.write(&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&amp;quot;UNTRUSTED INPUT: &amp;quot; + document.location.hash&amp;lt;/span&amp;gt;);&amp;amp;lt;script/&amp;amp;gt;&lt;br /&gt;
| &amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;[[DOM based XSS Prevention Cheat Sheet]]&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''''Safe HTML Attributes include:''''' align, alink, alt, bgcolor, border, cellpadding, cellspacing, class, color, cols, colspan, coords, dir, face, height, hspace, ismap, lang, marginheight, marginwidth, multiple, nohref, noresize, noshade, nowrap, ref, rel, rev, rows, rowspan, scrolling, shape, span, summary, tabindex, title, usemap, valign, value, vlink, vspace, width&lt;br /&gt;
&lt;br /&gt;
= Output Encoding Rules Summary =&lt;br /&gt;
&lt;br /&gt;
The purpose of output encoding (as it relates to Cross Site Scripting) is to convert untrusted input into a safe form where the input is displayed as '''data''' to the user without executing as '''code''' in the browser. The following charts details a list of critical output encoding methods needed to stop Cross Site Scripting.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Encoding Type&lt;br /&gt;
! Encoding Mechanism&lt;br /&gt;
|-&lt;br /&gt;
| HTML Entity Encoding&lt;br /&gt;
|   Convert &amp;amp; to &amp;amp;amp;amp;&amp;lt;br/&amp;gt;Convert &amp;lt; to &amp;amp;amp;lt;&amp;lt;br/&amp;gt;Convert &amp;gt; to &amp;amp;amp;gt;&amp;lt;br/&amp;gt;Convert &amp;quot; to &amp;amp;amp;quot;&amp;lt;br/&amp;gt;Convert ' to &amp;amp;amp;#x27;&amp;lt;br/&amp;gt;Convert / to &amp;amp;amp;#x2F;&lt;br /&gt;
|-&lt;br /&gt;
| HTML Attribute Encoding&lt;br /&gt;
| Except for alphanumeric characters, escape all characters with the HTML Entity &amp;amp;amp;#xHH; format, including spaces. (HH = Hex Value)&lt;br /&gt;
|-&lt;br /&gt;
| URL Encoding&lt;br /&gt;
| Standard percent encoding, see: [http://www.w3schools.com/tags/ref_urlencode.asp http://www.w3schools.com/tags/ref_urlencode.asp]. URL encoding should only be used to encode parameter values, not the entire URL or path fragments of a URL.&lt;br /&gt;
|-&lt;br /&gt;
| JavaScript Encoding&lt;br /&gt;
| Except for alphanumeric characters, escape all characters with the \uXXXX unicode escaping format (X = Integer).&lt;br /&gt;
|-&lt;br /&gt;
| CSS Hex Encoding&lt;br /&gt;
| CSS escaping supports \XX and \XXXXXX. Using a two character escape can cause problems if the next character continues the escape sequence. There are two solutions (a) Add a space after the CSS escape (will be ignored by the CSS parser) (b) use the full amount of CSS escaping possible by zero padding the value.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Related Articles =&lt;br /&gt;
&lt;br /&gt;
'''XSS Attack Cheat Sheet'''&lt;br /&gt;
&lt;br /&gt;
The following article describes how to exploit different kinds of XSS Vulnerabilities that this article was created to help you avoid:&lt;br /&gt;
&lt;br /&gt;
* OWASP: [[XSS Filter Evasion Cheat Sheet]] - Based on - RSnake's: &amp;quot;XSS Cheat Sheet&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''A Systematic Analysis of XSS Sanitization in Web Application Frameworks'''&lt;br /&gt;
&lt;br /&gt;
[http://www.cs.berkeley.edu/~prateeks/papers/empirical-webfwks.pdf http://www.cs.berkeley.edu/~prateeks/papers/empirical-webfwks.pdf]&lt;br /&gt;
&lt;br /&gt;
'''Description of XSS Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* OWASP article on [[XSS]] Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Discussion on the Types of XSS Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* [[Types of Cross-Site Scripting]]&lt;br /&gt;
&lt;br /&gt;
'''How to Review Code for Cross-site scripting Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on [[Reviewing Code for Cross-site scripting]] Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''How to Test for Cross-site scripting  Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Testing Project|OWASP Testing Guide]] article on [[Testing for Cross site scripting]] Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* [[XSS Experimental Minimal Encoding Rules]]&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
Jeff Williams - jeff.williams[at]owasp.org&amp;lt;br/&amp;gt;&lt;br /&gt;
Jim Manico - jim[at]owasp.org&amp;lt;br/&amp;gt;&lt;br /&gt;
Neil Mattatall - neil[at]owasp.org&amp;lt;br/&amp;gt;&lt;br /&gt;
Eoin Keary - eoin.keary[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;br /&gt;
[[Category:Popular]]&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dublin&amp;diff=198022</id>
		<title>Dublin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dublin&amp;diff=198022"/>
				<updated>2015-07-28T10:02:09Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: /* OWASP August Event */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ireland|extra= [[File:Owasp_logo_ireland_small.jpg]]| mailinglistsite=https://lists.owasp.org/mailman/listinfo/owasp-ireland}} become a [http://www.owasp.org/index.php/Membership#Categories_of_Membership_.26_Supporters Member or Annual Chapter Sponsor(s)]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Becoming a chapter sponsor means that you get your organisation mentioned in meeting promotion (including on this page), recognition at the beginning of the meeting and promotional material at the meeting. &amp;lt;br&amp;gt;&lt;br /&gt;
We currently have the following sponsorship options available: &amp;lt;br&amp;gt;&lt;br /&gt;
€250 for an individual meeting sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
€1500 for annual chapter sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
Contact any of the board members below for more information. &amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Board  ==&lt;br /&gt;
&lt;br /&gt;
Should you have a question about the local chapter, would like to get more involved contact ANY of the following people below &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:Owen.Pendlebury(at)owasp.org Owen Pendlebury] +353876605277&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Mark.Denihan(at)owasp.org Mark Denihan]&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [[User:EoinKeary|Eoin Keary]] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member/ Global Board Member''' [mailto:fcerullo(at)owasp.org Fabio Cerullo] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''OWASP Ireland'''&amp;lt;br&amp;gt;40 Block E, Smithfield Market Smithfield &amp;lt;br&amp;gt; Dublin 7, Ireland &amp;lt;br&amp;gt;Tel: +353876605277 &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Dublin Chapter 2015 ==&lt;br /&gt;
=== OWASP July Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event – Eoin Keary - Security Boot camp''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 16th July&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 13:00pm &amp;lt;br&amp;gt;Talks Start: 13:00pm &amp;lt;br&amp;gt; Event finishes at 17:30pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration Members. [https://myowasp.force.com/login Members register here])''&lt;br /&gt;
''(Registration Non-Members. [https://myowasp.force.com/MN4__PublicEventRegistration?id=a2oU0000000TZAOIA4 Non-Members register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Thanks to Morgan McKinley for sponsoring the event&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Security Boot Camp'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Eoin Keary – CTO BCC Risk Advisory  '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Eoin was on the  international board of OWASP,  the Open Web Application Security Project  from 2009-2015 and during his time in OWASP he has lead the OWASP Testing and Security Code Review Guides and also contributed to OWASP SAMM, OWASP CISO Guide and the OWASP Cheat Sheet Series. &lt;br /&gt;
&lt;br /&gt;
Eoin is a well-known technical leader in industry in the area of software security and penetration testing, and has led global security engagements for some of the world's largest financial services and consumer products companies. He is the CTO and founder of BCC Risk Advisory which deliver professional security services and edgescan.com, a managed cloud-based SaaS, web vulnerability service.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
All - Please join us for a free security boot camp.....&lt;br /&gt;
&lt;br /&gt;
OWASP is hosting a special FREE security boot camp for all Owasp members and local developers. &lt;br /&gt;
The training is recommended for developers who want to learn more about securing their code.&lt;br /&gt;
Presented by Eoin Keary, this intensive boot camp focuses on the most common web application security problems, including aspects of both the OWASP Top Ten and the MITRE Top 25.&lt;br /&gt;
The course will introduce and demonstrate application security techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code and understand fixes.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
=== OWASP June Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event – Jason Flood (IBM) &amp;amp; Paul Mooney (Free Lance)''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Tuesday 16th June&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location Hilton Dublin&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Charlemount Place, Dublin 2 '''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Hilton+Dublin/@53.330893,-6.259998,15z/data=!4m2!3m1!1s0x0:0x5b92598f4735994e?sa=X&amp;amp;ved=0CIQBEPwSMAtqFQoTCMyG-cibhcYCFQaWLAodAFAAeg Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-june-event-hilton-dublin-jason-flood-paul-mooney-tickets-17318536208register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Thanks to Morgan McKinley for sponsoring the event&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Understanding cyber gaps in the human'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Jason Flood – Ethical Hacker IBM  '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Capture the Flag tournament, also known as a CTF is a framework often found at conferences such as IRISS, OWASP, Blackhat and many more. For the last number of years as part of my PhD research I have been creating CTF frameworks that operate at local, national and international levels, some of you may have played them or at least seen them, and looking at the results.&lt;br /&gt;
 &lt;br /&gt;
These CTF events were built using a variety of architectures, network topologies and programming languages. The challenges they presented also varied both in complexity of exploit and potential organisational damage if exploited.&lt;br /&gt;
&lt;br /&gt;
Today we see attack know-how and attacker tools being freely traded on the internet, enabling hackers and exposing organisations to an even greater communal risk. Arguably it can be said that every organisation no matter the size needs a business plan.  If that business has an online footprint, then a part of that plan needs to focus on it's own cyber risk profile.&lt;br /&gt;
&lt;br /&gt;
Join us to explore how CTF applied methodologies can be used as part of business decisions around resource management, defensive technology solutions, defect management and other aspects of business activities that are associated with operating in a hostile environment such as the internet.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' The Encrypted Token Pattern CSRF Defence'''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Paul Mooney –     Freelance, Ryanair Labs, insidethecpu.com''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
I’m the creator of the Encrypted Token Pattern and ARMOR, its .NET implementation.&lt;br /&gt;
I specialise in taking apart problems, designing solutions, and providing those solutions as downloadable software frameworks, available under the MIT License.&lt;br /&gt;
I’m a Software Architect, happiest when designing solutions to problems from a conceptual point-of-view, while getting my hands dirty assembling the nuts and bolts. For that reason, I try to avoid titles; if I had to brand myself, I’m a Technology Consultant.&lt;br /&gt;
I’m most accomplished in C# in terms of language, however I’m also very proficient in JavaScript, Java, and Google Go.&lt;br /&gt;
I’m a software-development mentor, and enjoy guiding teams of engineers toward effective technology-driven solutions to real-world problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Encrypted Token Pattern is a defence mechanism against Cross Site Request Forgery (CSRF) &lt;br /&gt;
attacks, and is an alternative to its sister-patterns; Synchroniser Token, and Double Submit Cookie. &lt;br /&gt;
This article discusses the merits and means of implementing this defence mechanism in web-based &lt;br /&gt;
applications. &lt;br /&gt;
&lt;br /&gt;
''Brief Description'' &lt;br /&gt;
The Encrypted Token Pattern &lt;br /&gt;
The Encrypted Token Pattern leverages a single token, as opposed to dual tokens, and offers a more &lt;br /&gt;
narrow scope of failure than alternative CSRF protection patterns. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Leveraging the Encrypted Token Pattern &lt;br /&gt;
The Advanced Resilient Mode of Recognition (ARMOR) is a C# implementation of the Encrypted &lt;br /&gt;
Token Pattern, available on GitHub under the MIT license that provides a means of protecting &lt;br /&gt;
ASP.NET applications from CSRF attacks, by leveraging the Encrypted Token Pattern. A Java &lt;br /&gt;
equivalent of ARMOR is under construction and will be available soon. &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ARMOR &lt;br /&gt;
ARMOR is a framework composed of interconnecting components exposed through custom web- &lt;br /&gt;
handlers. ARMOR is essentially an advanced encryption and hashing mechanism, leveraging the &lt;br /&gt;
Rijndael encryption standard, and SHA256 hashing by default.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
=== OWASP March Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''&lt;br /&gt;
OWASP Dublin Chapter Event - Denim Group - Dan Cornell &amp;amp; John Dickson''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 26th March&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-dublin-chapter-event-denim-group-dan-cornell-john-dickson-tickets-16065539461 register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking throughout,beer and pizza thanks to Morgan Mckinley&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Managing Your Application Security Program with the ThreadFix Ecosystem'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Dan Cornell – Denim Group - (https://www.linkedin.com/in/dancornell) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As Chief Technology Officer and Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process. Cornell is an active member of the development community and a sought-after speaker on topics of web application security, speaking at international conferences including RSA Security Conference, OWASP AppSec USA and EU and Black Hat Arsenal.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source application vulnerability management system that helps automate many common application security tasks and integrate security and development tools. This tutorial will walk through the capabilities of the ecosystem of ThreadFix applications, showing how ThreadFix can be used to: Manage a risk-ranked application portfolio Consolidate, normalize and de-duplicate the results of DAST, SAST, IAST and other application security testing activities and track these results over time to produce trending and mean-time-to-fix reporting Convert application vulnerabilities into software defects in developer issue tracking systems Pre-seed DAST scanners such as OWASP ZAP with application attack surface data to allow for better scan coverage Instrument developer Continuous Integration (CI) systems such as Jenkins to automatically collect security test data Map the results of SAST and DAST scanning into developer IDEs The presentation walks through these scenarios and demonstrates how ThreadFix, along with other open source tools, can be used to address common problems faced by teams implementing software security programs. It will also provide insight into the ThreadFix development roadmap and upcoming enhancements.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' AppSec Survey 2.0: Fine-Tuning an AppSec Training Program Based on Data'''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''John Dickson – Denim Group''' (https://www.linkedin.com/pub/john-b-dickson-cissp/0/149/41a)&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
John Dickson is an internationally recognized security leader, entrepreneur and Principal at Denim Group, Ltd. He has nearly 20 years hands-on experience in intrusion detection, network security and application security in the commercial, public and military sectors. As a Denim Group Principal, he helps executives and Chief Security Officers (CSO’s) of Fortune 500 companies and government organizations launch and expand their critical application security initiatives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Measuring the effectiveness of any security activity is widely discussed – security leaders debate the topic with a religious fervor rivaling that of any other hot button issue. Virtually every organization has some sort of application security training effort, but data on training effectiveness remains scarce. Last year our research team delivered the first-ever survey that captured developer awareness of secure coding concepts and the impact of formal application security training on a developer’s ability to write secure code. We learned that most software developer were aware of certain application security concepts, yet when asked how to write more secure code, they faired poorly. This year’s 600-developer survey provides more quantitative data on what software developers understand about application security, both concepts and practices. It dives most deeply into awareness of defensive coding practices, which most developers largely did not grasp in the 2013 survey. It also is separates respondents by roles, so we can better understand how architects, developers, and QA staff grasp key application security concepts and put them to work. It better captures how software developers learn in general, so one can tailor any security training effort to how software developers, in practice, actually learn. This information will provide data to application security managers responsible for corporate security training that should allow them to make more fact-based decisions about security training.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== OWASP Dublin Chapter 2014 ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP December Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event – David Rook/ Mark Hillick - Riot Games''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 4th December&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30pm &amp;lt;br&amp;gt;Talks Start: 19:00pm &amp;lt;br&amp;gt; Event finishes at 21:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-chapter-meeting-riot-games-tickets-14523051839 register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking throughout,and pizza thanks to Morgan Mckinley&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Leveling up a global application security awareness program'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''David Rook - Riot Games - (http://ie.linkedin.com/pub/david-rook/3/41a/b1b) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
David Rook is a Security Engineer focusing on Application Security at Riot Games in Dublin. David held various application security roles in the financial services industry since 2006 before moving into the computer games industry in early 2014. He has been a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja.&lt;br /&gt;
 &lt;br /&gt;
