<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Fiona+Collins</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Fiona+Collins"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Fiona_Collins"/>
		<updated>2026-04-24T00:29:41Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193807</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193807"/>
				<updated>2015-04-21T21:22:32Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: /* Current Program */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
==Women in Application Security Program==&lt;br /&gt;
&lt;br /&gt;
The purpose of the Women in AppSec Program is to increase the participation of women in the field of application security. The program was successfully launched in 2011 at AppSec USA, and the aim is to run the program at every OWASP Global AppSec going forward. The Women in AppSec program is for any female interested in getting involved in AppSec or those already involved but looking to boost their career. This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
In 2015, this program is being re-launched at AppSec EU in Amsterndam, May 19 - 22 with the theme &amp;quot;Women in AppSec - Making it Happen&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regional conferences are encouraged to host the Women in AppSec program, as well. We encourage you to read this page in full, and reach out to us via the [http://www.tfaforms.com/308703 Contact Form] or [mailto:support@owasp.org OWASP Support] if you have any questions on how to successfully run the program at your event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC3.jpg| left|330px]]  &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:IMG_5579.JPG|left|325px]]&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC2.jpg|left|330px]] &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
*[https://www.isc2.org/PressReleaseDetails.aspx?id=11240 (ISC)²® Report Reveals Women's Perspective and Skills are Transforming the Information Security Industry October 29, 2013].&lt;br /&gt;
&lt;br /&gt;
*[https://www.youtube.com/watch?v=62i4o15NbgA&amp;amp;list=PLpr-xdpM8wG8ODR2zWs06JkMmlRiLyBXU&amp;amp;index=42 Women in AppSec Panel at AppSec USA 2013: Women in Information Security: Who Are We? Where Are We Going? Why? -- Joan Goodchild (Audio Only)]&lt;br /&gt;
&lt;br /&gt;
=ABOUT THE PROGRAM=&lt;br /&gt;
==Women in AppSec==&lt;br /&gt;
The OWASP Foundation, in recognition of value to both organizations and society, is working to support and enhance programs that increase the participation of women in the field of information and application security. The OWASP Foundation Women in AppSec Program provides merit-based funding for women to attend participating OWASP AppSec conferences. OWASP’s current program objective is to encourage female students at both the undergraduate and graduate levels, instructors, and professional working women who are dedicated to a career in information security and/or application development, to expand their skills and pursue application security. Interested applicants are encouraged to apply to the program running within their region of residence.&lt;br /&gt;
&lt;br /&gt;
==Current Program==&lt;br /&gt;
The program us currently being re-launched for AppSec EU 2015&amp;lt;br&amp;gt;&lt;br /&gt;
'''There is still work to be done - what can we do to Make it Happen?'''&amp;lt;br&amp;gt;&lt;br /&gt;
During AppSec EU there will be a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hope to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions will be open to all so we can help build support for the women around us. &lt;br /&gt;
&lt;br /&gt;
===Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;===&lt;br /&gt;
During this panel session we will discuss what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
===Workshop===&lt;br /&gt;
During the workshop we hope to introduce female attendees of the conference to what a career in App Sec can involve. We will teach them about application security and the many career paths available. We will be there to share our experiences and answer their questions to hopefully get them started on a career in AppSec. We hope to build relationships that may lead to a mentoring program for these women. &lt;br /&gt;
&lt;br /&gt;
==== Past Eligibility Criteria====&lt;br /&gt;
[[Image:IMG_5746.JPG|right|500x260px]]&lt;br /&gt;
Below is the list of eligibility criteria used to select the winners in 2013. &lt;br /&gt;
&lt;br /&gt;
* Has provided 2 responsive contacts as reference, and both references are familiar with the candidate, application security, and OWASP.&lt;br /&gt;
* Both references have provided letters of recommendation.&lt;br /&gt;
* Has relevant/appropriate achievement goals for attending the conference.&lt;br /&gt;
* Is the applicant from the region that the conference is taking place in.&lt;br /&gt;
* Has background in volunteering for OWASP or similar organizations.&lt;br /&gt;
* Has participated in one of OWASP's programs or activities?&lt;br /&gt;
* Is either studying, wishing to study, working in AppSec, or interested in working in AppSec.&lt;br /&gt;
* Has financial need.&lt;br /&gt;
* Is a paid OWASP member, and/or employer/school is an OWASP sponsor.&lt;br /&gt;
* Has an interest in exploring application security&lt;br /&gt;
&lt;br /&gt;
We encourage you to create your own set of criteria that will fit the Women In AppSec that you are planning within your region. The criteria above is meant to be a guideline of what has been used in the past.&lt;br /&gt;
&lt;br /&gt;
==Winners==&lt;br /&gt;
&lt;br /&gt;
In the past, we have typically had two winners selected for the sponsorship award; however, the number of winners depends on how much you can afford to sponsor. We recommend that you raise $3000 USD for each winner, at least. In the past, we have given each winner a free conference pass, one free training, and free travel and accommodation to attend the event. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--  &lt;br /&gt;
=GLOBAL CONFERENCES=&lt;br /&gt;
==Global AppSec Conferences==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec_APAC.jpg|right|x375px]] &lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in software security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific. Additionally, regional events are held in locations such as Brazil, China, India, Ireland, Israel, and Washington D.C just to name a few. The aim of the foundation is to bring the Women in AppSec Program to each of the four global conference taking place in 2014.&lt;br /&gt;
&lt;br /&gt;
==AppSec APAC==&lt;br /&gt;
&lt;br /&gt;
The AppSec APAC global conference takes place in the Asian-Pacific region. This conference is a reunion of local software security leaders, and aims to present cutting-edge ideas to attendees. OWASP events attract a worldwide audience interested in “what’s next”, and this global conference is no different. The conference is expected to draw 200-250 technologists each year from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many more. Women from the Asia-Pacific region are encouraged to apply to the program taking place during AppSec APAC. &lt;br /&gt;
&lt;br /&gt;
==AppSec EU==&lt;br /&gt;
&lt;br /&gt;
The AppSec EU global conference take place in the European region. Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers, travel to hear the cutting-edge ideas presented by the software security industry's top talent. This conference is expected to draw 400-500 attendees each year from various regions within the Europe and beyond. Women from the European region are encouraged to apply to the program taking place during AppSec EU Research &lt;br /&gt;
&lt;br /&gt;
==AppSec Latam==&lt;br /&gt;
&lt;br /&gt;
The AppSec LATAM global conference takes place in the Latin American region. AppSec LATAM is a reunion of Latin American, software security leaders, providing a platform to discuss, participate in, and innovate within the software security industry. The conference is expected to draw 200-250 attendees from the Latin American region and beyond. Women in the Latin American region are encouraged to apply to the program taking place during AppSec LATAM. &lt;br /&gt;
&lt;br /&gt;
==AppSec USA==&lt;br /&gt;
&lt;br /&gt;