David strives to practice what he preaches and has backed up his work experience by developing two open source security code review tools called Agnitio and the Windows Phone App Analyser.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The talk will focus on Riot application security awareness and knowledge sharing in a global company. I will talk about the application security awareness efforts we've implemented this year to bring application security knowledge to software engineers worldwide. These awareness efforts were designed to educate and support engineers around the world who work on high profile web properties and one of the worlds most popular computer games.&lt;br /&gt;
&lt;br /&gt;
I will explain how we've used a combination of traditional and innovative approaches to levelling up our software engineers security knowledge.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Slides''' [https://drive.google.com/file/d/0B_v8QOnVBRmxelBjWW4xQURMeWs/view?usp=sharing, David Rook Slides]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' Security and how it affects Users and Rioters '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Mark Hillick Security Dude@Riot Games  '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is a founder of HackEire, a founding member of IrissCert, the first person in Ireland to achieve the GIAC GSE, and has been stoking a passion for security for 14 years.&lt;br /&gt;
 &lt;br /&gt;
Mark leads up the InfoSec team for Riot Games in Europe and is Product Owner of the Security Engineering vertical. Currently he's focused on building a team, engineering cool solutions, levelling the security program, finding the cloud, dealing with DDOS, and trying to earn Silver next year by himself.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The presentation focuses on one of the major security aspects of Android Applications; rooting detection techniques. Many Apps, including (MDM) Mobile Device Management Agents, implements this check in different ways. The aim of the talk is to explore the effectiveness of these checks, with practical examples and explain the impact, in terms of security, of this control being bypassed or not implemented.&lt;br /&gt;
&lt;br /&gt;
A short demo will show the effects of having root permissions on an application when the application thinks you don't.Mark will be discussing his last 18 months at Riot and the increase in attention to security from both a player and Rioter perspective.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Slides''' [https://drive.google.com/file/d/0B_v8QOnVBRmxcGZrRFJycDc2UDQ/view?usp=sharing, Mark Hillick Slides]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP August Event===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event – Mobile Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Saturday 30th August&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 09:30am &amp;lt;br&amp;gt;Talks Start: 10:00am &amp;lt;br&amp;gt; Event finishes at 6:00pm&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.com/e/owasp-mobile-security-day-30th-august-tickets-12685176705 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking throughout,and pizza thanks to BCC Risk Advisory (http://www.bccriskadvisory.com/) /edgescan (https://www.edgescan.com/)&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''“Waving not Drowning” – Secure Mobile Development.'''&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Eoin Keary - BCC Risk Advisory - (http://ie.linkedin.com/in/eoinkeary) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP board member since 2009. Elected to position of global Vice Chair, September 2011. A long-time member of OWASP. Based in Dublin and director of BCC Risk Advisory Ltd. Eoin Keary has been with OWASP since 2004. He is based in Ireland and runs a software security practice, bccriskadvisory.com. He is currently on the global board of the OWASP foundation, he was elected to the board in 2009. During this time Eoin assisted in founding the OWASP legal entity in Europe and has helped provide structure to OWASPs finances and strategy.&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this talk Eoin shall discuss aspects of securing mobile apps from a source code standpoint. He shall discuss common pitfalls and associated with developing secure applications, why such issues are important and discuss “war stories” relating to  real-world mobile app [in]security.&lt;br /&gt;
&lt;br /&gt;
This talk is suited to anyone involved in developing, managing development or testing mobile applications for security and robustness.&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' Android rooting detection: how and why? '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Giuliano Fasto – Espion – (http://uk.linkedin.com/in/giulianofasto) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Giuliano Fasto is a Security Consultant with more than six years of experience in the IT Security field.  He has worked as a Security Consultant and Penetration Tester for well-respected security companies in Italy, the UK and Ireland.  His academic background includes a BSc in IT Security and an MSc in Information Security and Audit. While he has a wide-ranging experience in penetration testing various systems and technologies, in recent years he has specialised in mobile application security testing, particularly on Android and iOS platforms.  He is currently the lead mobile application tester at Espion.&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The presentation focuses on one of the major security aspects of Android Applications; rooting detection techniques. Many Apps, including (MDM) Mobile Device Management Agents, implements this check in different ways. The aim of the talk is to explore the effectiveness of these checks, with practical examples and explain the impact, in terms of security, of this control being bypassed or not implemented.&lt;br /&gt;
&lt;br /&gt;
A short demo will show the effects of having root permissions on an application when the application thinks you don't.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' Bazuc - A talk about new types of attacks and vulnerabilities being exploited  '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Cathal McDaid – AdaptiveMobile - (http://ie.linkedin.com/pub/cathal-mc-daid/3/5b2/b77) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Cathal Mc Daid is Head of Data intelligence &amp;amp; Analytics in Adaptivemobile, and is responsible for a team dedicated to analysing and uncovering new threats to mobile operators and subscribers, using advanced ‘big data’ techniques. Cathal has 14 years experience in telecoms and wireless. Currently he is also Chairman of the GSMA’s Mobile Malware Group - who coordinates the world's response to mobile malware. His academic background includes a BEng in Computer Engineering from UL and an Executive MBA from INSEAD.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Recent discussions and news about mobile malware primarily talk about new types of attacks and vulnerabilities being exploited. However what do you do when a user knowingly infects his handset for monetary gain?. In this presentation we will discuss a new type of mobile bad-ware, that promised and delivered the user money, in exchange for the renting out of his mobile device for unknown purposes. We discuss the app profile, tactics and impacts - on the users, on the network and on the stock market. &amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:AMS OWASP.pdf|200px|thumb|left|Cathal McDaid - AdaptiveMobile - AMS OWASP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''' OWASP Security Shepherd project '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Mark denihan &amp;amp; Sean Duggan IBM (http://ie.linkedin.com/in/markdenihan , http://ie.linkedin.com/in/seankduggan ) '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mark is currently working on the IBM Ethical Hacking Team, the OWASP Dublin Board and founded of the OWASP Security Shepherd Project. He got his MSc in Information Security and Digital Forensics in the ITB and a BSc in Computing in the DIT. He also suffers from a love of caffeine and deep paranoia thanks to his extreme security enthusiasm.&lt;br /&gt;
&lt;br /&gt;
Sean has a BSc Computing from Dublin Institute of Technology, currently working in IBM with a passion for Android App Security and Development. He developed an interest in Mobile Application Security after reading about the OWASP Mobile Top Ten Risks in 2012 and has since been keeping up to date with Mobile App Issues. Sean leads the development of the mobile components in the OWASP Security Shepherd project.&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skill¬set demographic.&lt;br /&gt;
&lt;br /&gt;
Security Shepherd covers the OWASP Top Ten web app risks and has recently been injected with totally new content to cover the OWASP Top Ten Mobile risks as well. Many of these levels include insufficient mitigations and protections to these risks, such as blacklist filters, atrocious encoding schemes, barbaric security mechanisms and poor security configuration. &lt;br /&gt;
&lt;br /&gt;
The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well. We're going to speak about the platform itself and what it offers someone wishing to teach or learn about mobile and web application security, such as the project’s anti plagiarism mechanisms or it’s flexible approach in presenting its users with lessons and resources.&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' CTF'''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CTF Using the above OWASP Security Shepherd project. &amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
''Please bring a laptop with Zed Attack Proxy/ Burp installed''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Format for the day will be '''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
9:30-10.00 -- Registration/ Networking&amp;lt;BR&amp;gt;&lt;br /&gt;
10:00-11:00 -- Speaker 1 50-55mins Talk&amp;lt;BR&amp;gt; &lt;br /&gt;
11:00-12:00 --Speaker 2 50-55mins Talk &amp;lt;BR&amp;gt;&lt;br /&gt;
12:00-1:00 --  Speaker 3 50-55mins Talk &amp;lt;BR&amp;gt;&lt;br /&gt;
1:00-1:50 --Lunch &amp;lt;BR&amp;gt;&lt;br /&gt;
2:00-6:00 -- Mobile Shepherd talk leading into CTF. '''Please bring a laptop with Zed Attack Proxy/ Burp installed''' &amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
Any questions please contact me on '''owen.pendlebury(at)owasp.org'''&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
-- &lt;br /&gt;
Owen Pendlebury&amp;lt;BR&amp;gt;&lt;br /&gt;
OWASP Ireland-Dublin Chapter Lead&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event (2)===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Matt Johansen Sr. Manager for the Threat Research Center at WhiteHat Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 22nd May&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-may-tickets-11644682559 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to WhiteHat Security - https://www.whitehatsec.com/ &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''*&amp;quot;Top 10 Web Hacks of 2013&amp;quot;*'''&lt;br /&gt;
&lt;br /&gt;
'''Matt Johansen Sr. Manager for the Threat Research Center at WhiteHat Security'''&lt;br /&gt;
&lt;br /&gt;
Matt Johansen is a Sr. Manager for the Threat Research Center at WhiteHat Security where he manages a team of Application Security Specialists, Engineers and Supervisors to prevent website security attacks and protect companies' and their customers' data. Before this he was an Application Security Engineer where he oversaw and assessed more than 35,000 web applications that WhiteHat has under contract for many Fortune 500 companies across a range of technologies.&lt;br /&gt;
 &lt;br /&gt;
He was previously a security consultant for VerSprite, where he was responsible for performing network and web application penetration tests. Mr. Johansen is also an instructor of Web Application Security at Adelphi University, where he received his Bachelor of Science in Computer Science, and San Jose State University. He has also been utilized by the SANS Institute as an industry expert for certification review.&lt;br /&gt;
 &lt;br /&gt;
List of past talks including videos/slides - http://mattjay.github.io/talks/ (BlackHat, DEFCON, RSA, SXSW, Many BSides, etc.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Every year the security community produces a stunning number of new Web hacking techniques that are published in various white papers, blog posts, magazine articles, mailing list emails, conference presentations, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and their mobile platform equivalents. Beyond individual vulnerabilities with CVE numbers or system compromises, we are solely focused on new and creative methods of Web-based attack. Now in its eighth year, the Top 10 Web Hacking Techniques list encourages information sharing, provides a centralized knowledge base, and recognizes researchers who contribute excellent work.&lt;br /&gt;
 &lt;br /&gt;
In this talk, We will do a technical deep dive and take you through the Top 10 Web Hacks of 2013 as picked by an expert panel of judges.&lt;br /&gt;
 &lt;br /&gt;
This year’s winners are:&lt;br /&gt;
&lt;br /&gt;
1 - Mario Heiderich – Mutation XSS&amp;lt;br&amp;gt;&lt;br /&gt;
2 - Angelo Prado, Neal Harris, Yoel Gluck – BREACH&amp;lt;br&amp;gt;&lt;br /&gt;
3 - Pixel Perfect Timing Attacks with HTML5&amp;lt;br&amp;gt;&lt;br /&gt;
4 - Lucky 13 Attack&amp;lt;br&amp;gt;&lt;br /&gt;
5 - Weaknesses in RC4&amp;lt;br&amp;gt;&lt;br /&gt;
6 - Timur Yunusov and Alexey Osipov – XML Out of Band Data Retrieval&amp;lt;br&amp;gt;&lt;br /&gt;
7 - Million Browser Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
8 - Large Scale Detection of DOM based XSS&amp;lt;br&amp;gt;&lt;br /&gt;
9 - Tor Hidden-Service Passive De-Cloaking&amp;lt;br&amp;gt;&lt;br /&gt;
10 - HTML5 Hard Disk Filler™ API&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Top10WebHacksOf2013FINAL.pptx|200px|thumb|left|Matt Johansen Sr. Manager for the Threat Research Center at WhiteHat Security]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event (1)===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Eoin Kearyof BCC Risk Advisory and Matej Saksida of Realex''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 1st May&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-may-tickets-11354041243 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to BCC Risk Advisory (http://www.bccriskadvisory.com/) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: *&amp;quot;Top 10 defensive Java developer controls&amp;quot;*'''&lt;br /&gt;
&lt;br /&gt;
'''Eoin Keary - BCC Risk Advisory - (http://ie.linkedin.com/in/eoinkeary)'''&lt;br /&gt;
&lt;br /&gt;
OWASP board member since 2009. Elected to position of global Vice Chair, September 2011. A long time member of OWASP. Based in Dublin and director of BCC Risk Advisory Ltd.&lt;br /&gt;
Eoin Keary has been with OWASP since 2004. He is based in Ireland and runs a software security practice, bccriskadvisory.com. He is currently on the global board of the OWASP foundation, he was elected to the board in 2009. During this time Eoin assisted in founding the OWASP legal entity in Europe and has helped provide structure to OWASPs finances and strategy. &lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
In this talk Eoin shall go through a list of developer controls in order to help prevent common security vulnerabilities such those focused in the&lt;br /&gt;
OWASP Top 10 2013. From input validation to contextual output encoding to crypto-secure storage, Eoin shall call out what developers can do to help&lt;br /&gt;
mitigate such issues. Many of the mitigations are simple and use established API's such that developer need not be security experts and just&lt;br /&gt;
use core components to help improve their security posture.&lt;br /&gt;
&lt;br /&gt;
[[File:Top_Ten_Java_Defenses.pdf|200px|thumb|left|Eoin Keary BCC Risk Advisory talk]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Talk 2: *&amp;quot;Social Engineering - The Art of Human Hacking&amp;quot;.*'''&lt;br /&gt;
&lt;br /&gt;
'''Matej Saksida - Realex Payments - (http://ie.linkedin.com/pub/matej-saksida-cism/20/412/176)'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Nowadays if you want to hack a corporation or damage a personal &amp;quot;enemy&amp;quot; fast, Social Engineering techniques work every time and more often than not&lt;br /&gt;
it works the first time. In this talk Matej shall go through what is social engineering is, types of social engineering and related threats.&lt;br /&gt;
Matej shall call out practical example how to use Facebook to ruin someone's life and what countermeasures can be used against social engineering attacks.&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation_Social_Engineering.pdf|200px|thumb|left|Matej Saksida Realex talk]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP March Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Rahim Jina of BCC Risk Advisory and Stephen Scott of Espion''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 13th March&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-tickets-10802455435 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to Espion (http://www.espiongroup.com/)&lt;br /&gt;
&lt;br /&gt;
Talk 1: Building a shield of security - Vulnerability Management by the numbers and dumb robots!&lt;br /&gt;
&lt;br /&gt;
Rahim Jina - BCC Risk Advisory&lt;br /&gt;
&lt;br /&gt;
Rahim has been an active member of OWASP since 2008 and has contributed to many projects such as the OWASP Security Code Review Guide and is an ex-board member of the Irish Chapter. Previously Rahim was a senior security consultant at a “big 4” professional services firm and more recently, the head of security for Fonality Inc, a VoIP service provider based in Los Angeles. Rahim is currently a director for BCC Risk Advisory (bccriskadvisory.com), based in Dublin, Ireland. He is also responsible for the security architecture of the edgescan.comvulnerability management solution.&lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
This presentation discusses how builders, breakers and defenders should look at vulnerability management when attempting to keep hackers at bay. We discuss the most common vulnerabilities which are not detected by security tools nor automation but nevertheless are common and can be used to commit real fraud resulting in financial loss. We will see that Web Application Firewalls are ineffective against such attacks and why the only practical solution is to apply a layered approach across all aspects of the SDLC.&lt;br /&gt;
&lt;br /&gt;
 [[File:BCC_Risk_Advisory_-_OWASP_Dublin_-_Vulnerability_Management_by_the_numbers_and_dumb_robots!.pdf|200px|thumb|left|Rahim BCC Risk Advisory talk]]&lt;br /&gt;
&lt;br /&gt;
Talk 2: &amp;quot;PCI's Changing Environment - What You Need to Know &amp;amp; Why You Need To Know It&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Stephen Scott - Senior Consultant and PCI QSA in Espion's Information Government practice&lt;br /&gt;
&lt;br /&gt;
Stephen Scott, Consultancy Team lead in Espion, is an experienced information security, risk and compliance consultant whose experience spans across many different areas including, PCI DSS, information security, risk management, group internal audit, IT service management and regulatory compliance. Stephen has extensive experience with information security, internal control testing, compliance programmes, information risk management, and process improvement. Stephen has worked across a wide range of industry verticals, including financial, industrial and insurance.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
PCI DSS – The Payment Card Industry Data Security Standard sets common requirements for securing payment card information (credit, debit, some gift cards), and lays out a range of controls relating to auditing, scanning and assessment.&lt;br /&gt;
&lt;br /&gt;