The AppSec USA global conference takes place in the North American region. AppSec USA is a world-class software security conference for technologists, auditors, risk managers, and entrepreneurs, gathering the world's top practitioner, to share the latest research and practices. This conference is expected to draw over 300 attendees within the North American region. AppSec USA is typically OWASP's biggest conference of the year so women are encouraged to apply to the program taking place during AppSec USA if they live or will be traveling from within North America.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=PLANNING=&lt;br /&gt;
==Pre-Conference==&lt;br /&gt;
&lt;br /&gt;
The majority of the planning involved in running the Women in AppSec Program occurs before the conference or regional event. Below, you will find a brief outline of the tasks your team will have to take on. &lt;br /&gt;
&lt;br /&gt;
====Planning &amp;amp; Selection Team====&lt;br /&gt;
&lt;br /&gt;
The first step you will need to take care of is the selection of your planning and selection team. These are the individuals that will be helping you manage the pre-event planning process and the selection of the sessions during the event. You will typically need a team of 5-6 people. The selection committee will then be broken down into several sub-teams of one to two people who will then work on sponsorship, marketing, the grading process, and the call for entries. &lt;br /&gt;
&lt;br /&gt;
==== Sub-Team Roles ====&lt;br /&gt;
&lt;br /&gt;
'''Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
Two people should be responsible for developing the materials and seeking out sponsorships for the program. They will be in charge of creating the sponsorship packages, flyers, and seeking out sponsorship from other chapters and organizations.&lt;br /&gt;
&lt;br /&gt;
'''Marketing'''&lt;br /&gt;
&lt;br /&gt;
At least two people should be responsible for marketing the event. Their job will consist of putting together press releases, keeping the event planners updated on progress, and &lt;br /&gt;
communicating progress to the overall community. They will also be responsible for getting the message out when the team is ready to start accepting applicants. &lt;br /&gt;
&lt;br /&gt;
====Budget====&lt;br /&gt;
As mentioned above, it is up to your team to decide what it is you wish to do during the event - that will determine the budget. &lt;br /&gt;
&lt;br /&gt;
====Sponsorship====&lt;br /&gt;
It is very important to start reaching out to the overall OWASP community and their corporate contacts as potential sponsorship leads. Develop a Sponsorship Strategy and put together a sponsorship flyer outlining the program, what you are seeking, and the benefits of sponsorship. Give incentive for sponsorship and details about the program to get potential sponsors interested. Make sure to include the successes of past Women in AppSec conference events. Once you have your materials and sponsorship packages sorted, you can get started with sponsorship seeking activities. Below you will find an example of the Women in AppSec 2013 sponsorship flyer we sent out to potential sponsors. &lt;br /&gt;
&lt;br /&gt;
[http://appsecusa.org/2013/wp-content/uploads/2013/06/women-in-appsec-sponsorship.pdf Sample of 2013 Sponsorship Flyer]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==During the conference==&lt;br /&gt;
Be sure the engage the women attending the conference in the sessions you have organized: encourage them to not only attend but to be active participants. It's not all about the women try and encourage some men to get involved and attend also, for this initiative to be successful it must be inclusive.&lt;br /&gt;
&lt;br /&gt;
==Post-Conference==&lt;br /&gt;
&lt;br /&gt;
After the conference, it is very important to gather feedback from the participants to make sure they enjoyed the experience. Ask them for a brief description about their experience, with a picture attached for the website. Then write up a review and lessons learned page to document the experience with the program. Make sure to include what can be improved upon in the future.&lt;br /&gt;
&lt;br /&gt;
=ON THE DAY=&lt;br /&gt;
We want to be sure to engage the women there in the sessions organized, encourage them to not only attend but to be active participants. Its not all about the women so try and encourage some men to participate too, for this initiative to be successful it must be inclusive.&lt;br /&gt;
&lt;br /&gt;
==Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;==&lt;br /&gt;
During this panel session we will discuss what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
==Workshop==&lt;br /&gt;
During the workshop we hope to introduce female attendees of the conference to what a career in App Sec can involve. We will teach them about application security and the many career paths available. We will be there to share our experiences and answer their questions to hopefully get them started on a career in AppSec. We hope to build relationships that may lead to a mentoring program for these women. &lt;br /&gt;
&lt;br /&gt;
=PAST WINNERS=&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
==Carrie Schaper, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Nancy Lornston, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tara Wilson, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chandni Bhowmik, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=CONTACT=&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193806</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193806"/>
				<updated>2015-04-21T21:22:02Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
==Women in Application Security Program==&lt;br /&gt;
&lt;br /&gt;
The purpose of the Women in AppSec Program is to increase the participation of women in the field of application security. The program was successfully launched in 2011 at AppSec USA, and the aim is to run the program at every OWASP Global AppSec going forward. The Women in AppSec program is for any female interested in getting involved in AppSec or those already involved but looking to boost their career. This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
In 2015, this program is being re-launched at AppSec EU in Amsterndam, May 19 - 22 with the theme &amp;quot;Women in AppSec - Making it Happen&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regional conferences are encouraged to host the Women in AppSec program, as well. We encourage you to read this page in full, and reach out to us via the [http://www.tfaforms.com/308703 Contact Form] or [mailto:support@owasp.org OWASP Support] if you have any questions on how to successfully run the program at your event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC3.jpg| left|330px]]  &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:IMG_5579.JPG|left|325px]]&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC2.jpg|left|330px]] &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
*[https://www.isc2.org/PressReleaseDetails.aspx?id=11240 (ISC)²® Report Reveals Women's Perspective and Skills are Transforming the Information Security Industry October 29, 2013].&lt;br /&gt;
&lt;br /&gt;
*[https://www.youtube.com/watch?v=62i4o15NbgA&amp;amp;list=PLpr-xdpM8wG8ODR2zWs06JkMmlRiLyBXU&amp;amp;index=42 Women in AppSec Panel at AppSec USA 2013: Women in Information Security: Who Are We? Where Are We Going? Why? -- Joan Goodchild (Audio Only)]&lt;br /&gt;
&lt;br /&gt;
=ABOUT THE PROGRAM=&lt;br /&gt;
==Women in AppSec==&lt;br /&gt;
The OWASP Foundation, in recognition of value to both organizations and society, is working to support and enhance programs that increase the participation of women in the field of information and application security. The OWASP Foundation Women in AppSec Program provides merit-based funding for women to attend participating OWASP AppSec conferences. OWASP’s current program objective is to encourage female students at both the undergraduate and graduate levels, instructors, and professional working women who are dedicated to a career in information security and/or application development, to expand their skills and pursue application security. Interested applicants are encouraged to apply to the program running within their region of residence.&lt;br /&gt;
&lt;br /&gt;
==Current Program==&lt;br /&gt;
The program us currently being re-launched for AppSec EU 2015&amp;lt;br&amp;gt;&lt;br /&gt;