This presentation discusses the ever evolving PCI environment, specifically focusing on the changes in the recent release of version 3 of the PCI DSS standard.  Stephen will start off by giving a brief background to PCI, including motivators for merchant and service providers to adhere to the standard.  In addition to this, the presentation will highlight what security considerations are relevant to application and information security practitioners.&lt;br /&gt;
&lt;br /&gt;
[[File:PCIs_Changing_Environment_-_What_You_Need_to_Know_&amp;amp;_Why_You_Need_To_Know_It..ppt|200px|thumb|left|Stephen Espion Talk]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2013 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP July Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Jeremiah Grossman - Another Year in Web Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 4th July&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 17:30 &amp;lt;br&amp;gt;Talk: 18:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.eventbrite.com/event/7127672059 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Jeremiah Grossman of WhiteHat Security will be in Dublin and will be talking at our next chapter event. His talk &amp;quot;Another Year In Web Security: What did 2012 teach us about survival in the coming years?&amp;quot; promises a great insight into the future of web security.&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, founder and CTO of WhiteHat Security, is a world-renowned expert in web application security and a founding member of the Web Application Security Consortium (WASC). At WhiteHat, Mr. Grossman is responsible for web application security R&amp;amp;D and industry evangelism. He is a frequent speaker at industry events including the BlackHat Briefings, ISACA's Networks Security Conference, NASA, ISSA and Defcon. &lt;br /&gt;
&lt;br /&gt;
A trusted media resource, Mr. Grossman has been featured in USA Today, the Washington Post, Information Week, NBC Nightly News, and many others. Mr. Grossman is also a featured expert and frequent contributor on TechTarget'sSearchAppSecurity.com.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP June Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training. [https://www.owasp.org/index.php/EUTour2013#Training Info about the training session])'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference. [https://www.owasp.org/index.php/EUTour2013#Dublin Info and registration link for the conference])''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event ===&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''TRAINING &amp;amp; TALKS''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Dublin - Realex Payments Application Security Workshop''' == &lt;br /&gt;
'''Thursday 30th May'''&amp;lt;br&amp;gt; ''('''Training'''. 1:30pm- 5:00pm)'' &amp;lt;br&amp;gt;('''Talks'''. 6:00pm - 8:00pm)''&amp;lt;br&amp;gt;[http://www.eventbrite.com/event/6665658163/eorg Click here for more information]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Training'''&lt;br /&gt;
&lt;br /&gt;
Eoin Keary will be delivering free application security training between 2pm and 5pm on the 30th May. Eoin was the founder of OWASP Ireland and is currently the global vice chair for OWASP (amongst many other things!  https://www.owasp.org/index.php/Eoin_Keary). He has delivered application security training to many developers and security professionals around the world and recently delivered a training course to over 400 people at the RSA Conference.&lt;br /&gt;
&lt;br /&gt;
The training will focus on secure application development and why we can't hack ourselves secure. It will be covering why penetration testing on its own does not work approaches to improvement including &amp;quot;knowing what you don't know&amp;quot; and how to measure change.&lt;br /&gt;
&lt;br /&gt;
It will be technical training covering XSS eradication, client side security and browser DOM curiosities.&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
The talks will be starting at 6pm in our office and OWASP have arranged two very interesting talks! Diarmaid McManus https://twitter.com/elephant_rb from Realex Payments will be expanding his award winning SecurityBSides London Rookie Track talk https://www.securityninja.co.uk/application-security/securitybsides-london-esp-security-plugin/ to include more details about static analysis approaches and his research and development work on ESP: Security Plugin https://github.com/diarmaid-mcmanus/ESPSecurityPlugin.&lt;br /&gt;
&lt;br /&gt;
Hugh Pearse https://twitter.com/hughpearse will be talking about Low Level Exploits and this looks like it will be a great talk:&lt;br /&gt;
&lt;br /&gt;
“In 2010 Mr Haroon Meer from thinkst.com presented a timeline of memory corruption vulnerabilities and their mitigation techniques dating from 1985 to 2010. In his 35 page publication he referenced almost 150 events in low level information security history. The scope of the presentation &amp;quot;Low Level Exploits&amp;quot; is to explain in detail some of the most significant attacks in from Haroon Meers research. The attacks covered in this presentation include buffer overflows on the stack, heap overflows, integer overflows, format strings, null pointers and ROP chains. This brings us to exploits in the present day where researchers are looking for the successor of the buffer overflow attack, next big exploit.”&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2011 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== [[Ireland/Training/OWASP projects and resources you can use TODAY]] ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp logo Ireland Training 11 March 2010.gif]]&lt;br /&gt;
&lt;br /&gt;
*'''Overview &amp;amp; Goal'''&lt;br /&gt;
**Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle. &lt;br /&gt;
**This course aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them. &lt;br /&gt;
**The course will be very practical where demonstration and hands-on exercises will be provided for the tools covered. &lt;br /&gt;
**If you are interested in participating in the hands on portion of the course, please bring a laptop. &lt;br /&gt;
*'''Dates'''&lt;br /&gt;
**March, 2011, 11&lt;br /&gt;
*'''Course Main Content and Registration'''&lt;br /&gt;
**[[Ireland/Training/OWASP projects and resources you can use TODAY|Click here]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dublin2010.gif]]&lt;br /&gt;
&lt;br /&gt;
Click [[OWASP IRELAND 2010]] for more information &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010 Agenda  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== AUG 2010  ====&lt;br /&gt;
== OWASP August Event ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 11/8/2010 6:00pm - 8:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' OWASP ESAPI Swingset: Introduction &amp;amp; Demo by Cathal Courtney&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The ESAPI Swingset is a web application which demonstrates common security vulnerabilities and asks users to secure the application against these vulnerabilities using the ESAPI library. The application is intended for Java Developers. The goal of the application is to teach developers about the functionality of the ESAPI library and give users a practical understanding of how it can be used to protect web applications against common security vulnerabilities. During the talk, Cathal will demonstrate how to install and use ESAPI Swingset in your organization. A copy of the latest version will be also provided to the attendees.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Cathal is an experienced developer working at AIB and is currently the ESAPI Swingset project leader. More information about this project could be found here: [http://www.owasp.org/index.php/ESAPI_Swingset Esapi SwingSet]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' Not available&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' Security Implications for Web Applications based on SOA by John Marmelstein&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The main point of SOA (in this context) is combining systems and applications to make new applications, or a big 'overall' application.This higher inter-operability does (by default) lower security. For a start, a request originating from a web user might end up at several back end systems, which do not know who or what the request came from.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each back end system might have no access to the customer data, have a different security models, and serve serveral front end. Each of the above systems could be under different ownership, thus the owners have different concerns and priorities. Also, the basic solution at a technical level include single sign on, or security as a service. This can be costly, give limited coverage and have a performance hit. But is pretty much the only way to do it. The other thing to do (probably in tandem) is strict management, and delegation of authority.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John has about 13 years in IT. Most of this in distributed systems and 'Middleware' integration software. Including BEA (now owned by Oracle). Mainly working on Enterprise Java and more recently on Microsoft BizTalk. Various industries, incuding financials, public services, and a fish farm.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== SEP 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND 2010  ==&lt;br /&gt;
&lt;br /&gt;
Due to popular demand we are hosting the 2nd OWASP IRELAND event, '''OWASP Ireland 2010'''. &amp;lt;br&amp;gt;Continuing last years highly successful conference, with more than 150 attendees from across the globe OWASP is happy to repeat this positive experience. &amp;lt;br&amp;gt;Delegates from numerous industry verticals attended the 2009 event; from government to finance to telecoms. Share your thoughts at this open event with some of the most experienced individuals in the information security industry. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_IRELAND_2010 [[Image:Dublin2010.gif]]]&amp;lt;br&amp;gt;[[OWASP_IRELAND_2010]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' '''September 17th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Trinity College Dublin, The Hamilton Building &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [[Eoin Keary|Eoin Keary]]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Subscribe to the OWASP Ireland [https://lists.owasp.org/mailman/listinfo/owasp-ireland mail list] for the up-to-date information.''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OCT 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== NOV 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== DEC 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== 2010 Chapter Plan  ====&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Educational Outreach&amp;lt;br&amp;gt;Summary: Drive education awareness of OWASP among Irish Universities and Third Level Institutions. &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Fabio Cerullo &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Industry Outreach&amp;lt;br&amp;gt;Summary: Raise awareness of OWASP among Irish industry.&amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Eoin Keary&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Membership Drive &amp;lt;br&amp;gt;Summary: Increase local chapter members individuals and corporate supporters &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Project Participants: Rahim Jina&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Hands-On Training&amp;lt;br&amp;gt;Summary: Provide 1-day, 3-day and 5-day hands-on classroom / online training classes&amp;lt;br&amp;gt;Next Milestone: Organize Training Offerings&amp;lt;br&amp;gt;Project Participants: Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Call For Presentations for 2010 is now open - please contact fcerullo(@)owasp.org / +353877817468 if you would like to speak or can host a meeting. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;*Note meeting hosts are provided with annual chapter sponsorship and free seats in training classes. The OWASP Foundation, Ireland chapter focuses on implementation of efforts defined by the [http://www.owasp.org/index.php/Global_Committee_Pages Global Committee] as well as new concepts and ideas defined locally. Below are a list of ACTIVE projects assigned to individual active members and teams within the local chapter. If you would like to help out on ANY of these efforts, contact them directly to get involved &lt;br /&gt;
&lt;br /&gt;
==== FEB 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Event - What is the O2 Platform?  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 19/2/2010 3:00pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP O2 Platform - Open Platform for automating application security knowledge and workflows &amp;lt;br&amp;gt;'''Abstract:''' In this talk Dinis Cruz will show the OWASP O2 Platform which is an open source toolkit specifically designed for developers and security consultants to be able to perform quick, effective and thorough 'source-code-driven' application security reviews. The OWASP O2 Platform (http://www.owasp.org/index.php/OWASP_O2_Platform) consumes results from the scanning engines from Ounce Labs, Microsoft's CAT.NET tool, FindBugs, CodeCrawler and AppScan DE, and also provides limited support for Fortify and OWASP WebScarab dumps. In the past, there has been a very healthy skepticism on the usability of Source Code analysis engines to find commonly found vulnerablities in real world applications. This presentation will show that with some creative and powerful tools, it IS possible to use O2 to discover those issues. This presentation will also show O2's advanced support for Struts and Spring MVC. &lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development. For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences. At OWASP, Dinis is the leader of the [[OWASP O2 Platform]] project, member of the OWASP [[Global Projects Committee]], chair of the [[OWASP Connections Committee]] and member of the [[About The Open Web Application Security Project#Global_Board_Members|OWASP Board]]. &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' http://www.o2-ounceopen.com/files-binaries-source-and-demo/old-documents-and-presentations/OWASP_O2_Platform_-_AppSec_Ireland_Sep_2009.pdf &lt;br /&gt;
&lt;br /&gt;
== IISF/OWASP – February Chapter Meeting  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 25/2/2010 2:00pm - 4:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Georgian Suite, Buswells Hotel, Molesworth St., Dublin 2 &lt;br /&gt;
&lt;br /&gt;
'''Title:''' An overview of Web Application Security threats and technologies. Practical advice and techniques for improving Application Security, presented by OWASP. &lt;br /&gt;
&lt;br /&gt;
2:00 - Introduction by IISF Chairman &lt;br /&gt;
&lt;br /&gt;
2:05 - Presentation&amp;amp;nbsp;: “Practical advice for improving Application Security” - Introduction to OWASP and OWASP Top Ten - Demonstration video of typical web based attacks with high level explanation - Live SQL injection demo using WebGoat &amp;amp;amp; WebScarab - Live Cross Site Scripting demo using WebGoat &amp;amp;amp; WebScarab &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part1.ppt]] &lt;br /&gt;
&lt;br /&gt;
3:00 - Coffee &lt;br /&gt;
&lt;br /&gt;
3:20 – Presentation continues - Application Security: &amp;quot;The problems we are faced with&amp;quot; - The Application Security Verification Standard - SDLC &amp;amp;amp; Security Assurance Maturity Model - Code Review versus traditional Runtime Testing. - Q&amp;amp;amp;A &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part2.pptx]] &lt;br /&gt;
&lt;br /&gt;
4:00 - Close of Meeting &lt;br /&gt;
&lt;br /&gt;
4:05 - Traditional networking in Buswells Bar &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP - 26/3/2010  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== APR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Live CD - An open environment for Web Application Security  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 16/4/2010 2:30pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP Live CD - An open environment for Web Application Security &amp;lt;br&amp;gt;'''Abstract:''' This CD collects some of the best open source security projects in a single environment. Web developers, testers and security professionals can boot from this Live CD and have access to a full security testing suite. This presentation aims to provide a showcase for the great OWASP tools and documentation materials available in the CD, tips and tricks, and also some introductory stuff regarding code review and penetration testing. &amp;lt;br&amp;gt;Training is aimed at introductory /intermediate level in terms of pen testing, code review and tools. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Rahim Jina''' &amp;lt;br&amp;gt;Rahim Jina currently works as a senior consultant for Ernst &amp;amp;amp; Young's Risk Advisory Services in Dublin. He has worked there for nearly four years primarily delivering penetration testing services to clients globally, focusing on web applications and secure code review. He has been involved with OWASP for the past two years, being involved in the Summer of Code 2008 as lead reviewer for the Code Review Guide 2009. He has also made contributions to the SAMM project (OpenSAMM). He holds an MSC in Security and Forensic Computing from DCU and a degree in computer science from Trinity college. &amp;lt;br&amp;gt;'''Eoin Keary''' &amp;lt;br&amp;gt;Eoin is a long time member of OWASP and have contributed year on year to OWASP projects and the OWASP mission of fighting the causes of software insecurity. He is based in Dublin, Ireland and run the Ernst &amp;amp;amp; Young application security team across Europe. His OWASP contributions to date include the OWASP Code Review Guide, OWASP Testing Guide, OWASP SAMM, and OWASP ASVS. He is a member of the OWASP Global Industry Committee, chair of the OWASP Conferences Committee and member of the OWASP Global Board. Eoin founded the OWASP Ireland chapter back in 2004 and currently serves as Vice President of the OWASP Ireland Board. &lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/d/db/P1040923_1024.JPG [[Image:|P1040923_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/d/db/P1040923_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/f/f3/P1040927_1024.JPG [[Image:|P1040927_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/f/f3/P1040927_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/6/64/P1040929_1024.JPG [[Image:|P1040929_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/6/64/P1040929_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
'''Download Presentation:''' [http://www.owasp.org/images/e/ee/OWASP_Live_CD.pptx [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After OWASP Live CD training &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAY 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Trials &amp;amp;amp; Tribulations of WAF Implementation  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Trials &amp;amp;amp; Tribulations of WAF Implementation&amp;lt;br&amp;gt;'''Abstract:''' A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.&amp;lt;br&amp;gt;Mark will be presenting on his experience in implementing a Web Application Firewall solution through all phases from research to implementation. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Mark Hillick - Application Networking Team, Citrix Systems''' &amp;lt;br&amp;gt;Mark Hillick has 10 years experience in relation to Internet, networking, systems administration and security engineering. &lt;br /&gt;
&lt;br /&gt;
Mark graduated from Queen's University, where he studied Mathematics. &lt;br /&gt;
&lt;br /&gt;