'''There is still work to be done - what can we do to Make it Happen?'''&amp;lt;br&amp;gt;&lt;br /&gt;
During AppSec EU there will be a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hope to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions will be open to all so we can help build support for the women around us. &lt;br /&gt;
&lt;br /&gt;
===Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;===&lt;br /&gt;
During this panel session we will discuss what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Workshop===&lt;br /&gt;
During the workshop we hope to introduce female attendees of the conference to what a career in App Sec can involve. We will teach them about application security and the many career paths available. We will be there to share our experiences and answer their questions to hopefully get them started on a career in AppSec. We hope to build relationships that may lead to a mentoring program for these women. &lt;br /&gt;
&lt;br /&gt;
=== Past Eligibility Criteria===&lt;br /&gt;
[[Image:IMG_5746.JPG|right|500x260px]]&lt;br /&gt;
Below is the list of eligibility criteria used to select the winners in 2013. &lt;br /&gt;
&lt;br /&gt;
* Has provided 2 responsive contacts as reference, and both references are familiar with the candidate, application security, and OWASP.&lt;br /&gt;
* Both references have provided letters of recommendation.&lt;br /&gt;
* Has relevant/appropriate achievement goals for attending the conference.&lt;br /&gt;
* Is the applicant from the region that the conference is taking place in.&lt;br /&gt;
* Has background in volunteering for OWASP or similar organizations.&lt;br /&gt;
* Has participated in one of OWASP's programs or activities?&lt;br /&gt;
* Is either studying, wishing to study, working in AppSec, or interested in working in AppSec.&lt;br /&gt;
* Has financial need.&lt;br /&gt;
* Is a paid OWASP member, and/or employer/school is an OWASP sponsor.&lt;br /&gt;
* Has an interest in exploring application security&lt;br /&gt;
&lt;br /&gt;
We encourage you to create your own set of criteria that will fit the Women In AppSec that you are planning within your region. The criteria above is meant to be a guideline of what has been used in the past.&lt;br /&gt;
&lt;br /&gt;
==Winners==&lt;br /&gt;
&lt;br /&gt;
In the past, we have typically had two winners selected for the sponsorship award; however, the number of winners depends on how much you can afford to sponsor. We recommend that you raise $3000 USD for each winner, at least. In the past, we have given each winner a free conference pass, one free training, and free travel and accommodation to attend the event. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--  &lt;br /&gt;
=GLOBAL CONFERENCES=&lt;br /&gt;
==Global AppSec Conferences==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec_APAC.jpg|right|x375px]] &lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in software security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific. Additionally, regional events are held in locations such as Brazil, China, India, Ireland, Israel, and Washington D.C just to name a few. The aim of the foundation is to bring the Women in AppSec Program to each of the four global conference taking place in 2014.&lt;br /&gt;
&lt;br /&gt;
==AppSec APAC==&lt;br /&gt;
&lt;br /&gt;
The AppSec APAC global conference takes place in the Asian-Pacific region. This conference is a reunion of local software security leaders, and aims to present cutting-edge ideas to attendees. OWASP events attract a worldwide audience interested in “what’s next”, and this global conference is no different. The conference is expected to draw 200-250 technologists each year from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many more. Women from the Asia-Pacific region are encouraged to apply to the program taking place during AppSec APAC. &lt;br /&gt;
&lt;br /&gt;
==AppSec EU==&lt;br /&gt;
&lt;br /&gt;
The AppSec EU global conference take place in the European region. Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers, travel to hear the cutting-edge ideas presented by the software security industry's top talent. This conference is expected to draw 400-500 attendees each year from various regions within the Europe and beyond. Women from the European region are encouraged to apply to the program taking place during AppSec EU Research &lt;br /&gt;
&lt;br /&gt;
==AppSec Latam==&lt;br /&gt;
&lt;br /&gt;
The AppSec LATAM global conference takes place in the Latin American region. AppSec LATAM is a reunion of Latin American, software security leaders, providing a platform to discuss, participate in, and innovate within the software security industry. The conference is expected to draw 200-250 attendees from the Latin American region and beyond. Women in the Latin American region are encouraged to apply to the program taking place during AppSec LATAM. &lt;br /&gt;
&lt;br /&gt;
==AppSec USA==&lt;br /&gt;
&lt;br /&gt;
The AppSec USA global conference takes place in the North American region. AppSec USA is a world-class software security conference for technologists, auditors, risk managers, and entrepreneurs, gathering the world's top practitioner, to share the latest research and practices. This conference is expected to draw over 300 attendees within the North American region. AppSec USA is typically OWASP's biggest conference of the year so women are encouraged to apply to the program taking place during AppSec USA if they live or will be traveling from within North America.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=PLANNING=&lt;br /&gt;
==Pre-Conference==&lt;br /&gt;
&lt;br /&gt;
The majority of the planning involved in running the Women in AppSec Program occurs before the conference or regional event. Below, you will find a brief outline of the tasks your team will have to take on. &lt;br /&gt;
&lt;br /&gt;
====Planning &amp;amp; Selection Team====&lt;br /&gt;
&lt;br /&gt;
The first step you will need to take care of is the selection of your planning and selection team. These are the individuals that will be helping you manage the pre-event planning process and the selection of the sessions during the event. You will typically need a team of 5-6 people. The selection committee will then be broken down into several sub-teams of one to two people who will then work on sponsorship, marketing, the grading process, and the call for entries. &lt;br /&gt;
&lt;br /&gt;
==== Sub-Team Roles ====&lt;br /&gt;
&lt;br /&gt;
'''Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
Two people should be responsible for developing the materials and seeking out sponsorships for the program. They will be in charge of creating the sponsorship packages, flyers, and seeking out sponsorship from other chapters and organizations.&lt;br /&gt;
&lt;br /&gt;
'''Marketing'''&lt;br /&gt;
&lt;br /&gt;
At least two people should be responsible for marketing the event. Their job will consist of putting together press releases, keeping the event planners updated on progress, and &lt;br /&gt;
communicating progress to the overall community. They will also be responsible for getting the message out when the team is ready to start accepting applicants. &lt;br /&gt;
&lt;br /&gt;
====Budget====&lt;br /&gt;
As mentioned above, it is up to your team to decide what it is you wish to do during the event - that will determine the budget. &lt;br /&gt;
&lt;br /&gt;
====Sponsorship====&lt;br /&gt;
It is very important to start reaching out to the overall OWASP community and their corporate contacts as potential sponsorship leads. Develop a Sponsorship Strategy and put together a sponsorship flyer outlining the program, what you are seeking, and the benefits of sponsorship. Give incentive for sponsorship and details about the program to get potential sponsors interested. Make sure to include the successes of past Women in AppSec conference events. Once you have your materials and sponsorship packages sorted, you can get started with sponsorship seeking activities. Below you will find an example of the Women in AppSec 2013 sponsorship flyer we sent out to potential sponsors. &lt;br /&gt;
&lt;br /&gt;
[http://appsecusa.org/2013/wp-content/uploads/2013/06/women-in-appsec-sponsorship.pdf Sample of 2013 Sponsorship Flyer]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==During the conference==&lt;br /&gt;
Be sure the engage the women attending the conference in the sessions you have organized: encourage them to not only attend but to be active participants. It's not all about the women try and encourage some men to get involved and attend also, for this initiative to be successful it must be inclusive.&lt;br /&gt;
&lt;br /&gt;
==Post-Conference==&lt;br /&gt;
&lt;br /&gt;
After the conference, it is very important to gather feedback from the participants to make sure they enjoyed the experience. Ask them for a brief description about their experience, with a picture attached for the website. Then write up a review and lessons learned page to document the experience with the program. Make sure to include what can be improved upon in the future.&lt;br /&gt;
&lt;br /&gt;
=ON THE DAY=&lt;br /&gt;
We want to be sure to engage the women there in the sessions organized, encourage them to not only attend but to be active participants. Its not all about the women so try and encourage some men to participate too, for this initiative to be successful it must be inclusive.&lt;br /&gt;
&lt;br /&gt;
==Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;==&lt;br /&gt;
During this panel session we will discuss what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
==Workshop==&lt;br /&gt;
During the workshop we hope to introduce female attendees of the conference to what a career in App Sec can involve. We will teach them about application security and the many career paths available. We will be there to share our experiences and answer their questions to hopefully get them started on a career in AppSec. We hope to build relationships that may lead to a mentoring program for these women. &lt;br /&gt;
&lt;br /&gt;
=PAST WINNERS=&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
==Carrie Schaper, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Nancy Lornston, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tara Wilson, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chandni Bhowmik, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=CONTACT=&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193805</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193805"/>
				<updated>2015-04-21T21:17:33Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: /* Current Program */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
==Women in Application Security Program==&lt;br /&gt;
&lt;br /&gt;
The purpose of the Women in AppSec Program is to increase the participation of women in the field of application security. The program was successfully launched in 2011 at AppSec USA, and the aim is to run the program at every OWASP Global AppSec going forward. The Women in AppSec program is for any female interested in getting involved in AppSec or those already involved but looking to boost their career. This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
In 2015, this program is being re-launched at AppSec EU in Amsterndam, May 19 - 22 with the theme &amp;quot;Women in AppSec - Making it Happen&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regional conferences are encouraged to host the Women in AppSec program, as well. We encourage you to read this page in full, and reach out to us via the [http://www.tfaforms.com/308703 Contact Form] or [mailto:support@owasp.org OWASP Support] if you have any questions on how to successfully run the program at your event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC3.jpg| left|330px]]  &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:IMG_5579.JPG|left|325px]]&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC2.jpg|left|330px]] &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
*[https://www.isc2.org/PressReleaseDetails.aspx?id=11240 (ISC)²® Report Reveals Women's Perspective and Skills are Transforming the Information Security Industry October 29, 2013].&lt;br /&gt;
&lt;br /&gt;
*[https://www.youtube.com/watch?v=62i4o15NbgA&amp;amp;list=PLpr-xdpM8wG8ODR2zWs06JkMmlRiLyBXU&amp;amp;index=42 Women in AppSec Panel at AppSec USA 2013: Women in Information Security: Who Are We? Where Are We Going? Why? -- Joan Goodchild (Audio Only)]&lt;br /&gt;
&lt;br /&gt;
=ABOUT THE PROGRAM=&lt;br /&gt;
==Women in AppSec==&lt;br /&gt;
The OWASP Foundation, in recognition of value to both organizations and society, is working to support and enhance programs that increase the participation of women in the field of information and application security. The OWASP Foundation Women in AppSec Program provides merit-based funding for women to attend participating OWASP AppSec conferences. OWASP’s current program objective is to encourage female students at both the undergraduate and graduate levels, instructors, and professional working women who are dedicated to a career in information security and/or application development, to expand their skills and pursue application security. Interested applicants are encouraged to apply to the program running within their region of residence.&lt;br /&gt;
&lt;br /&gt;
==Current Program==&lt;br /&gt;
The program us currently being re-launched for AppSec EU 2015&amp;lt;br&amp;gt;&lt;br /&gt;
'''There is still work to be done - what can we do to Make it Happen?'''&amp;lt;br&amp;gt;&lt;br /&gt;
During AppSec EU there will be a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hope to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions will be open to all so we can help build support for the women around us. &lt;br /&gt;
&lt;br /&gt;
===Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;===&lt;br /&gt;
During this panel session we will discuss what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Workshop===&lt;br /&gt;
During the workshop we hope to introduce female attendees of the conference to what a career in App Sec can involve. We will teach them about application security and the many career paths available. We will be there to share our experiences and answer their questions to hopefully get them started on a career in AppSec. We hope to build relationships that may lead to a mentoring program for these women. &lt;br /&gt;
&lt;br /&gt;
=== Past Eligibility Criteria===&lt;br /&gt;
[[Image:IMG_5746.JPG|right|500x260px]]&lt;br /&gt;
Below is the list of eligibility criteria used to select the winners in 2013. &lt;br /&gt;
&lt;br /&gt;
* Has provided 2 responsive contacts as reference, and both references are familiar with the candidate, application security, and OWASP.&lt;br /&gt;
* Both references have provided letters of recommendation.&lt;br /&gt;
* Has relevant/appropriate achievement goals for attending the conference.&lt;br /&gt;
* Is the applicant from the region that the conference is taking place in.&lt;br /&gt;
* Has background in volunteering for OWASP or similar organizations.&lt;br /&gt;
* Has participated in one of OWASP's programs or activities?&lt;br /&gt;
* Is either studying, wishing to study, working in AppSec, or interested in working in AppSec.&lt;br /&gt;
* Has financial need.&lt;br /&gt;
* Is a paid OWASP member, and/or employer/school is an OWASP sponsor.&lt;br /&gt;
* Has an interest in exploring application security&lt;br /&gt;
&lt;br /&gt;
We encourage you to create your own set of criteria that will fit the Women In AppSec that you are planning within your region. The criteria above is meant to be a guideline of what has been used in the past.&lt;br /&gt;
&lt;br /&gt;
==Winners==&lt;br /&gt;
&lt;br /&gt;
In the past, we have typically had two winners selected for the sponsorship award; however, the number of winners depends on how much you can afford to sponsor. We recommend that you raise $3000 USD for each winner, at least. In the past, we have given each winner a free conference pass, one free training, and free travel and accommodation to attend the event. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--  &lt;br /&gt;
=GLOBAL CONFERENCES=&lt;br /&gt;
==Global AppSec Conferences==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec_APAC.jpg|right|x375px]] &lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in software security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific. Additionally, regional events are held in locations such as Brazil, China, India, Ireland, Israel, and Washington D.C just to name a few. The aim of the foundation is to bring the Women in AppSec Program to each of the four global conference taking place in 2014.&lt;br /&gt;