Mark joined AIB from Queen's where he joined the Internet Infrastructure team, where he was responsible for designing, building and securing the Internet service in and out of AIB. He is a prominent member of the IT Security community in Ireland and has presented at several local security forums such as IISF and Owasp. Mark is one of the founding members of IRISS CERT, where he is also a Volunteer Incident Handler. He helped organise IRISSCon 2009, where he also designed and built HackEire 2009, the first Ethical Hacking 'Capture The Flag' contest in Ireland.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[Image:20052010017.jpg|thumb|A caption from Mark's talk]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [http://docs.google.com/fileview?id=0B3vrVYEosFeEZDMyZjIzYTktMzNkZC00ZjBlLWFiYTgtNThjZGE4YTE1NmFj [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After WAF presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUN 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Define Security Requirements - A practical approach  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Define Security Requirements - A practical approach&amp;lt;br&amp;gt;'''Abstract:''' The Data Protection Act states that &amp;quot;appropriate security measures&amp;quot; must be taken to protect personal data. How do you specify the appropriate security measures for a website which processes personal data? It is an important step in a development project, but is often neglected. In this talk, Alexis will descibe his own experiences of assessing web application, and will also look in more detail at what the Data Protection Commissioner says. He will then take a fictional website and look at a practical approach to specifying the security requirements that the fictional application should meet. This will use the kind of risk-based techniques outlined by OWASP or the Microsoft Secure Development Lifecycle (SDL). Issues discussed will include encryption, authentication, access control, audit, etc. The result will be a list of security requirements that can be carried into the design and development phases. Attendees should be able to apply the ideas to their own development projects. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Alexis Fitzgerald - Rits Information Security Group''' &amp;lt;br&amp;gt;For the last six years Alexis has worked for Rits Information Security Group, where he performs application penetration testing assignments as well as advising clients on application security issues. Before that, he spent many years as a developer (mainly in the financial sector), and he continues to be involved in development. Alexis holds an MSc in Information Security from the University of London, Royal Holloway.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:OWASP Ireland June10.pdf]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After Alexis presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUL 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Ireland]]&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=183168</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=183168"/>
				<updated>2014-10-01T15:28:34Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
'''Credits:&lt;br /&gt;
The following has been donated by Jim Manico and Eoin Keary and their respective companies''' &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]], [[user:MichaelCoates | Michael Coates]]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/f/fb/Secure_Storage_-_3.pptx Secure Storage]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/cf/Injection-4.pptx Injection]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/e/e7/XSS_-_5.pptx XSS]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/9/9d/ClickJacking_-_6.pptx UI Redress]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/8/8e/Risks_of_Insecure_Communication_-7.pptx SSL-TLS]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/6/6e/Virtual_Patching_-8.pptx Virtual Patching / WAF]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/a/a8/Web_App_Access_-_9.pptx Access Control]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_Forward&amp;diff=181938</id>
		<title>CRV2 Forward</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_Forward&amp;diff=181938"/>
				<updated>2014-09-08T10:29:36Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The OWASP Code Review Guide:'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Code Review guide is the result of initially contributing and leading the Testing Guide. Initially, it was thought to place Code review and testing into the same guide; it seemed like a good idea at the time. But the topic called security code review got too big and evolved into its own stand-alone guide.&lt;br /&gt;
 &lt;br /&gt;
The Code Review guide was started in 2006 by [https://www.owasp.org/index.php/Eoin_Keary Eoin Keary]. &lt;br /&gt;
This current version was started in April 2013 via the OWASP Project Reboot initiative.&lt;br /&gt;
&lt;br /&gt;
The [[OWASP Code Review team]] consists of a small, but talented, group of volunteers who should really get out more often.&lt;br /&gt;
 &lt;br /&gt;
It is common knowledge that more secure software can be produced and developed in a more cost effective way when bugs are detected early on in the systems development life-cycle. Organizations with a proper code review functions integrated into the software development life-cycle (SDLC) produced remarkably better code from a security standpoint. Simply put &amp;quot;We can't hack ourselves secure&amp;quot;. Attackers have more time to fine vulnerabilities on a system than the time allocated to a defender. Hacking our way secure amounts to a uneven battlefield; Asymmetric warfare, a loosing battle.&lt;br /&gt;
&lt;br /&gt;
By necessity, this guide does not cover all languages; it mainly focuses on .NET and Java, but has a little C/C++ and PHP thrown in also. However, the techniques advocated in the book can be easily adapted to almost any code environment. Fortunately, the security flaws in web applications are remarkably consistent across programming languages.&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=174348</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=174348"/>
				<updated>2014-05-06T11:02:35Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
'''Credits:&lt;br /&gt;
The following has been donated by Jim Manico and Eoin Keary and their respective companies''' &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/f/fb/Secure_Storage_-_3.pptx Secure Storage]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/cf/Injection-4.pptx Injection]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/e/e7/XSS_-_5.pptx XSS]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/9/9d/ClickJacking_-_6.pptx UI Redress]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/8/8e/Risks_of_Insecure_Communication_-7.pptx SSL-TLS]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/6/6e/Virtual_Patching_-8.pptx Virtual Patching / WAF]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/a/a8/Web_App_Access_-_9.pptx Access Control]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=172109</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=172109"/>
				<updated>2014-04-09T13:50:12Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/f/fb/Secure_Storage_-_3.pptx Secure Storage]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/cf/Injection-4.pptx Injection]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/e/e7/XSS_-_5.pptx XSS]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/9/9d/ClickJacking_-_6.pptx UI Redress]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/8/8e/Risks_of_Insecure_Communication_-7.pptx SSL-TLS]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/6/6e/Virtual_Patching_-8.pptx Virtual Patching / WAF]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/a/a8/Web_App_Access_-_9.pptx Access Control]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Web_App_Access_-_9.pptx&amp;diff=172108</id>
		<title>File:Web App Access - 9.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Web_App_Access_-_9.pptx&amp;diff=172108"/>
				<updated>2014-04-09T13:46:34Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: EoinKeary uploaded a new version of &amp;amp;quot;File:Web App Access - 9.pptx&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Web_App_Access_-_9.pptx&amp;diff=172107</id>
		<title>File:Web App Access - 9.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Web_App_Access_-_9.pptx&amp;diff=172107"/>
				<updated>2014-04-09T13:46:00Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=172106</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=172106"/>
				<updated>2014-04-09T13:44:54Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/f/fb/Secure_Storage_-_3.pptx Secure Storage]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/cf/Injection-4.pptx Injection]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/e/e7/XSS_-_5.pptx XSS]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/9/9d/ClickJacking_-_6.pptx UI Redress]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/8/8e/Risks_of_Insecure_Communication_-7.pptx SSL-TLS]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/6/6e/Virtual_Patching_-8.pptx Virtual Patching / WAF]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Virtual_Patching_-8.pptx&amp;diff=172105</id>
		<title>File:Virtual Patching -8.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Virtual_Patching_-8.pptx&amp;diff=172105"/>
				<updated>2014-04-09T13:43:37Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=172104</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=172104"/>
				<updated>2014-04-09T13:42:05Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/f/fb/Secure_Storage_-_3.pptx Secure Storage]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/cf/Injection-4.pptx Injection]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/e/e7/XSS_-_5.pptx XSS]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/9/9d/ClickJacking_-_6.pptx UI Redress]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/8/8e/Risks_of_Insecure_Communication_-7.pptx SSL-TLS]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Risks_of_Insecure_Communication_-7.pptx&amp;diff=172102</id>
		<title>File:Risks of Insecure Communication -7.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Risks_of_Insecure_Communication_-7.pptx&amp;diff=172102"/>
				<updated>2014-04-09T13:40:39Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=172099</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=172099"/>
				<updated>2014-04-09T13:38:40Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/f/fb/Secure_Storage_-_3.pptx Secure Storage]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/cf/Injection-4.pptx Injection]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/e/e7/XSS_-_5.pptx XSS]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/9/9d/ClickJacking_-_6.pptx UI Redress]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:ClickJacking_-_6.pptx&amp;diff=172097</id>
		<title>File:ClickJacking - 6.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:ClickJacking_-_6.pptx&amp;diff=172097"/>
				<updated>2014-04-09T13:37:34Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=172096</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=172096"/>
				<updated>2014-04-09T13:35:12Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/f/fb/Secure_Storage_-_3.pptx Secure Storage]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/cf/Injection-4.pptx Injection]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/e/e7/XSS_-_5.pptx XSS]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:XSS_-_5.pptx&amp;diff=172095</id>
		<title>File:XSS - 5.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:XSS_-_5.pptx&amp;diff=172095"/>
				<updated>2014-04-09T13:32:30Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171799</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171799"/>
				<updated>2014-04-07T12:27:49Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/f/fb/Secure_Storage_-_3.pptx Secure Storage]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/cf/Injection-4.pptx XSS and Injection]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Injection-4.pptx&amp;diff=171798</id>
		<title>File:Injection-4.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Injection-4.pptx&amp;diff=171798"/>
				<updated>2014-04-07T12:27:03Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171797</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171797"/>
				<updated>2014-04-07T12:26:04Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/f/fb/Secure_Storage_-_3.pptx Secure Storage]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Secure_Storage_-_3.pptx&amp;diff=171796</id>
		<title>File:Secure Storage - 3.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Secure_Storage_-_3.pptx&amp;diff=171796"/>
				<updated>2014-04-07T12:24:56Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171795</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171795"/>
				<updated>2014-04-07T11:55:07Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |1000+&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:HTTP_Basics_-_2.pptx&amp;diff=171794</id>
		<title>File:HTTP Basics - 2.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:HTTP_Basics_-_2.pptx&amp;diff=171794"/>
				<updated>2014-04-07T11:46:50Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171793</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171793"/>
				<updated>2014-04-07T11:36:12Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Approaching App Sec - Editable slides (pptx)&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171792</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171792"/>
				<updated>2014-04-07T11:35:23Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:How_Do_I_Approach_Application_Security-1.pptx&amp;diff=171791</id>
		<title>File:How Do I Approach Application Security-1.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:How_Do_I_Approach_Application_Security-1.pptx&amp;diff=171791"/>
				<updated>2014-04-07T11:33:37Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171790</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171790"/>
				<updated>2014-04-07T11:33:36Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[How_Do_I_Approach_Application_Security-1.pptx]]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171789</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171789"/>
				<updated>2014-04-07T11:31:39Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Links here&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171788</id>
		<title>Education/Free Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Education/Free_Training&amp;diff=171788"/>
				<updated>2014-04-07T11:31:07Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[image:Owasp banner web edu.jpg |1000px]]&lt;br /&gt;
&lt;br /&gt;
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in setting up a training event through OWASP, [http://www.tfaforms.com/301382 submit your request here], we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. [https://www.owasp.org/index.php/Funding Click here for more information.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are some general guidelines we have set up for free training courses within the OWASP Community:&lt;br /&gt;
&lt;br /&gt;
# Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs&lt;br /&gt;
# Use open source training materials -  we ask that you make your training materials available after the course, preferably in an editable format&lt;br /&gt;
# Use [https://www.owasp.org/images/5/5d/PPT_2013_Toolbox.zip OWASP template] for slides and keep any company branding to one bio slide&lt;br /&gt;
# Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate&lt;br /&gt;
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Training Courses, Trainer Data, and Material'''&lt;br /&gt;
 |- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Name/Topic''' &lt;br /&gt;
 | style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Trainer Name(s)'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Materials'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Location'''&lt;br /&gt;
 | style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Training Date'''&lt;br /&gt;
 | style=&amp;quot;width:15%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; | '''Number of Attendees'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jillians &amp;lt;br&amp;gt; San Francisco, CA&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Feb 24, 2014&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | 200&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Application Security – Where do I start?&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico, Eoin Keary, Michael Coates&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | Links here&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | RSA 2013 EU, RSA 2013 USA, Lascon 2013&lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
 | valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_Guide_Foreword&amp;diff=170137</id>
		<title>Testing Guide Foreword</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_Guide_Foreword&amp;diff=170137"/>
				<updated>2014-03-14T16:34:30Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
==Foreword by [https://www.owasp.org/index.php/Eoin_Keary Eoin Keary], OWASP Global Board==&lt;br /&gt;
&lt;br /&gt;
The problem of insecure software is perhaps the most important technical challenge of our time. The dramatic rise of web applications enabling business, social networking etc has only compounded the requirements to establish a robust approach to writing and securing our Internet, Web Applications and Data.&lt;br /&gt;
At The Open Web Application Security Project (OWASP), we're trying to make the world a place where insecure software is the anomaly, not the norm. The OWASP Testing Guide has an important role to play in solving this serious issue.&lt;br /&gt;
&lt;br /&gt;
It is vitally important to our approach to testing software for security issues is based on the principles of engineering and science. We need a consistent, repeatable and defined approach to testing web applications. A world without some minimal standards in terms of engineering and technology is a world in chaos. &lt;br /&gt;
It goes without saying that you can't build a secure application without performing security testing on it. Testing is part of a wider approach to building a secure system.&lt;br /&gt;
&lt;br /&gt;
Many software development organizations do not include security testing as part of their standard software development process. Even worse is many security vendors deliver testing with varying degrees of quality and rigor. &lt;br /&gt;
&lt;br /&gt;
Security testing, by itself, isn't a particularly good stand alone measure of how secure an application is, because there are an infinite number of ways that an attacker might be able to make an application break, and it simply isn't possible to test them all. We cant hack ourselves secure and we only have a limited time to test and defend where an attacker does not have such constraints. &lt;br /&gt;
&lt;br /&gt;
In conjunction with other OWASP projects such as the Code review Guide, The Development Guide and tools such as OWASP ZAP, this is  a great start towards building and maintaining secure applications. The [[Building Guide|Development Guide]] will show your project how to architect and build a secure application, the [[Code Review Guide]] will tell you how to verify the security of your application's source code, and this [[Testing Guide]] will show you how to verify the security of your running application. I highly recommend using these guides as part of your application security initiatives.&lt;br /&gt;
&lt;br /&gt;
==Why OWASP?==&lt;br /&gt;
&lt;br /&gt;
Creating a guide like this is a huge undertaking, requiring the expertise of hundreds of people around the world. There are many different ways to test for security flaws and this guide captures the consensus of the leading experts on how to perform this testing quickly, accurately, and efficiently. OWASP gives like minded security folks the ability to work together and form a leading practice approach to a security problem.&lt;br /&gt;