&lt;br /&gt;
==AppSec APAC==&lt;br /&gt;
&lt;br /&gt;
The AppSec APAC global conference takes place in the Asian-Pacific region. This conference is a reunion of local software security leaders, and aims to present cutting-edge ideas to attendees. OWASP events attract a worldwide audience interested in “what’s next”, and this global conference is no different. The conference is expected to draw 200-250 technologists each year from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many more. Women from the Asia-Pacific region are encouraged to apply to the program taking place during AppSec APAC. &lt;br /&gt;
&lt;br /&gt;
==AppSec EU==&lt;br /&gt;
&lt;br /&gt;
The AppSec EU global conference take place in the European region. Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers, travel to hear the cutting-edge ideas presented by the software security industry's top talent. This conference is expected to draw 400-500 attendees each year from various regions within the Europe and beyond. Women from the European region are encouraged to apply to the program taking place during AppSec EU Research &lt;br /&gt;
&lt;br /&gt;
==AppSec Latam==&lt;br /&gt;
&lt;br /&gt;
The AppSec LATAM global conference takes place in the Latin American region. AppSec LATAM is a reunion of Latin American, software security leaders, providing a platform to discuss, participate in, and innovate within the software security industry. The conference is expected to draw 200-250 attendees from the Latin American region and beyond. Women in the Latin American region are encouraged to apply to the program taking place during AppSec LATAM. &lt;br /&gt;
&lt;br /&gt;
==AppSec USA==&lt;br /&gt;
&lt;br /&gt;
The AppSec USA global conference takes place in the North American region. AppSec USA is a world-class software security conference for technologists, auditors, risk managers, and entrepreneurs, gathering the world's top practitioner, to share the latest research and practices. This conference is expected to draw over 300 attendees within the North American region. AppSec USA is typically OWASP's biggest conference of the year so women are encouraged to apply to the program taking place during AppSec USA if they live or will be traveling from within North America.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=PLANNING=&lt;br /&gt;
==Pre-Conference==&lt;br /&gt;
&lt;br /&gt;
The majority of the planning involved in running the Women in AppSec Program occurs before the conference or regional event. Below, you will find a brief outline of the tasks your team will have to take on. &lt;br /&gt;
&lt;br /&gt;
====Planning &amp;amp; Selection Team====&lt;br /&gt;
&lt;br /&gt;
The first step you will need to take care of is the selection of your planning and selection team. These are the individuals that will be helping you manage the pre-event planning process and the selection of the sessions during the event. You will typically need a team of 5-6 people. The selection committee will then be broken down into several sub-teams of one to two people who will then work on sponsorship, marketing, the grading process, and the call for entries. &lt;br /&gt;
&lt;br /&gt;
==== Sub-Team Roles ====&lt;br /&gt;
&lt;br /&gt;
'''Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
Two people should be responsible for developing the materials and seeking out sponsorships for the program. They will be in charge of creating the sponsorship packages, flyers, and seeking out sponsorship from other chapters and organizations.&lt;br /&gt;
&lt;br /&gt;
'''Marketing'''&lt;br /&gt;
&lt;br /&gt;
At least two people should be responsible for marketing the event. Their job will consist of putting together press releases, keeping the event planners updated on progress, and &lt;br /&gt;
communicating progress to the overall community. They will also be responsible for getting the message out when the team is ready to start accepting applicants. &lt;br /&gt;
&lt;br /&gt;
====Budget====&lt;br /&gt;
As mentioned above, it is up to your team to decide what it is you wish to do during the event - that will determine the budget. &lt;br /&gt;
&lt;br /&gt;
====Sponsorship====&lt;br /&gt;
It is very important to start reaching out to the overall OWASP community and their corporate contacts as potential sponsorship leads. Develop a Sponsorship Strategy and put together a sponsorship flyer outlining the program, what you are seeking, and the benefits of sponsorship. Give incentive for sponsorship and details about the program to get potential sponsors interested. Make sure to include the successes of past Women in AppSec conference events. Once you have your materials and sponsorship packages sorted, you can get started with sponsorship seeking activities. Below you will find an example of the Women in AppSec 2013 sponsorship flyer we sent out to potential sponsors. &lt;br /&gt;
&lt;br /&gt;
[http://appsecusa.org/2013/wp-content/uploads/2013/06/women-in-appsec-sponsorship.pdf Sample of 2013 Sponsorship Flyer]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==During the conference==&lt;br /&gt;
Be sure the engage the women there in the sessions you have organized, encourage them to not only attend but to be active participants. Its not all about the women try and encourage some men too, for this initiative to be successful it must be inclusive.&lt;br /&gt;
&lt;br /&gt;
==Post-Conference==&lt;br /&gt;
&lt;br /&gt;
After the conference, it is very important to gather feedback from the participants to make sure they enjoyed the experience. Ask them for a brief description about their experience, with a picture attached for the website. Then write up a review and lessons learned page to document the experience with the program. Make sure to include what can be improved upon in the future.&lt;br /&gt;
&lt;br /&gt;
=ON THE DAY=&lt;br /&gt;
==Training Days==&lt;br /&gt;
Prior to the conference, the winners will arrive during the training workshops. Upon their arrival an OWASP volunteer will be around to greet them and take them to the trainings. This is to ensure that the winners are taken care of, and that they feel welcome and comfortable. The two training days prior to the conference should give the winners a chance to get to know local chapter volunteers and early attendees. Winners are encouraged to attend trainings that interest them and to mingle with fellow trainees. If there is a welcome event, winners should be encouraged to attend as well.&lt;br /&gt;
&lt;br /&gt;
==Conference Days==&lt;br /&gt;
During the two days of the conference an OWASP volunteer will be available to show the winners around, introduce them to staff members, and get them acquainted with conference goers. The volunteer will also be responsible for getting the winners to the Women in AppSec scheduled activities, if any are planned. The volunteers should be made available if the winners have any questions or need help with anything. It is important that the winners get the full OWASP AppSec experience. This includes attending sessions of interests and encouraging winners to participate in the various activities provided at the Global AppSecs. &lt;br /&gt;
&lt;br /&gt;
=PAST WINNERS=&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
==Carrie Schaper, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Nancy Lornston, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tara Wilson, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chandni Bhowmik, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=CONTACT=&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193804</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193804"/>
				<updated>2015-04-21T21:16:39Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: /* ABOUT THE PROGRAM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
==Women in Application Security Program==&lt;br /&gt;
&lt;br /&gt;
The purpose of the Women in AppSec Program is to increase the participation of women in the field of application security. The program was successfully launched in 2011 at AppSec USA, and the aim is to run the program at every OWASP Global AppSec going forward. The Women in AppSec program is for any female interested in getting involved in AppSec or those already involved but looking to boost their career. This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