&lt;br /&gt;
The importance of having this guide available in a completely free and open way is important for the foundations mission. It gives anyone the ability to understand the techniques used to test for common security issues.  &lt;br /&gt;
Security should not be a black art or closed secret that only a few can practice. It should be open to all and not exclusive to security practitioners but also QA, Developers and Technical Managers.&lt;br /&gt;
The project to build this guide keeps this expertise in the hands of the people who need it, You, Me, Anyone that is involved in building software!!&lt;br /&gt;
&lt;br /&gt;
This guide must make its way into the hands of developers and software testers. There are not nearly enough application security experts in the world to make any significant dent in the overall problem. The initial responsibility for application security must fall on the shoulders of the developers, they write the code. It shouldn't be a surprise that developers aren't producing secure code if they're not testing for it or consider the types of bugs which introduce vulnerability.&lt;br /&gt;
&lt;br /&gt;
Keeping this information up to date is a critical aspect of this guide project. By adopting the wiki approach, the OWASP community can evolve and expand the information in this guide to keep pace with the fast moving application security threat landscape.&lt;br /&gt;
&lt;br /&gt;
This Guide is a great testament to the passion and energy our members and project volunteers have for this subject. &lt;br /&gt;
&lt;br /&gt;
It shall certainly help change the world a line of code at a time.&lt;br /&gt;
&lt;br /&gt;
==Tailoring and Prioritizing==&lt;br /&gt;
&lt;br /&gt;
You should adopt this guide in your organization. You may need to tailor the information to match your organization's technologies, processes, and organizational structure.  &lt;br /&gt;
&lt;br /&gt;
In general there are several different roles within organizations that may use this guide:&lt;br /&gt;
&lt;br /&gt;
* Developers should use this guide to ensure that they are producing secure code. These tests should be a part of normal code and unit testing procedures.&lt;br /&gt;
&lt;br /&gt;
* Software testers / QA should use this guide to expand the set of test cases they apply to applications. Catching these vulnerabilities early saves considerable time and effort later.&lt;br /&gt;
&lt;br /&gt;
* Security specialists should use this guide in combination with other techniques as one way to verify that no security holes have been missed in an application.&lt;br /&gt;
&lt;br /&gt;
* Project Managers should consider the reason this guide exists; security issues are manifested via bugs in code and design.&lt;br /&gt;
&lt;br /&gt;
The most important thing to remember when performing security testing is to continuously re-prioritize. There are an infinite number of possible ways that an application could fail, and organizations always have limited testing time and resources. Be sure it is spent wisely. Try to focus on the security holes that are a real risk to your business. Try to contextualize risk in terms of the application and its use cases.&lt;br /&gt;
&lt;br /&gt;
This guide is best viewed as a set of techniques that you can use to find different types of security holes. But not all the techniques are equally important. Try to avoid using the guide as a checklist, new vulnerabilities are always manifesting and no guide can be an exhaustive list of &amp;quot;things to test for&amp;quot;, but rather a great place to start.&lt;br /&gt;
&lt;br /&gt;
==The Role of Automated Tools==&lt;br /&gt;
&lt;br /&gt;
There are a number of companies selling automated security analysis and testing tools. Remember the limitations of these tools so that you can use them for what they're good at. As Michael Howard put it at the [[OWASP_AppSec_Seattle_2006/Agenda|2006 OWASP AppSec Conference in Seattle]], &amp;quot;Tools do not make software secure! They help scale the process and help enforce policy.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Most importantly, these tools are generic - meaning that they are not designed for your custom code, but for applications in general. That means that while they can find some generic problems, they do not have enough knowledge of your application to allow them to detect most flaws. In my experience, the most serious security issues are the ones that are not generic, but deeply intertwined in your business logic and custom application design.&lt;br /&gt;
&lt;br /&gt;
These tools can also be seductive, since they do find lots of potential issues. While running the tools doesn't take much time, each one of the potential problems takes time to investigate and verify. If the goal is to find and eliminate the most serious flaws as quickly as possible, consider whether your time is best spent with automated tools or with the techniques described in this guide.&lt;br /&gt;
&lt;br /&gt;
Still, these tools are certainly part of a well-balanced application security program. Used wisely, they can support your overall processes to produce more secure code.&lt;br /&gt;
&lt;br /&gt;
==Call to Action==&lt;br /&gt;
&lt;br /&gt;
If you're building, designing, testing software, I strongly encourage you to get familiar with the security testing guidance in this document. It is a great road map for testing the most common issues facing applications today, but not exhaustive. If you find errors, please add a note to the discussion page or make the change yourself. You'll be helping thousands of others who use this guide.&lt;br /&gt;
&lt;br /&gt;
Please consider [[Membership|joining us]] as an individual or corporate member so that we can continue to produce materials like this testing guide and all the other great projects at OWASP.&lt;br /&gt;
&lt;br /&gt;
Thank you to all the past and future contributors to this guide, your work will help to make applications worldwide more secure.&lt;br /&gt;
&lt;br /&gt;
--[https://www.owasp.org/index.php/Eoin_Keary Eoin Keary], OWASP Board Member, April 19, 2013 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_Guide_Foreword&amp;diff=170136</id>
		<title>Testing Guide Foreword</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_Guide_Foreword&amp;diff=170136"/>
				<updated>2014-03-14T16:26:06Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
==Foreword by [https://www.owasp.org/index.php/Eoin_Keary Eoin Keary], OWASP Global Board==&lt;br /&gt;
&lt;br /&gt;
The problem of insecure software is perhaps the most important technical challenge of our time. The dramatic rise of web applications enabling business, social networking etc has only compounded the requirements to establish a robust approach to writing and securing our Internet, Web Applications and Data.&lt;br /&gt;
At The Open Web Application Security Project (OWASP), we're trying to make the world a place where insecure software is the anomaly, not the norm. The OWASP Testing Guide has an important role to play in solving this serious issue.&lt;br /&gt;
&lt;br /&gt;
It is vitally important to our approach to testing software for security issues is based on the principles of engineering ans science. We need a consistent, repeatable and defined approach to testing web applications. A world without some minimal standards in terms of engineering and technology is a world in chaos. &lt;br /&gt;
It goes without saying that you can't build a secure application without performing security testing on it. Testing is part of a wider approach to building a secure system.&lt;br /&gt;
&lt;br /&gt;
Many software development organizations do not include security testing as part of their standard software development process. Even worse is many security vendors delivery testing with varying degrees of quality and rigor. &lt;br /&gt;
&lt;br /&gt;
Security testing, by itself, isn't a particularly good stand alone measure of how secure an application is, because there are an infinite number of ways that an attacker might be able to make an application break, and it simply isn't possible to test them all. We cant hack ourselves secure and we only have a limited time to test and defend where an attacker does not have such constraints. &lt;br /&gt;
&lt;br /&gt;
In conjunction with other OWASP projects such as the Code review Guide, The Development Guide and tools such as OWASP ZAP, this is  a great start towards building and maintaining secure applications. The [[Building Guide|Development Guide]] will show your project how to architect and build a secure application, the [[Code Review Guide]] will tell you how to verify the security of your application's source code, and this [[Testing Guide]] will show you how to verify the security of your running application. I highly recommend using these guides as part of your application security initiatives.&lt;br /&gt;
&lt;br /&gt;
==Why OWASP?==&lt;br /&gt;
&lt;br /&gt;
Creating a guide like this is a huge undertaking, requiring the expertise of hundreds of people around the world. There are many different ways to test for security flaws and this guide captures the consensus of the leading experts on how to perform this testing quickly, accurately, and efficiently. OWASP gives like minded security folks the ability to work together and form a leading practice approach to a security problem.&lt;br /&gt;
&lt;br /&gt;
The importance of having this guide available in a completely free and open way is important for the foundations mission. It gives anyone the ability to understand the techniques used to test for common security issues.  &lt;br /&gt;
Security should not be a black art or closed secret that only a few can practice. It should be open to all and not exclusive to security practitioners but also QA, Developers and Technical Managers. &lt;br /&gt;
The project to build this guide keeps this expertise in the hands of the people who need it, You, Me, Anyone that is involved in building software!!&lt;br /&gt;
&lt;br /&gt;
This guide must make its way into the hands of developers and software testers. There are not nearly enough application security experts in the world to make any significant dent in the overall problem. The initial responsibility for application security must fall on the shoulders of the developers, they write the code. It shouldn't be a surprise that developers aren't producing secure code if they're not testing for it or consider the types of bugs which introduce vulnerability.&lt;br /&gt;
&lt;br /&gt;
Keeping this information up to date is a critical aspect of this guide project. By adopting the wiki approach, the OWASP community can evolve and expand the information in this guide to keep pace with the fast moving application security threat landscape.&lt;br /&gt;
&lt;br /&gt;
This Guide is a great testament to the passion and energy our members and project volunteers have for this subject. &lt;br /&gt;
&lt;br /&gt;
It shall certainly help change the world a line of code at a time.&lt;br /&gt;
&lt;br /&gt;
==Tailoring and Prioritizing==&lt;br /&gt;
&lt;br /&gt;
You should adopt this guide in your organization. You may need to tailor the information to match your organization's technologies, processes, and organizational structure.  &lt;br /&gt;
&lt;br /&gt;
In general there are several different roles within organizations that may use this guide:&lt;br /&gt;
&lt;br /&gt;
* Developers should use this guide to ensure that they are producing secure code. These tests should be a part of normal code and unit testing procedures.&lt;br /&gt;
&lt;br /&gt;
* Software testers / QA should use this guide to expand the set of test cases they apply to applications. Catching these vulnerabilities early saves considerable time and effort later.&lt;br /&gt;
&lt;br /&gt;
* Security specialists should use this guide in combination with other techniques as one way to verify that no security holes have been missed in an application.&lt;br /&gt;
&lt;br /&gt;
* Project Managers should consider the reason this guide exists; security issues are manifested via bugs in code and design.&lt;br /&gt;
&lt;br /&gt;
The most important thing to remember when performing security testing is to continuously re-prioritize. There are an infinite number of possible ways that an application could fail, and organizations always have limited testing time and resources. Be sure it is spent wisely. Try to focus on the security holes that are a real risk to your business. Try to contextualize risk in terms of the application and its use cases.&lt;br /&gt;
&lt;br /&gt;
This guide is best viewed as a set of techniques that you can use to find different types of security holes. But not all the techniques are equally important. Try to avoid using the guide as a checklist, new vulnerabilities are always manifesting and no guide can be an exhaustive list of &amp;quot;things to test for&amp;quot;, but rather a great place to start.&lt;br /&gt;
&lt;br /&gt;
==The Role of Automated Tools==&lt;br /&gt;
&lt;br /&gt;
There are a number of companies selling automated security analysis and testing tools. Remember the limitations of these tools so that you can use them for what they're good at. As Michael Howard put it at the [[OWASP_AppSec_Seattle_2006/Agenda|2006 OWASP AppSec Conference in Seattle]], &amp;quot;Tools do not make software secure! They help scale the process and help enforce policy.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Most importantly, these tools are generic - meaning that they are not designed for your custom code, but for applications in general. That means that while they can find some generic problems, they do not have enough knowledge of your application to allow them to detect most flaws. In my experience, the most serious security issues are the ones that are not generic, but deeply intertwined in your business logic and custom application design.&lt;br /&gt;
&lt;br /&gt;
These tools can also be seductive, since they do find lots of potential issues. While running the tools doesn't take much time, each one of the potential problems takes time to investigate and verify. If the goal is to find and eliminate the most serious flaws as quickly as possible, consider whether your time is best spent with automated tools or with the techniques described in this guide.&lt;br /&gt;
&lt;br /&gt;
Still, these tools are certainly part of a well-balanced application security program. Used wisely, they can support your overall processes to produce more secure code.&lt;br /&gt;
&lt;br /&gt;
==Call to Action==&lt;br /&gt;
&lt;br /&gt;
If you're building, designing, testing software, I strongly encourage you to get familiar with the security testing guidance in this document. It is a great road map for testing the most common issues facing applications today, but not exhaustive. If you find errors, please add a note to the discussion page or make the change yourself. You'll be helping thousands of others who use this guide.&lt;br /&gt;
&lt;br /&gt;
Please consider [[Membership|joining us]] as an individual or corporate member so that we can continue to produce materials like this testing guide and all the other great projects at OWASP.&lt;br /&gt;
&lt;br /&gt;
Thank you to all the past and future contributors to this guide, your work will help to make applications worldwide more secure.&lt;br /&gt;
&lt;br /&gt;
--[https://www.owasp.org/index.php/Eoin_Keary Eoin Keary], OWASP Board Member, April 19, 2013 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP-SF-2014.pdf&amp;diff=169132</id>
		<title>File:OWASP-SF-2014.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP-SF-2014.pdf&amp;diff=169132"/>
				<updated>2014-02-28T13:34:08Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: Training deck from Jillians.
Feb 24th San Francisco.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Training deck from Jillians.&lt;br /&gt;
Feb 24th San Francisco.&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dublin&amp;diff=168901</id>
		<title>Dublin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dublin&amp;diff=168901"/>
				<updated>2014-02-24T18:18:16Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ireland|extra= [[File:Owasp_logo_ireland_small.jpg]]| mailinglistsite=https://lists.owasp.org/mailman/listinfo/owasp-ireland}} become a [http://www.owasp.org/index.php/Membership#Categories_of_Membership_.26_Supporters Member or Annual Chapter Sponsor(s)]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Board  ==&lt;br /&gt;
&lt;br /&gt;
Should you have a question about the local chapter, would like to get more involved contact ANY of the following people below &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:fiona.walsh(at)owasp.org Fiona Walsh]&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member/Global Board Member''' [[User:EoinKeary|Eoin Keary]] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:fcerullo(at)owasp.org Fabio Cerullo] +353877817468&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Owen.Pendlebury(at)owasp.org Owen Pendlebury]&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Darren.Fitzpatrick(at)owasp.org Darren Fitzpatrick]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Advisor''' [mailto:rahim.jina(at)owasp.org Rahim Jina]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''OWASP Ireland'''&amp;lt;br&amp;gt;23 The Chandler, Rahtborne Village &amp;lt;br&amp;gt;Ashtown, Dublin 15, Ireland &amp;lt;br&amp;gt;Tel: +353877817468 | Fax: +353877817468 &amp;lt;br&amp;gt;&amp;lt;paypal&amp;gt;Ireland&amp;lt;/paypal&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Dublin Chapter 2014 ==&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are being organised for Q1 2014 and beyond.&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2013 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP July Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Jeremiah Grossman - Another Year in Web Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 4th July&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 17:30 &amp;lt;br&amp;gt;Talk: 18:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.eventbrite.com/event/7127672059 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Jeremiah Grossman of WhiteHat Security will be in Dublin and will be talking at our next chapter event. His talk &amp;quot;Another Year In Web Security: What did 2012 teach us about survival in the coming years?&amp;quot; promises a great insight into the future of web security.&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, founder and CTO of WhiteHat Security, is a world-renowned expert in web application security and a founding member of the Web Application Security Consortium (WASC). At WhiteHat, Mr. Grossman is responsible for web application security R&amp;amp;D and industry evangelism. He is a frequent speaker at industry events including the BlackHat Briefings, ISACA's Networks Security Conference, NASA, ISSA and Defcon. &lt;br /&gt;
&lt;br /&gt;
A trusted media resource, Mr. Grossman has been featured in USA Today, the Washington Post, Information Week, NBC Nightly News, and many others. Mr. Grossman is also a featured expert and frequent contributor on TechTarget'sSearchAppSecurity.com.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP June Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training. [https://www.owasp.org/index.php/EUTour2013#Training Info about the training session])'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference. [https://www.owasp.org/index.php/EUTour2013#Dublin Info and registration link for the conference])''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event ===&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''TRAINING &amp;amp; TALKS''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Dublin - Realex Payments Application Security Workshop''' == &lt;br /&gt;