In 2015, this program is being re-launched at AppSec EU in Amsterndam, May 19 - 22 with the theme &amp;quot;Women in AppSec - Making it Happen&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regional conferences are encouraged to host the Women in AppSec program, as well. We encourage you to read this page in full, and reach out to us via the [http://www.tfaforms.com/308703 Contact Form] or [mailto:support@owasp.org OWASP Support] if you have any questions on how to successfully run the program at your event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC3.jpg| left|330px]]  &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:IMG_5579.JPG|left|325px]]&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC2.jpg|left|330px]] &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
*[https://www.isc2.org/PressReleaseDetails.aspx?id=11240 (ISC)²® Report Reveals Women's Perspective and Skills are Transforming the Information Security Industry October 29, 2013].&lt;br /&gt;
&lt;br /&gt;
*[https://www.youtube.com/watch?v=62i4o15NbgA&amp;amp;list=PLpr-xdpM8wG8ODR2zWs06JkMmlRiLyBXU&amp;amp;index=42 Women in AppSec Panel at AppSec USA 2013: Women in Information Security: Who Are We? Where Are We Going? Why? -- Joan Goodchild (Audio Only)]&lt;br /&gt;
&lt;br /&gt;
=ABOUT THE PROGRAM=&lt;br /&gt;
==Women in AppSec==&lt;br /&gt;
The OWASP Foundation, in recognition of value to both organizations and society, is working to support and enhance programs that increase the participation of women in the field of information and application security. The OWASP Foundation Women in AppSec Program provides merit-based funding for women to attend participating OWASP AppSec conferences. OWASP’s current program objective is to encourage female students at both the undergraduate and graduate levels, instructors, and professional working women who are dedicated to a career in information security and/or application development, to expand their skills and pursue application security. Interested applicants are encouraged to apply to the program running within their region of residence.&lt;br /&gt;
&lt;br /&gt;
==Current Program==&lt;br /&gt;
The program us currently being re-launched for AppSec EU 2015&lt;br /&gt;
'There is still work to be done - what can we do to Make it Happen?'&lt;br /&gt;
During AppSec EU there will be a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hope to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions will be open to all so we can help build support for the women around us. &lt;br /&gt;
&lt;br /&gt;
===Panel: &amp;quot;Women in AppSec - Making it Happen&amp;quot;===&lt;br /&gt;
During this panel session we will discuss what can be done to Make it Happen for Women in AppSec going forward. What have those currently working in the field done to Make it Happen for themselves and other women; what tips and advice do they have to help you do to make a career for yourself or encourage those around you (sister, friend, daughter, etc…) to pursue a career in AppSec? What can we as professionals can do to help encourage girls to go for a career in AppSec?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Workshop===&lt;br /&gt;
During the workshop we hope to introduce female attendees of the conference to what a career in App Sec can involve. We will teach them about application security and the many career paths available. We will be there to share our experiences and answer their questions to hopefully get them started on a career in AppSec. We hope to build relationships that may lead to a mentoring program for these women. &lt;br /&gt;
&lt;br /&gt;
=== Past Eligibility Criteria===&lt;br /&gt;
[[Image:IMG_5746.JPG|right|500x260px]]&lt;br /&gt;
Below is the list of eligibility criteria used to select the winners in 2013. &lt;br /&gt;
&lt;br /&gt;
* Has provided 2 responsive contacts as reference, and both references are familiar with the candidate, application security, and OWASP.&lt;br /&gt;
* Both references have provided letters of recommendation.&lt;br /&gt;
* Has relevant/appropriate achievement goals for attending the conference.&lt;br /&gt;
* Is the applicant from the region that the conference is taking place in.&lt;br /&gt;
* Has background in volunteering for OWASP or similar organizations.&lt;br /&gt;
* Has participated in one of OWASP's programs or activities?&lt;br /&gt;
* Is either studying, wishing to study, working in AppSec, or interested in working in AppSec.&lt;br /&gt;
* Has financial need.&lt;br /&gt;
* Is a paid OWASP member, and/or employer/school is an OWASP sponsor.&lt;br /&gt;
* Has an interest in exploring application security&lt;br /&gt;
&lt;br /&gt;
We encourage you to create your own set of criteria that will fit the Women In AppSec that you are planning within your region. The criteria above is meant to be a guideline of what has been used in the past.&lt;br /&gt;
&lt;br /&gt;
==Winners==&lt;br /&gt;
&lt;br /&gt;
In the past, we have typically had two winners selected for the sponsorship award; however, the number of winners depends on how much you can afford to sponsor. We recommend that you raise $3000 USD for each winner, at least. In the past, we have given each winner a free conference pass, one free training, and free travel and accommodation to attend the event. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--  &lt;br /&gt;
=GLOBAL CONFERENCES=&lt;br /&gt;
==Global AppSec Conferences==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec_APAC.jpg|right|x375px]] &lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in software security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific. Additionally, regional events are held in locations such as Brazil, China, India, Ireland, Israel, and Washington D.C just to name a few. The aim of the foundation is to bring the Women in AppSec Program to each of the four global conference taking place in 2014.&lt;br /&gt;
&lt;br /&gt;
==AppSec APAC==&lt;br /&gt;
&lt;br /&gt;
The AppSec APAC global conference takes place in the Asian-Pacific region. This conference is a reunion of local software security leaders, and aims to present cutting-edge ideas to attendees. OWASP events attract a worldwide audience interested in “what’s next”, and this global conference is no different. The conference is expected to draw 200-250 technologists each year from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many more. Women from the Asia-Pacific region are encouraged to apply to the program taking place during AppSec APAC. &lt;br /&gt;
&lt;br /&gt;
==AppSec EU==&lt;br /&gt;
&lt;br /&gt;
The AppSec EU global conference take place in the European region. Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers, travel to hear the cutting-edge ideas presented by the software security industry's top talent. This conference is expected to draw 400-500 attendees each year from various regions within the Europe and beyond. Women from the European region are encouraged to apply to the program taking place during AppSec EU Research &lt;br /&gt;
&lt;br /&gt;
==AppSec Latam==&lt;br /&gt;
&lt;br /&gt;
The AppSec LATAM global conference takes place in the Latin American region. AppSec LATAM is a reunion of Latin American, software security leaders, providing a platform to discuss, participate in, and innovate within the software security industry. The conference is expected to draw 200-250 attendees from the Latin American region and beyond. Women in the Latin American region are encouraged to apply to the program taking place during AppSec LATAM. &lt;br /&gt;
&lt;br /&gt;
==AppSec USA==&lt;br /&gt;
&lt;br /&gt;
The AppSec USA global conference takes place in the North American region. AppSec USA is a world-class software security conference for technologists, auditors, risk managers, and entrepreneurs, gathering the world's top practitioner, to share the latest research and practices. This conference is expected to draw over 300 attendees within the North American region. AppSec USA is typically OWASP's biggest conference of the year so women are encouraged to apply to the program taking place during AppSec USA if they live or will be traveling from within North America.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=PLANNING=&lt;br /&gt;
==Pre-Conference==&lt;br /&gt;
&lt;br /&gt;
The majority of the planning involved in running the Women in AppSec Program occurs before the conference or regional event. Below, you will find a brief outline of the tasks your team will have to take on. &lt;br /&gt;
&lt;br /&gt;
====Planning &amp;amp; Selection Team====&lt;br /&gt;
&lt;br /&gt;
The first step you will need to take care of is the selection of your planning and selection team. These are the individuals that will be helping you manage the pre-event planning process and the selection of the sessions during the event. You will typically need a team of 5-6 people. The selection committee will then be broken down into several sub-teams of one to two people who will then work on sponsorship, marketing, the grading process, and the call for entries. &lt;br /&gt;
&lt;br /&gt;
==== Sub-Team Roles ====&lt;br /&gt;
&lt;br /&gt;
'''Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
Two people should be responsible for developing the materials and seeking out sponsorships for the program. They will be in charge of creating the sponsorship packages, flyers, and seeking out sponsorship from other chapters and organizations.&lt;br /&gt;
&lt;br /&gt;
'''Marketing'''&lt;br /&gt;
&lt;br /&gt;
At least two people should be responsible for marketing the event. Their job will consist of putting together press releases, keeping the event planners updated on progress, and &lt;br /&gt;
communicating progress to the overall community. They will also be responsible for getting the message out when the team is ready to start accepting applicants. &lt;br /&gt;
&lt;br /&gt;
====Budget====&lt;br /&gt;
As mentioned above, it is up to your team to decide what it is you wish to do during the event - that will determine the budget. &lt;br /&gt;
&lt;br /&gt;
====Sponsorship====&lt;br /&gt;
It is very important to start reaching out to the overall OWASP community and their corporate contacts as potential sponsorship leads. Develop a Sponsorship Strategy and put together a sponsorship flyer outlining the program, what you are seeking, and the benefits of sponsorship. Give incentive for sponsorship and details about the program to get potential sponsors interested. Make sure to include the successes of past Women in AppSec conference events. Once you have your materials and sponsorship packages sorted, you can get started with sponsorship seeking activities. Below you will find an example of the Women in AppSec 2013 sponsorship flyer we sent out to potential sponsors. &lt;br /&gt;
&lt;br /&gt;
[http://appsecusa.org/2013/wp-content/uploads/2013/06/women-in-appsec-sponsorship.pdf Sample of 2013 Sponsorship Flyer]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==During the conference==&lt;br /&gt;
Be sure the engage the women there in the sessions you have organized, encourage them to not only attend but to be active participants. Its not all about the women try and encourage some men too, for this initiative to be successful it must be inclusive.&lt;br /&gt;
&lt;br /&gt;
==Post-Conference==&lt;br /&gt;
&lt;br /&gt;
After the conference, it is very important to gather feedback from the participants to make sure they enjoyed the experience. Ask them for a brief description about their experience, with a picture attached for the website. Then write up a review and lessons learned page to document the experience with the program. Make sure to include what can be improved upon in the future.&lt;br /&gt;
&lt;br /&gt;
=ON THE DAY=&lt;br /&gt;
==Training Days==&lt;br /&gt;
Prior to the conference, the winners will arrive during the training workshops. Upon their arrival an OWASP volunteer will be around to greet them and take them to the trainings. This is to ensure that the winners are taken care of, and that they feel welcome and comfortable. The two training days prior to the conference should give the winners a chance to get to know local chapter volunteers and early attendees. Winners are encouraged to attend trainings that interest them and to mingle with fellow trainees. If there is a welcome event, winners should be encouraged to attend as well.&lt;br /&gt;
&lt;br /&gt;
==Conference Days==&lt;br /&gt;
During the two days of the conference an OWASP volunteer will be available to show the winners around, introduce them to staff members, and get them acquainted with conference goers. The volunteer will also be responsible for getting the winners to the Women in AppSec scheduled activities, if any are planned. The volunteers should be made available if the winners have any questions or need help with anything. It is important that the winners get the full OWASP AppSec experience. This includes attending sessions of interests and encouraging winners to participate in the various activities provided at the Global AppSecs. &lt;br /&gt;
&lt;br /&gt;
=PAST WINNERS=&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
==Carrie Schaper, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Nancy Lornston, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tara Wilson, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chandni Bhowmik, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=CONTACT=&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193802</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193802"/>
				<updated>2015-04-21T21:10:41Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: /* During the conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
==Women in Application Security Program==&lt;br /&gt;
&lt;br /&gt;
The purpose of the Women in AppSec Program is to increase the participation of women in the field of application security. The program was successfully launched in 2011 at AppSec USA, and the aim is to run the program at every OWASP Global AppSec going forward. The Women in AppSec program is for any female interested in getting involved in AppSec or those already involved but looking to boost their career. This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
In 2015, this program is being re-launched at AppSec EU in Amsterndam, May 19 - 22 with the theme &amp;quot;Women in AppSec - Making it Happen&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regional conferences are encouraged to host the Women in AppSec program, as well. We encourage you to read this page in full, and reach out to us via the [http://www.tfaforms.com/308703 Contact Form] or [mailto:support@owasp.org OWASP Support] if you have any questions on how to successfully run the program at your event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC3.jpg| left|330px]]  &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:IMG_5579.JPG|left|325px]]&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC2.jpg|left|330px]] &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
*[https://www.isc2.org/PressReleaseDetails.aspx?id=11240 (ISC)²® Report Reveals Women's Perspective and Skills are Transforming the Information Security Industry October 29, 2013].&lt;br /&gt;
&lt;br /&gt;
*[https://www.youtube.com/watch?v=62i4o15NbgA&amp;amp;list=PLpr-xdpM8wG8ODR2zWs06JkMmlRiLyBXU&amp;amp;index=42 Women in AppSec Panel at AppSec USA 2013: Women in Information Security: Who Are We? Where Are We Going? Why? -- Joan Goodchild (Audio Only)]&lt;br /&gt;
&lt;br /&gt;
=ABOUT THE PROGRAM=&lt;br /&gt;
==Women in AppSec==&lt;br /&gt;
The OWASP Foundation, in recognition of value to both organizations and society, is working to support and enhance programs that increase the participation of women in the field of information and application security. The OWASP Foundation Women in AppSec Program provides merit-based funding for women to attend participating OWASP AppSec conferences. OWASP’s current program objective is to encourage female students at both the undergraduate and graduate levels, instructors, and professional working women who are dedicated to a career in information security and/or application development, to expand their skills and pursue application security. Interested applicants are encouraged to apply to the program running within their region of residence.&lt;br /&gt;
&lt;br /&gt;
==Current Program==&lt;br /&gt;
The program us currently being re-launched for AppSec EU 2015&lt;br /&gt;
===There is still work to be done - what can we do to Make it Happen?===&lt;br /&gt;
During AppSec EU there will be a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hope to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions will be open to all so we can help build support for the women around us. &lt;br /&gt;