'''Thursday 30th May'''&amp;lt;br&amp;gt; ''('''Training'''. 1:30pm- 5:00pm)'' &amp;lt;br&amp;gt;('''Talks'''. 6:00pm - 8:00pm)''&amp;lt;br&amp;gt;[http://www.eventbrite.com/event/6665658163/eorg Click here for more information]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Training'''&lt;br /&gt;
&lt;br /&gt;
Eoin Keary will be delivering free application security training between 2pm and 5pm on the 30th May. Eoin was the founder of OWASP Ireland and is currently the global vice chair for OWASP (amongst many other things!  https://www.owasp.org/index.php/Eoin_Keary). He has delivered application security training to many developers and security professionals around the world and recently delivered a training course to over 400 people at the RSA Conference.&lt;br /&gt;
&lt;br /&gt;
The training will focus on secure application development and why we can't hack ourselves secure. It will be covering why penetration testing on its own does not work approaches to improvement including &amp;quot;knowing what you don't know&amp;quot; and how to measure change.&lt;br /&gt;
&lt;br /&gt;
It will be technical training covering XSS eradication, client side security and browser DOM curiosities.&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
The talks will be starting at 6pm in our office and OWASP have arranged two very interesting talks! Diarmaid McManus https://twitter.com/elephant_rb from Realex Payments will be expanding his award winning SecurityBSides London Rookie Track talk https://www.securityninja.co.uk/application-security/securitybsides-london-esp-security-plugin/ to include more details about static analysis approaches and his research and development work on ESP: Security Plugin https://github.com/diarmaid-mcmanus/ESPSecurityPlugin.&lt;br /&gt;
&lt;br /&gt;
Hugh Pearse https://twitter.com/hughpearse will be talking about Low Level Exploits and this looks like it will be a great talk:&lt;br /&gt;
&lt;br /&gt;
“In 2010 Mr Haroon Meer from thinkst.com presented a timeline of memory corruption vulnerabilities and their mitigation techniques dating from 1985 to 2010. In his 35 page publication he referenced almost 150 events in low level information security history. The scope of the presentation &amp;quot;Low Level Exploits&amp;quot; is to explain in detail some of the most significant attacks in from Haroon Meers research. The attacks covered in this presentation include buffer overflows on the stack, heap overflows, integer overflows, format strings, null pointers and ROP chains. This brings us to exploits in the present day where researchers are looking for the successor of the buffer overflow attack, next big exploit.”&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2011 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== [[Ireland/Training/OWASP projects and resources you can use TODAY]] ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp logo Ireland Training 11 March 2010.gif]]&lt;br /&gt;
&lt;br /&gt;
*'''Overview &amp;amp; Goal'''&lt;br /&gt;
**Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle. &lt;br /&gt;
**This course aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them. &lt;br /&gt;
**The course will be very practical where demonstration and hands-on exercises will be provided for the tools covered. &lt;br /&gt;
**If you are interested in participating in the hands on portion of the course, please bring a laptop. &lt;br /&gt;
*'''Dates'''&lt;br /&gt;
**March, 2011, 11&lt;br /&gt;
*'''Course Main Content and Registration'''&lt;br /&gt;
**[[Ireland/Training/OWASP projects and resources you can use TODAY|Click here]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dublin2010.gif]]&lt;br /&gt;
&lt;br /&gt;
Click [[OWASP IRELAND 2010]] for more information &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010 Agenda  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== AUG 2010  ====&lt;br /&gt;
== OWASP August Event ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 11/8/2010 6:00pm - 8:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' OWASP ESAPI Swingset: Introduction &amp;amp; Demo by Cathal Courtney&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The ESAPI Swingset is a web application which demonstrates common security vulnerabilities and asks users to secure the application against these vulnerabilities using the ESAPI library. The application is intended for Java Developers. The goal of the application is to teach developers about the functionality of the ESAPI library and give users a practical understanding of how it can be used to protect web applications against common security vulnerabilities. During the talk, Cathal will demonstrate how to install and use ESAPI Swingset in your organization. A copy of the latest version will be also provided to the attendees.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Cathal is an experienced developer working at AIB and is currently the ESAPI Swingset project leader. More information about this project could be found here: [http://www.owasp.org/index.php/ESAPI_Swingset Esapi SwingSet]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' Not available&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' Security Implications for Web Applications based on SOA by John Marmelstein&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The main point of SOA (in this context) is combining systems and applications to make new applications, or a big 'overall' application.This higher inter-operability does (by default) lower security. For a start, a request originating from a web user might end up at several back end systems, which do not know who or what the request came from.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each back end system might have no access to the customer data, have a different security models, and serve serveral front end. Each of the above systems could be under different ownership, thus the owners have different concerns and priorities. Also, the basic solution at a technical level include single sign on, or security as a service. This can be costly, give limited coverage and have a performance hit. But is pretty much the only way to do it. The other thing to do (probably in tandem) is strict management, and delegation of authority.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John has about 13 years in IT. Most of this in distributed systems and 'Middleware' integration software. Including BEA (now owned by Oracle). Mainly working on Enterprise Java and more recently on Microsoft BizTalk. Various industries, incuding financials, public services, and a fish farm.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== SEP 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND 2010  ==&lt;br /&gt;
&lt;br /&gt;
Due to popular demand we are hosting the 2nd OWASP IRELAND event, '''OWASP Ireland 2010'''. &amp;lt;br&amp;gt;Continuing last years highly successful conference, with more than 150 attendees from across the globe OWASP is happy to repeat this positive experience. &amp;lt;br&amp;gt;Delegates from numerous industry verticals attended the 2009 event; from government to finance to telecoms. Share your thoughts at this open event with some of the most experienced individuals in the information security industry. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_IRELAND_2010 [[Image:Dublin2010.gif]]]&amp;lt;br&amp;gt;[[OWASP_IRELAND_2010]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' '''September 17th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Trinity College Dublin, The Hamilton Building &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [[Eoin Keary|Eoin Keary]]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Subscribe to the OWASP Ireland [https://lists.owasp.org/mailman/listinfo/owasp-ireland mail list] for the up-to-date information.''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OCT 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== NOV 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== DEC 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== 2010 Chapter Plan  ====&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Educational Outreach&amp;lt;br&amp;gt;Summary: Drive education awareness of OWASP among Irish Universities and Third Level Institutions. &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Fabio Cerullo &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Industry Outreach&amp;lt;br&amp;gt;Summary: Raise awareness of OWASP among Irish industry.&amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Eoin Keary&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Membership Drive &amp;lt;br&amp;gt;Summary: Increase local chapter members individuals and corporate supporters &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Project Participants: Rahim Jina&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Hands-On Training&amp;lt;br&amp;gt;Summary: Provide 1-day, 3-day and 5-day hands-on classroom / online training classes&amp;lt;br&amp;gt;Next Milestone: Organize Training Offerings&amp;lt;br&amp;gt;Project Participants: Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Call For Presentations for 2010 is now open - please contact fcerullo(@)owasp.org / +353877817468 if you would like to speak or can host a meeting. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;*Note meeting hosts are provided with annual chapter sponsorship and free seats in training classes. The OWASP Foundation, Ireland chapter focuses on implementation of efforts defined by the [http://www.owasp.org/index.php/Global_Committee_Pages Global Committee] as well as new concepts and ideas defined locally. Below are a list of ACTIVE projects assigned to individual active members and teams within the local chapter. If you would like to help out on ANY of these efforts, contact them directly to get involved &lt;br /&gt;
&lt;br /&gt;
==== FEB 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Event - What is the O2 Platform?  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 19/2/2010 3:00pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP O2 Platform - Open Platform for automating application security knowledge and workflows &amp;lt;br&amp;gt;'''Abstract:''' In this talk Dinis Cruz will show the OWASP O2 Platform which is an open source toolkit specifically designed for developers and security consultants to be able to perform quick, effective and thorough 'source-code-driven' application security reviews. The OWASP O2 Platform (http://www.owasp.org/index.php/OWASP_O2_Platform) consumes results from the scanning engines from Ounce Labs, Microsoft's CAT.NET tool, FindBugs, CodeCrawler and AppScan DE, and also provides limited support for Fortify and OWASP WebScarab dumps. In the past, there has been a very healthy skepticism on the usability of Source Code analysis engines to find commonly found vulnerablities in real world applications. This presentation will show that with some creative and powerful tools, it IS possible to use O2 to discover those issues. This presentation will also show O2's advanced support for Struts and Spring MVC. &lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development. For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences. At OWASP, Dinis is the leader of the [[OWASP O2 Platform]] project, member of the OWASP [[Global Projects Committee]], chair of the [[OWASP Connections Committee]] and member of the [[About The Open Web Application Security Project#Global_Board_Members|OWASP Board]]. &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' http://www.o2-ounceopen.com/files-binaries-source-and-demo/old-documents-and-presentations/OWASP_O2_Platform_-_AppSec_Ireland_Sep_2009.pdf &lt;br /&gt;
&lt;br /&gt;
== IISF/OWASP – February Chapter Meeting  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 25/2/2010 2:00pm - 4:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Georgian Suite, Buswells Hotel, Molesworth St., Dublin 2 &lt;br /&gt;
&lt;br /&gt;
'''Title:''' An overview of Web Application Security threats and technologies. Practical advice and techniques for improving Application Security, presented by OWASP. &lt;br /&gt;
&lt;br /&gt;
2:00 - Introduction by IISF Chairman &lt;br /&gt;
&lt;br /&gt;
2:05 - Presentation&amp;amp;nbsp;: “Practical advice for improving Application Security” - Introduction to OWASP and OWASP Top Ten - Demonstration video of typical web based attacks with high level explanation - Live SQL injection demo using WebGoat &amp;amp;amp; WebScarab - Live Cross Site Scripting demo using WebGoat &amp;amp;amp; WebScarab &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part1.ppt]] &lt;br /&gt;
&lt;br /&gt;
3:00 - Coffee &lt;br /&gt;
&lt;br /&gt;
3:20 – Presentation continues - Application Security: &amp;quot;The problems we are faced with&amp;quot; - The Application Security Verification Standard - SDLC &amp;amp;amp; Security Assurance Maturity Model - Code Review versus traditional Runtime Testing. - Q&amp;amp;amp;A &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part2.pptx]] &lt;br /&gt;
&lt;br /&gt;
4:00 - Close of Meeting &lt;br /&gt;
&lt;br /&gt;
4:05 - Traditional networking in Buswells Bar &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP - 26/3/2010  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== APR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Live CD - An open environment for Web Application Security  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 16/4/2010 2:30pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP Live CD - An open environment for Web Application Security &amp;lt;br&amp;gt;'''Abstract:''' This CD collects some of the best open source security projects in a single environment. Web developers, testers and security professionals can boot from this Live CD and have access to a full security testing suite. This presentation aims to provide a showcase for the great OWASP tools and documentation materials available in the CD, tips and tricks, and also some introductory stuff regarding code review and penetration testing. &amp;lt;br&amp;gt;Training is aimed at introductory /intermediate level in terms of pen testing, code review and tools. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Rahim Jina''' &amp;lt;br&amp;gt;Rahim Jina currently works as a senior consultant for Ernst &amp;amp;amp; Young's Risk Advisory Services in Dublin. He has worked there for nearly four years primarily delivering penetration testing services to clients globally, focusing on web applications and secure code review. He has been involved with OWASP for the past two years, being involved in the Summer of Code 2008 as lead reviewer for the Code Review Guide 2009. He has also made contributions to the SAMM project (OpenSAMM). He holds an MSC in Security and Forensic Computing from DCU and a degree in computer science from Trinity college. &amp;lt;br&amp;gt;'''Eoin Keary''' &amp;lt;br&amp;gt;Eoin is a long time member of OWASP and have contributed year on year to OWASP projects and the OWASP mission of fighting the causes of software insecurity. He is based in Dublin, Ireland and run the Ernst &amp;amp;amp; Young application security team across Europe. His OWASP contributions to date include the OWASP Code Review Guide, OWASP Testing Guide, OWASP SAMM, and OWASP ASVS. He is a member of the OWASP Global Industry Committee, chair of the OWASP Conferences Committee and member of the OWASP Global Board. Eoin founded the OWASP Ireland chapter back in 2004 and currently serves as Vice President of the OWASP Ireland Board. &lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/d/db/P1040923_1024.JPG [[Image:|P1040923_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/d/db/P1040923_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/f/f3/P1040927_1024.JPG [[Image:|P1040927_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/f/f3/P1040927_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/6/64/P1040929_1024.JPG [[Image:|P1040929_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/6/64/P1040929_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
'''Download Presentation:''' [http://www.owasp.org/images/e/ee/OWASP_Live_CD.pptx [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After OWASP Live CD training &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAY 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Trials &amp;amp;amp; Tribulations of WAF Implementation  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Trials &amp;amp;amp; Tribulations of WAF Implementation&amp;lt;br&amp;gt;'''Abstract:''' A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.&amp;lt;br&amp;gt;Mark will be presenting on his experience in implementing a Web Application Firewall solution through all phases from research to implementation. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Mark Hillick - Application Networking Team, Citrix Systems''' &amp;lt;br&amp;gt;Mark Hillick has 10 years experience in relation to Internet, networking, systems administration and security engineering. &lt;br /&gt;
&lt;br /&gt;
Mark graduated from Queen's University, where he studied Mathematics. &lt;br /&gt;
&lt;br /&gt;
Mark joined AIB from Queen's where he joined the Internet Infrastructure team, where he was responsible for designing, building and securing the Internet service in and out of AIB. He is a prominent member of the IT Security community in Ireland and has presented at several local security forums such as IISF and Owasp. Mark is one of the founding members of IRISS CERT, where he is also a Volunteer Incident Handler. He helped organise IRISSCon 2009, where he also designed and built HackEire 2009, the first Ethical Hacking 'Capture The Flag' contest in Ireland.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[Image:20052010017.jpg|thumb|A caption from Mark's talk]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [http://docs.google.com/fileview?id=0B3vrVYEosFeEZDMyZjIzYTktMzNkZC00ZjBlLWFiYTgtNThjZGE4YTE1NmFj [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After WAF presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUN 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Define Security Requirements - A practical approach  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Define Security Requirements - A practical approach&amp;lt;br&amp;gt;'''Abstract:''' The Data Protection Act states that &amp;quot;appropriate security measures&amp;quot; must be taken to protect personal data. How do you specify the appropriate security measures for a website which processes personal data? It is an important step in a development project, but is often neglected. In this talk, Alexis will descibe his own experiences of assessing web application, and will also look in more detail at what the Data Protection Commissioner says. He will then take a fictional website and look at a practical approach to specifying the security requirements that the fictional application should meet. This will use the kind of risk-based techniques outlined by OWASP or the Microsoft Secure Development Lifecycle (SDL). Issues discussed will include encryption, authentication, access control, audit, etc. The result will be a list of security requirements that can be carried into the design and development phases. Attendees should be able to apply the ideas to their own development projects. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Alexis Fitzgerald - Rits Information Security Group''' &amp;lt;br&amp;gt;For the last six years Alexis has worked for Rits Information Security Group, where he performs application penetration testing assignments as well as advising clients on application security issues. Before that, he spent many years as a developer (mainly in the financial sector), and he continues to be involved in development. Alexis holds an MSc in Information Security from the University of London, Royal Holloway.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:OWASP Ireland June10.pdf]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After Alexis presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUL 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Ireland]]&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Code_Review_V2_Table_of_Contents&amp;diff=164569</id>
		<title>OWASP Code Review V2 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Code_Review_V2_Table_of_Contents&amp;diff=164569"/>
				<updated>2013-12-12T15:46:11Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: /* 360 Review: Coupling source code review and Testing / Hybrid Reviews */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
= '''OWASP Code Review Guide v2.0:''' =&lt;br /&gt;
&lt;br /&gt;
==Forward==&lt;br /&gt;
# Author - Eoin Keary&lt;br /&gt;
# Previous version to be updated:[[https://www.owasp.org/index.php/Code_Review_Guide_History]]&lt;br /&gt;
'''[[CRV2_Forward|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
== Code Review Guide Introduction==&lt;br /&gt;
# Author - Eoin Keary&lt;br /&gt;
# Previous version to be updated:[[https://www.owasp.org/index.php/Code_Review_Introduction]]&lt;br /&gt;
'''[[CRV2_Introduction|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=== What is source code review and Static Analysis ===&lt;br /&gt;
=== What is Code Review ===&lt;br /&gt;
# Author - Zyad Mghazli, Eoin Keary&lt;br /&gt;
# New Section&lt;br /&gt;
''' [[CRV2_WhatIsCodeReview|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=== Manual Review - Pros and Cons ===&lt;br /&gt;
# Author - Zyad Mghazli, Eoin Keary,Gary David Robinson&lt;br /&gt;
# New Section&lt;br /&gt;
# Suggestion: Benchmark of different Stataic Analysis Tools  Zyad Mghazli&lt;br /&gt;
# [[CRV2_ManualReviewProsCons|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Advantages of Code Review to Development Practices ===&lt;br /&gt;
# Author - Gary David Robinson&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_AdvantagesToDevPractices|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Why code review ===&lt;br /&gt;
==== Scope and Objective of secure code review ====&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# [[CRV2_WhyCodeReview|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== We can't hack ourselves secure ===&lt;br /&gt;
# Author - Eoin Keary&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_CantHackSecure|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== 360 Review: Coupling source code review and Testing / Hybrid Reviews===&lt;br /&gt;
# Author - eoin Keary&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_360Review|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=== Can static code analyzers do it all? ===&lt;br /&gt;
# Author - Ashish Rao&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_CanStaticAnalyzersDoAll|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Methodology=&lt;br /&gt;
===The code review approach===&lt;br /&gt;
#Author -  Open&lt;br /&gt;
# [[CRV2_CodeReviewApproach|Put content here]]&lt;br /&gt;
&lt;br /&gt;
==== Preparation and context ====&lt;br /&gt;
# Author - Gary David Robinson&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Preparation]]&lt;br /&gt;
# [[CRV2_PrepContext|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Application Threat Modeling====&lt;br /&gt;
#Author - Larry Conklin&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/OCRG1.1:Application_Threat_Modeling]]&lt;br /&gt;
# [[CRV2_AppThreatModeling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Understanding Code layout/Design/Architecture====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_CodeLayoutDesignArch|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===SDLC Integration===&lt;br /&gt;
#Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Security_Code_Review_in_the_SDLC]]&lt;br /&gt;
# [[CRV2_SDLCInt|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Deployment Models====&lt;br /&gt;
=====Secure deployment configurations=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SecDepConfig|Put content here]]&lt;br /&gt;
&lt;br /&gt;
# New Section&lt;br /&gt;
=====Metrics and code review=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Metrics]]&lt;br /&gt;
# [[CRV2_MetricsCodeRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Source and sink reviews=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_SourceSinkRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code review Coverage=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
#Previous version to be updated: [[https://www.owasp.org/index.php/Code_Review_Coverage]]&lt;br /&gt;
# [[CRV2_CodeRevCoverage|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Design Reviews=====&lt;br /&gt;
#Author - Ashish Rao&lt;br /&gt;
*Why to review design?&lt;br /&gt;
**Building security in design - secure by design principle&lt;br /&gt;
**Design Areas to be reviewed&lt;br /&gt;
**Common Design Flaws&lt;br /&gt;
# [[CRV2_DesignRev|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====A Risk based approach to code review=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
#New Section&lt;br /&gt;
*&amp;quot;Doing things right or doing the right things...&amp;quot;&lt;br /&gt;
**&amp;quot;Not all bugs are equal&lt;br /&gt;
# [[CRV2_RiskBasedApproach|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Crawling code====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Crawling_Code]]&lt;br /&gt;
*API of Interest:&lt;br /&gt;
**Java&lt;br /&gt;
**.NET&lt;br /&gt;
**PHP&lt;br /&gt;
**RUBY&lt;br /&gt;
*Frameworks:&lt;br /&gt;
**Spring&lt;br /&gt;
**.NET MVC&lt;br /&gt;
**Structs&lt;br /&gt;
**Zend&lt;br /&gt;
#New Section&lt;br /&gt;
*Searching for code in C/C++&lt;br /&gt;
#Author - Gary David Robinson&lt;br /&gt;
&lt;br /&gt;
# [[CRV2_CrawlingCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Code reviews and Compliance====&lt;br /&gt;
#Author -Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Code_Reviews_and_Compliance]]&lt;br /&gt;
# [[CRV2_CodeRevCompliance|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Reviewing by Technical Control=&lt;br /&gt;
===Reviewing code for Authentication controls===&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_AuthControls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Forgot password====&lt;br /&gt;
#Author Abbas Naderi, Larry Conklin&lt;br /&gt;
# [[CRV2_ForgotPassword|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Authentication====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_Authentication|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====CAPTCHA====&lt;br /&gt;
#Author Larry Conklin, Joan Renchie&lt;br /&gt;
'''[[CRV2_CAPTCHA|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
====Out of Band considerations====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Authentication]]&lt;br /&gt;
# [[CRV2_OutofBand|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code Authorization weakness===&lt;br /&gt;
#Author Eoin Keary .NET MVC added&lt;br /&gt;
# [[CRV2_AuthorizationWeaknesses|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Checking authz upon every request====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_CheckAuthzEachRequest|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reducing the attack surface====&lt;br /&gt;
#Author Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Authorization]]&lt;br /&gt;
# [[CRV2_ReducingAttSurf|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====SSL/TLS Implementations====&lt;br /&gt;
#Author - Eoin Keary&lt;br /&gt;
# [[CRV2_SSL-TLS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing code for Session handling====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Session-Management]]&lt;br /&gt;
# [[CRV2_SessionHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing client side code====&lt;br /&gt;
#New Section&lt;br /&gt;
# [[CRV2_ClientSideCodeIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Javascript=====&lt;br /&gt;
#Author - Abbas Naderi&lt;br /&gt;
# [[CRV2_ClientSideCodeJScript|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====JSON=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeJSon|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Content Security Policy=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeContSecPolicy|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====&amp;quot;Jacking&amp;quot;/Framing=====&lt;br /&gt;
#Author - Eoin  Keary&lt;br /&gt;
# [[CRV2_ClientSideCodeJackingFraming|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HTML 5?=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeHTML5|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Browser Defenses policy=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ClientSideCodeBrowserDefPol|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====etc...=====&lt;br /&gt;
&lt;br /&gt;
====Review code for input validation====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_InputValIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Regex Gotchas=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
#New Section&lt;br /&gt;
# [[CRV2_InputValRegexGotchas|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====ESAPI=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
#New Section&lt;br /&gt;
# Internal Link: [[https://www.owasp.org/index.php/Codereview-Input_Validation]]&lt;br /&gt;
# [[CRV2_InputValESAPI|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing code for contextual encoding====&lt;br /&gt;
[[Overall approach to content encoding and anti XSS]]&lt;br /&gt;
=====HTML Attribute=====&lt;br /&gt;
#Author - Eoin Keary&lt;br /&gt;
# [[CRV2_ContextEncHTMLAttribute|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HTML Entity=====&lt;br /&gt;
#Author - Eoin Keary&lt;br /&gt;
# [[CRV2_ContextEncHTMLEntity|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Javascript Parameters=====&lt;br /&gt;
#Author - Eoin Keary&lt;br /&gt;
# [[CRV2_ContextEncJscriptParams|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====JQuery=====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ContextEncJQuery|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing file and resource handling code====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FileResourceHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Resource Exhaustion - error handling====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_ResourceExhaustionErrHandling|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====native calls=====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_ResourceExhaustionNativeCalls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Logging code - Detective Security====&lt;br /&gt;
#Author - Open&lt;br /&gt;
* Where to Log&lt;br /&gt;
* What to log&lt;br /&gt;
* What not to log&lt;br /&gt;
* How to log&lt;br /&gt;
# Internal link: [[https://www.owasp.org/index.php/Logging_Cheat_Sheet]]&lt;br /&gt;
# [[CRV2_LoggingCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Error handling and Error messages====&lt;br /&gt;
#Author - Gary David Robinson&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Error-Handling]]&lt;br /&gt;
# [[CRV2_ErrorHandlingMessages|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Security alerts====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SecurityAlerts|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Review for active defense====&lt;br /&gt;
#Author - Colin Watson&lt;br /&gt;
# [[CRV2_ActiveDefense|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Reviewing Secure Storage====&lt;br /&gt;
#Author - Open source&lt;br /&gt;
# New Section&lt;br /&gt;
# [[CRV2_SecureStorage|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Hashing &amp;amp; Salting - When, How and Where====&lt;br /&gt;
=====Encrpyption=====&lt;br /&gt;
======.NET======&lt;br /&gt;
#Author Larry Conklin, Joan Renchie&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Codereview-Cryptographic_Controls]]&lt;br /&gt;
*''Can we talk about key storage as well i.e. key management for encryption techniques used in the application? - Ashish Rao''&lt;br /&gt;
'''[[CRV2_HashingandSaltingdotNet|Content here]]'''&lt;br /&gt;
&lt;br /&gt;
=Reviewing by Vulnerability=&lt;br /&gt;
===Review Code for XSS===&lt;br /&gt;
#Author Examples added by Eoin Keary&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_Cross-Site_Scripting]]&lt;br /&gt;
# In reviewing code for XSS - we can give more patterns on &amp;quot;source to sink&amp;quot; patterns for ASP.NET wrf to difference versions and mechanisms to display data in a page - Ashish Rao&lt;br /&gt;
# [[CRV2_RevCodeXSS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Persistent - The Anti pattern===&lt;br /&gt;
#Author &lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel, Eoin Keary&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author OPen&lt;br /&gt;
# [[CRV2_RevCodePersistentAntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reflected - The Anti pattern===&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_RevCodeReflectedAntiPatternIRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Stored - The Anti pattern===&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternIntro|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatterndotNET|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.Java====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_RevCodeStoredAntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===DOM XSS ===&lt;br /&gt;
#Author Larry Conklin&lt;br /&gt;
# [[CRV2_DOMXSS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===JQuery mistakes===&lt;br /&gt;
#Author &lt;br /&gt;
# [[CRV2_JQueryMistakes|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for SQL Injection===&lt;br /&gt;
#Author Open&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_SQL_Injection]]&lt;br /&gt;
# [[CRV2_RevCodeSQLInjection|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author - Mennouchi Islam Azeddine&lt;br /&gt;
# [[CRV2_SQLInjPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author - Johanna Curiel&lt;br /&gt;
# [[CRV2_SQLInjJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SQLInjdotNET|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====HQL====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SQLInjHQL|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===The Anti pattern===&lt;br /&gt;
#Author Larry Conklin&lt;br /&gt;
#[[CRV2_AntiPattern| Content here]]&lt;br /&gt;
https://www.owasp.org/index.php/CRV2_AntiPattern&lt;br /&gt;
====PHP====&lt;br /&gt;
#Author - &lt;br /&gt;
# [[CRV2_AntiPatternPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author - &lt;br /&gt;
#=&amp;gt; Searching for traditional SQL,JPA,JPSQL,Criteria,...&lt;br /&gt;
# [[CRV2_AntiPatternJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_AntiPatterndotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_AntiPatternRuby|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Cold Fusion====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_AntiPatternColdFusion|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for CSRF Issues===&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# Previous version to be updated: [[https://www.owasp.org/index.php/Reviewing_Code_for_Cross-Site_Request_Forgery]]&lt;br /&gt;
# [[CRV2_CSRFIssues|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Transactional logic / Non idempotent functions / State Changing Functions===&lt;br /&gt;
#Author Abbas Naderi&lt;br /&gt;
# [[CRV2_TransLogic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing code for poor logic /Business logic/Complex authorization===&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_PoorLogic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Reviewing Secure Communications===&lt;br /&gt;
====.NET Config====&lt;br /&gt;
#Author Johanna Curiel, Renchie Joan&lt;br /&gt;
# [[CRV2_SecCommsdotNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Spring Config====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_SecCommsSpringConfig|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====HTTP Headers====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_SecCommsHTTPHdrs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====CSP=====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_SecCommsHTTPHdrsCSP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====HSTS=====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_SecCommsHTTPHSTS|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Tech-Stack pitfalls===&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_TechStackPitfalls|Put content here]]&lt;br /&gt;
&lt;br /&gt;
===Framework specific Issues===&lt;br /&gt;
====Spring====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesSpring|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Structs====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesStructs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Drupal====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesDurpal|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Ruby on Rails====&lt;br /&gt;
#Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesROR|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Django====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesDjango|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====.NET Security / MVC====&lt;br /&gt;
#Author Johanna Curiel, Eoin Keary&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesdotNetMVC|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Security in ASP.NET applications====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNet|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Strongly Named Assemblies=====&lt;br /&gt;
#Author Johanna Curiel, Larry Conklin&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetStrongAssembiles|Put content here]]&lt;br /&gt;
&lt;br /&gt;
======Round Tripping======&lt;br /&gt;
# Author - Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetRT|Put content here]]&lt;br /&gt;
&lt;br /&gt;
======How to prevent Round tripping======&lt;br /&gt;
# Author - Open&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetRTPrevention|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Setting the right Configurations=====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetConfigs|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Authentication Options=====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetAuth|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code Review for Managed Code - .Net 1.0 and up=====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetManagedCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Using OWASP Top 10 as your guideline=====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPTop10|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=====Code review for Unsafe Code (C#)=====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPNetUnsafeCode|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====PHP Specific Issues====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesPHP|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Classic ASP====&lt;br /&gt;
#Author Johanna Curiel&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesASPClassic|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====C#====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCsharp|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====C/C++====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCplusplus|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Objective C====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesObectiveC|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Java====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesJava|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Android====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesAndroid|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====Coldfusion====&lt;br /&gt;
#Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesColdfusion|Put content here]]&lt;br /&gt;
&lt;br /&gt;
====CodeIgniter====&lt;br /&gt;
&lt;br /&gt;
# Author Open&lt;br /&gt;
# [[CRV2_FrameworkSpecIssuesCodeIgniter|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Security code review for Agile development=&lt;br /&gt;
#Author Carlos Pantelides&lt;br /&gt;
# [[CRV2_CodeReviewAgile|Put content here]]&lt;br /&gt;
&lt;br /&gt;
=Code Review Tools=&lt;br /&gt;
https://www.owasp.org/index.php/CRV2_CodeReviewTools&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_360Review&amp;diff=164568</id>
		<title>CRV2 360Review</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_360Review&amp;diff=164568"/>
				<updated>2013-12-12T15:13:17Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== 360 Reviews - outside-in &amp;amp; inside-out ==&lt;br /&gt;
The term 360 degree reivews some from coupling source code review and dynamic testing.&amp;lt;br&amp;gt;&lt;br /&gt;
Dynamic testing is in effect runtime penetration testing. It can also be ferered to as hybrid testing.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mentioned in previous sections source code review can assess an application of issues which may otherwise be difficult to assess.&amp;lt;br&amp;gt;&lt;br /&gt;
Issues such as information leakage, logging of sensitive data, privacy and other items in relation to general good-health of an application may have significant impact in terms of regulatory compliance.&amp;lt;br&amp;gt;&lt;br /&gt;
Assessing the cryptographic controls is suited well for sourec code review but testing authentication functionality is easier to deliver via dynamic testing.&amp;lt;br&amp;gt;&lt;br /&gt;
When perfroming a penetration test it is very valueable if one can map a discovered vulnerability or parameter to a class file or script in the application source code.&amp;lt;br&amp;gt;&lt;br /&gt;
such mapping assists the developer in both understanding and addressing the issue.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pen Testing Pros'''&lt;br /&gt;
&lt;br /&gt;
*Requires less specialized expertise&lt;br /&gt;
*Easier setup&lt;br /&gt;
*Easier to perform&lt;br /&gt;
*Exercises the entire app infrastructure&lt;br /&gt;
*Proves vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Code Review Pros'''&lt;br /&gt;
&lt;br /&gt;
*Assess all the content&lt;br /&gt;
*Discover all instances of certain types of flaws&lt;br /&gt;
*Verify controls are correct (Positive Security)&lt;br /&gt;
*Verify controls are used in all the required places (Positive Security)&lt;br /&gt;
&lt;br /&gt;
Combining them together gives a better overall view of the security posture of the application.&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_360Review&amp;diff=164567</id>
		<title>CRV2 360Review</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_360Review&amp;diff=164567"/>
				<updated>2013-12-12T15:13:00Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== 360 Reviews - outside-in &amp;amp; inside-out ==&lt;br /&gt;
The term 360 degree reivews some from coupling source code review and dynamic testing.&amp;lt;br&amp;gt;&lt;br /&gt;
Dynamic testing is in effect runtime penetration testing. It can also be ferered to as hybrid testing.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mentioned in previous sections source code review can assess an application of issues which may otherwise be difficult to assess.&amp;lt;br&amp;gt;&lt;br /&gt;
Issues such as information leakage, logging of sensitive data, privacy and other items in relation to general good-health of an application may have significant impact in terms of regulatory compliance.&amp;lt;br&amp;gt;&lt;br /&gt;
Assessing the cryptographic controls is suited well for sourec code review but testing authentication functionality is easier to deliver via dynamic testing.&amp;lt;br&amp;gt;&lt;br /&gt;
When perfroming a penetration test it is very valueable if one can map a discovered vulnerability or parameter to a class file or script in the application source code.&amp;lt;br&amp;gt;&lt;br /&gt;
such mapping assists the developer in both understanding and addressing the issue.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pen Testing Pros'''&lt;br /&gt;
&lt;br /&gt;
*Requires less specialized expertise&lt;br /&gt;
*Easier setup&lt;br /&gt;
*Easier to perform&lt;br /&gt;
*Exercises the entire app infrastructure&lt;br /&gt;
*Proves vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Code Review Pros'''&lt;br /&gt;
&lt;br /&gt;
*Assess all the content&lt;br /&gt;
*Discover all instances of certain types of flaws&lt;br /&gt;
*Verify controls are correct (Positive Security)&lt;br /&gt;
*Verify controls are used in all the required places (Positive Security&lt;br /&gt;
&lt;br /&gt;
Combining them together gives a better overall view of the security posture of the application.&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_360Review&amp;diff=164566</id>
		<title>CRV2 360Review</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_360Review&amp;diff=164566"/>
				<updated>2013-12-12T14:42:41Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== 360 Reviews - outside-in &amp;amp; inside-out ==&lt;br /&gt;
The term 360 degree reivews some from coupling source code review and dynamic testing.&amp;lt;br&amp;gt;&lt;br /&gt;
Dynamic testing is in effect runtime penetration testing. It can also be ferered to as hybrid testing.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mentioned in previous sections source code review can assess an application of issues which may otherwise be difficult to assess.&amp;lt;br&amp;gt;&lt;br /&gt;
Issues such as information leakage, logging of sensitive data, privacy and other items in relation to general good-health of an application may have significant impact in terms of regulatory compliance.&amp;lt;br&amp;gt;&lt;br /&gt;
Assessing the cryptographic controls is suited well for sourec code review but testing authentication functionality is easier to deliver via dynamic testing.&amp;lt;br&amp;gt;&lt;br /&gt;
When perfroming a penetration test it is very valueable if one can map a discovered vulnerability or parameter to a class file or script in the application source code.&amp;lt;br&amp;gt;&lt;br /&gt;
such mapping assists the developer in both understanding and addressing the issue.&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_360Review&amp;diff=164565</id>
		<title>CRV2 360Review</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_360Review&amp;diff=164565"/>
				<updated>2013-12-12T14:42:14Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: Created page with &amp;quot; == 360 Reviews - outsidein &amp;amp; inside out == The term 360 degree reivews some from coupling source code review and dynamic testing.&amp;lt;br&amp;gt; Dynamic testing is in effect runtime pen...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== 360 Reviews - outsidein &amp;amp; inside out ==&lt;br /&gt;
The term 360 degree reivews some from coupling source code review and dynamic testing.&amp;lt;br&amp;gt;&lt;br /&gt;
Dynamic testing is in effect runtime penetration testing. It can also be ferered to as hybrid testing.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As mentioned in previous sections source code review can assess an application of issues which may otherwise be difficult to assess.&amp;lt;br&amp;gt;&lt;br /&gt;
Issues such as information leakage, logging of sensitive data, privacy and other items in relation to general good-health of an application may have significant impact in terms of regulatory compliance.&amp;lt;br&amp;gt;&lt;br /&gt;
Assessing the cryptographic controls is suited well for sourec code review but testing authentication functionality is easier to deliver via dynamic testing.&amp;lt;br&amp;gt;&lt;br /&gt;
When perfroming a penetration test it is very valueable if one can map a discovered vulnerability or parameter to a class file or script in the application source code.&amp;lt;br&amp;gt;&lt;br /&gt;
such mapping assists the developer in both understanding and addressing the issue.&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_ManualReviewProsCons&amp;diff=164564</id>
		<title>CRV2 ManualReviewProsCons</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_ManualReviewProsCons&amp;diff=164564"/>
				<updated>2013-12-12T14:29:24Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: /* Manual Review - Pros and Cons */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Manual Review - Pros and Cons =&lt;br /&gt;
&lt;br /&gt;
Manual review is sited when a risk based approach to the code review is required.&lt;br /&gt;
Risk based code review works by.&lt;br /&gt;
&lt;br /&gt;
1. Identification of the trust boundaries in the code.&lt;br /&gt;
2. Identification of data paths and storage classes.&lt;br /&gt;
3. Identification of authorisation components.&lt;br /&gt;
4. Identification of authentication components.&lt;br /&gt;
5. Review of input validation and encoding methods.&lt;br /&gt;
6. Review of logging components.&lt;br /&gt;
&lt;br /&gt;
Manual review is good for :&lt;br /&gt;
&lt;br /&gt;
Data leakage detection&lt;br /&gt;
Resource usage/exhaustion detection&lt;br /&gt;
Business Logic review*&lt;br /&gt;
Denial of service&lt;br /&gt;
Deep Dive review&lt;br /&gt;
&lt;br /&gt;
'''Not so good for:'''&lt;br /&gt;
Business Logic review*&lt;br /&gt;
Level of coverage&lt;br /&gt;
&lt;br /&gt;
== Choosing a static analysis tool ==&lt;br /&gt;
&lt;br /&gt;
Choosing a static analysis tool is a difficult task since there are a lot of choices. The comparison charts below should help you decide which tool is right for you. This list is not exhaustive.&lt;br /&gt;
The first thing to do is to look to for a tool that supports the programming language of your choice. You also have to decide whether you want a commercial tool or a free one. Usually the commercial tools have more features and are more reliable than the free ones. The major commercial tools are equally effective but their usability might differ. Next, there is the type of analysis you are looking for: Security or Quality, Static or Dynamic analysis. You should also check the compatibility of the tool with your programming environment.&lt;br /&gt;
This was the easy part to narrow the choice down to a few tools. The next step requires you to do some work since it is quite subjective. The best thing to do is to test a few tools to see if you are satisfied with different aspects such as the user experience, the reporting of vulnerabilities, the level of false positives, the customization, the customer support… The choice should not be based on the number of features, but on the features that you need and how they could be integrated in your SDLC. Also, before choosing the tool, the security expertise of the targeted users should be clearly evaluated in order to choose an appropriate tool.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''Free static analysis tools''' ===&lt;br /&gt;
&lt;br /&gt;
[[File:Free_static_analysis_tools.png]]&lt;br /&gt;
[[File:Legend_free_static_analysis_tools.png]]&lt;br /&gt;
&lt;br /&gt;
=== '''Commerical static analysis tools''' ===&lt;br /&gt;
&lt;br /&gt;
[[File:Commercial_static_analysis_tools.png]]&lt;br /&gt;
[[File:Legend Commercial static analysis tools.png]]&lt;br /&gt;
&lt;br /&gt;
[[File:Owasp_Benchmark_Static_analysis_tools.pptx]]&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MASTER-RSA2013.pdf&amp;diff=161952</id>
		<title>File:MASTER-RSA2013.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MASTER-RSA2013.pdf&amp;diff=161952"/>
				<updated>2013-10-29T07:44:27Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: Slide from RSA Europe training class. - Amsterdam 2013&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Slide from RSA Europe training class. - Amsterdam 2013&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_ContextEncJscriptParams&amp;diff=161202</id>
		<title>CRV2 ContextEncJscriptParams</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_ContextEncJscriptParams&amp;diff=161202"/>
				<updated>2013-10-21T13:43:55Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Untrusted data, if being placed inside a Javascript function/code requires validation.&lt;br /&gt;
Unvalidated data may break out of the data context and wind up being executed in the code context on a users browser.&lt;br /&gt;
&lt;br /&gt;
'''Examples of exploitation points (sinks) which are worth reviewing for:'''&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;script&amp;gt;var currentValue=''''UNTRUSTED DATA'''';&amp;lt;/script&amp;gt; &lt;br /&gt;
     &amp;lt;script&amp;gt;someFunction(''''UNTRUSTED DATA'''');&amp;lt;/script&amp;gt; &lt;br /&gt;
     attack: ');'''/* BAD STUFF */'''&lt;br /&gt;
     &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Potential solutions:'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Java_HTML_Sanitizer_Project OWASP HTML sanatiser Project]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_JSON_Sanitizer OWASP JSON Sanitizer Project]&lt;br /&gt;
&lt;br /&gt;
ESAPI javascript escaping can be call in this manner:&lt;br /&gt;
     String safe = ESAPI.encoder().encodeForJavaScript( request.getParameter( &amp;quot;input&amp;quot; ) );&lt;br /&gt;
&lt;br /&gt;
'''Please note there are some JavaScript functions that can never safely use untrusted data as input - EVEN IF JAVASCRIPT ESCAPED!'''&lt;br /&gt;
 &lt;br /&gt;
For example: &lt;br /&gt;
     &lt;br /&gt;
     &amp;lt;script&amp;gt;&lt;br /&gt;
     window.setInterval('...EVEN IF YOU ESCAPE UNTRUSTED DATA YOU ARE XSSED HERE...');&lt;br /&gt;
     &amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''eval()'''&lt;br /&gt;
     var txtField = &amp;quot;A1&amp;quot;;&lt;br /&gt;
     var txtUserInput = &amp;quot;'test@google.ie';'''alert(1);'''&amp;quot;;&lt;br /&gt;
     '''eval'''(   &amp;quot;document.forms[0].&amp;quot; + txtField + &amp;quot;.value =&amp;quot; + A1);&lt;br /&gt;
&lt;br /&gt;
'''jquery'''&lt;br /&gt;
     var txtAlertMsg = &amp;quot;Hello World: &amp;quot;;&lt;br /&gt;
     var txtUserInput = &amp;quot;test&amp;lt;script&amp;gt;alert(1)&amp;lt;\/script&amp;gt;&amp;quot;;&lt;br /&gt;
     $(&amp;quot;#message&amp;quot;).'''html'''(   txtAlertMsg +&amp;quot;&amp;lt;b&amp;gt;&amp;quot; + txtUserInput + &amp;quot;&amp;lt;/b&amp;gt;&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
     Safe usage (use text, not html)&lt;br /&gt;
     $(&amp;quot;#userInput&amp;quot;).'''text'''(   &amp;quot;test&amp;lt;script&amp;gt;alert(1)&amp;lt;\/script&amp;gt;&amp;quot;);&amp;lt;-- treat user input as text&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Nested Contexts'''&lt;br /&gt;
Best to avoid such nested contexts: an element attribute calling a Javascript function etc&lt;br /&gt;
These contexts can really mess with your mind.&lt;br /&gt;
&lt;br /&gt;
     &lt;br /&gt;
     &amp;lt;div onclick=&amp;quot;showError('&amp;lt;%=request.getParameter(&amp;quot;errorxyz&amp;quot;)%&amp;gt;')&amp;quot; &amp;gt;An error occurred ....&amp;lt;/div&amp;gt;&lt;br /&gt;
     &lt;br /&gt;
     '''Here we have a HTML attribute(onClick) and within a nested Javascript function call (showError).'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When the browser processes this it will first HTML decode the contents of the onclick attribute.&lt;br /&gt;
It will pass the results to the JavaScript Interpreter. &lt;br /&gt;
So we have 2 contextx here...HTML and Javascript (2 browser parsers).&lt;br /&gt;
We need to apply “layered” encoding in the RIGHT order: &amp;lt;br&amp;gt;&lt;br /&gt;
'''1) JavaScript encode''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''2) HTML Attribute Encode so it &amp;quot;unwinds&amp;quot; properly and is not vulnerable'''. &amp;lt;br&amp;gt;&lt;br /&gt;
     &lt;br /&gt;
    &amp;lt;div onclick=&amp;quot;showError&lt;br /&gt;
    ('&amp;lt;%= Encoder.encodeForHtml(Encoder.encodeForJavaScript( request.getParameter(&amp;quot;error&amp;quot;)%&amp;gt;')))&amp;quot; &lt;br /&gt;
    &amp;gt;An error occurred ....&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_ContextEncJscriptParams&amp;diff=161201</id>
		<title>CRV2 ContextEncJscriptParams</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_ContextEncJscriptParams&amp;diff=161201"/>
				<updated>2013-10-21T13:43:34Z</updated>
		
		<summary type="html">&lt;p&gt;EoinKeary: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Untrusted data, if being placed inside a Javascript function/code requires validation.&lt;br /&gt;
Unvalidated data may break out of the data context and wind up being executed in the code context on a users browser.&lt;br /&gt;
&lt;br /&gt;
'''Examples of exploitation points (sinks) which are worth reviewing for:'''&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;script&amp;gt;var currentValue=''''UNTRUSTED DATA'''';&amp;lt;/script&amp;gt; &lt;br /&gt;
     &amp;lt;script&amp;gt;someFunction(''''UNTRUSTED DATA'''');&amp;lt;/script&amp;gt; &lt;br /&gt;
     attack: ');'''/* BAD STUFF */'''&lt;br /&gt;
     &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Potential solutions:'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Java_HTML_Sanitizer_Project OWASP HTML sanatiser Project]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_JSON_Sanitizer OWASP JSON Sanitizer Project]&lt;br /&gt;
&lt;br /&gt;
ESAPI javascript escaping can be call in this manner:&lt;br /&gt;
     String safe = ESAPI.encoder().encodeForJavaScript( request.getParameter( &amp;quot;input&amp;quot; ) );&lt;br /&gt;
&lt;br /&gt;
'''Please note there are some JavaScript functions that can never safely use untrusted data as input - EVEN IF JAVASCRIPT ESCAPED!'''&lt;br /&gt;
 &lt;br /&gt;
For example: &lt;br /&gt;
     &lt;br /&gt;
     &amp;lt;script&amp;gt;&lt;br /&gt;
     window.setInterval('...EVEN IF YOU ESCAPE UNTRUSTED DATA YOU ARE XSSED HERE...');&lt;br /&gt;
     &amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''eval()'''&lt;br /&gt;
     var txtField = &amp;quot;A1&amp;quot;;&lt;br /&gt;
     var txtUserInput = &amp;quot;'test@google.ie';'''alert(1);'''&amp;quot;;&lt;br /&gt;
     '''eval'''(   &amp;quot;document.forms[0].&amp;quot; + txtField + &amp;quot;.value =&amp;quot; + A1);&lt;br /&gt;
&lt;br /&gt;
'''jquery'''&lt;br /&gt;
     var txtAlertMsg = &amp;quot;Hello World: &amp;quot;;&lt;br /&gt;
     var txtUserInput = &amp;quot;test&amp;lt;script&amp;gt;alert(1)&amp;lt;\/script&amp;gt;&amp;quot;;&lt;br /&gt;
     $(&amp;quot;#message&amp;quot;).'''html'''(   txtAlertMsg +&amp;quot;&amp;lt;b&amp;gt;&amp;quot; + txtUserInput + &amp;quot;&amp;lt;/b&amp;gt;&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
     Safe usage (use text, not html)&lt;br /&gt;
     $(&amp;quot;#userInput&amp;quot;).'''text'''(   &amp;quot;test&amp;lt;script&amp;gt;alert(1)&amp;lt;\/script&amp;gt;&amp;quot;);&amp;lt;-- treat user input as text&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Nested Contexts'''&lt;br /&gt;
Best to avoid such nested contexts: an element attribute calling a Javascript function etc&lt;br /&gt;
These contexts can really mess with your mind.&lt;br /&gt;
&lt;br /&gt;
     &lt;br /&gt;
     &amp;lt;div onclick=&amp;quot;showError('&amp;lt;%=request.getParameter(&amp;quot;errorxyz&amp;quot;)%&amp;gt;')&amp;quot; &amp;gt;An error occurred ....&amp;lt;/div&amp;gt;&lt;br /&gt;
     &lt;br /&gt;
     '''Here we have a HTML attribute(onClick) and within a nested Javascript function call (showError).'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When the browser processes this it will first HTML decode the contents of the onclick attribute.&lt;br /&gt;
It will pass the results to the JavaScript Interpreter. &lt;br /&gt;
So we have 2 contextx here...HTML and Javascript (2 browser parsers).&lt;br /&gt;
We need to apply “layered” encoding in the RIGHT order: &lt;br /&gt;
'''1) JavaScript encode''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''2) HTML Attribute Encode so it &amp;quot;unwinds&amp;quot; properly and is not vulnerable'''. &amp;lt;br&amp;gt;&lt;br /&gt;
     &lt;br /&gt;
    &amp;lt;div onclick=&amp;quot;showError&lt;br /&gt;
    ('&amp;lt;%= Encoder.encodeForHtml(Encoder.encodeForJavaScript( request.getParameter(&amp;quot;error&amp;quot;)%&amp;gt;')))&amp;quot; &lt;br /&gt;
    &amp;gt;An error occurred ....&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>EoinKeary</name></author>	</entry>

	</feed>