&lt;br /&gt;
=== Past Eligibility Criteria===&lt;br /&gt;
[[Image:IMG_5746.JPG|right|500x260px]]&lt;br /&gt;
Below is the list of eligibility criteria used to select the winners in 2013. &lt;br /&gt;
&lt;br /&gt;
* Has provided 2 responsive contacts as reference, and both references are familiar with the candidate, application security, and OWASP.&lt;br /&gt;
* Both references have provided letters of recommendation.&lt;br /&gt;
* Has relevant/appropriate achievement goals for attending the conference.&lt;br /&gt;
* Is the applicant from the region that the conference is taking place in.&lt;br /&gt;
* Has background in volunteering for OWASP or similar organizations.&lt;br /&gt;
* Has participated in one of OWASP's programs or activities?&lt;br /&gt;
* Is either studying, wishing to study, working in AppSec, or interested in working in AppSec.&lt;br /&gt;
* Has financial need.&lt;br /&gt;
* Is a paid OWASP member, and/or employer/school is an OWASP sponsor.&lt;br /&gt;
* Has an interest in exploring application security&lt;br /&gt;
&lt;br /&gt;
We encourage you to create your own set of criteria that will fit the Women In AppSec that you are planning within your region. The criteria above is meant to be a guideline of what has been used in the past.&lt;br /&gt;
&lt;br /&gt;
==Winners==&lt;br /&gt;
&lt;br /&gt;
In the past, we have typically had two winners selected for the sponsorship award; however, the number of winners depends on how much you can afford to sponsor. We recommend that you raise $3000 USD for each winner, at least. In the past, we have given each winner a free conference pass, one free training, and free travel and accommodation to attend the event. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--  &lt;br /&gt;
=GLOBAL CONFERENCES=&lt;br /&gt;
==Global AppSec Conferences==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec_APAC.jpg|right|x375px]] &lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in software security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific. Additionally, regional events are held in locations such as Brazil, China, India, Ireland, Israel, and Washington D.C just to name a few. The aim of the foundation is to bring the Women in AppSec Program to each of the four global conference taking place in 2014.&lt;br /&gt;
&lt;br /&gt;
==AppSec APAC==&lt;br /&gt;
&lt;br /&gt;
The AppSec APAC global conference takes place in the Asian-Pacific region. This conference is a reunion of local software security leaders, and aims to present cutting-edge ideas to attendees. OWASP events attract a worldwide audience interested in “what’s next”, and this global conference is no different. The conference is expected to draw 200-250 technologists each year from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many more. Women from the Asia-Pacific region are encouraged to apply to the program taking place during AppSec APAC. &lt;br /&gt;
&lt;br /&gt;
==AppSec EU==&lt;br /&gt;
&lt;br /&gt;
The AppSec EU global conference take place in the European region. Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers, travel to hear the cutting-edge ideas presented by the software security industry's top talent. This conference is expected to draw 400-500 attendees each year from various regions within the Europe and beyond. Women from the European region are encouraged to apply to the program taking place during AppSec EU Research &lt;br /&gt;
&lt;br /&gt;
==AppSec Latam==&lt;br /&gt;
&lt;br /&gt;
The AppSec LATAM global conference takes place in the Latin American region. AppSec LATAM is a reunion of Latin American, software security leaders, providing a platform to discuss, participate in, and innovate within the software security industry. The conference is expected to draw 200-250 attendees from the Latin American region and beyond. Women in the Latin American region are encouraged to apply to the program taking place during AppSec LATAM. &lt;br /&gt;
&lt;br /&gt;
==AppSec USA==&lt;br /&gt;
&lt;br /&gt;
The AppSec USA global conference takes place in the North American region. AppSec USA is a world-class software security conference for technologists, auditors, risk managers, and entrepreneurs, gathering the world's top practitioner, to share the latest research and practices. This conference is expected to draw over 300 attendees within the North American region. AppSec USA is typically OWASP's biggest conference of the year so women are encouraged to apply to the program taking place during AppSec USA if they live or will be traveling from within North America.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=PLANNING=&lt;br /&gt;
==Pre-Conference==&lt;br /&gt;
&lt;br /&gt;
The majority of the planning involved in running the Women in AppSec Program occurs before the conference or regional event. Below, you will find a brief outline of the tasks your team will have to take on. &lt;br /&gt;
&lt;br /&gt;
====Planning &amp;amp; Selection Team====&lt;br /&gt;
&lt;br /&gt;
The first step you will need to take care of is the selection of your planning and selection team. These are the individuals that will be helping you manage the pre-event planning process and the selection of the sessions during the event. You will typically need a team of 5-6 people. The selection committee will then be broken down into several sub-teams of one to two people who will then work on sponsorship, marketing, the grading process, and the call for entries. &lt;br /&gt;
&lt;br /&gt;
==== Sub-Team Roles ====&lt;br /&gt;
&lt;br /&gt;
'''Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
Two people should be responsible for developing the materials and seeking out sponsorships for the program. They will be in charge of creating the sponsorship packages, flyers, and seeking out sponsorship from other chapters and organizations.&lt;br /&gt;
&lt;br /&gt;
'''Marketing'''&lt;br /&gt;
&lt;br /&gt;
At least two people should be responsible for marketing the event. Their job will consist of putting together press releases, keeping the event planners updated on progress, and &lt;br /&gt;
communicating progress to the overall community. They will also be responsible for getting the message out when the team is ready to start accepting applicants. &lt;br /&gt;
&lt;br /&gt;
====Budget====&lt;br /&gt;
As mentioned above, it is up to your team to decide what it is you wish to do during the event - that will determine the budget. &lt;br /&gt;
&lt;br /&gt;
====Sponsorship====&lt;br /&gt;
It is very important to start reaching out to the overall OWASP community and their corporate contacts as potential sponsorship leads. Develop a Sponsorship Strategy and put together a sponsorship flyer outlining the program, what you are seeking, and the benefits of sponsorship. Give incentive for sponsorship and details about the program to get potential sponsors interested. Make sure to include the successes of past Women in AppSec conference events. Once you have your materials and sponsorship packages sorted, you can get started with sponsorship seeking activities. Below you will find an example of the Women in AppSec 2013 sponsorship flyer we sent out to potential sponsors. &lt;br /&gt;
&lt;br /&gt;
[http://appsecusa.org/2013/wp-content/uploads/2013/06/women-in-appsec-sponsorship.pdf Sample of 2013 Sponsorship Flyer]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==During the conference==&lt;br /&gt;
Be sure the engage the women there in the sessions you have organized, encourage them to not only attend but to be active participants. Its not all about the women try and encourage some men too, for this initiative to be successful it must be inclusive.&lt;br /&gt;
&lt;br /&gt;
==Post-Conference==&lt;br /&gt;
&lt;br /&gt;
After the conference, it is very important to gather feedback from the participants to make sure they enjoyed the experience. Ask them for a brief description about their experience, with a picture attached for the website. Then write up a review and lessons learned page to document the experience with the program. Make sure to include what can be improved upon in the future.&lt;br /&gt;
&lt;br /&gt;
=ON THE DAY=&lt;br /&gt;
==Training Days==&lt;br /&gt;
Prior to the conference, the winners will arrive during the training workshops. Upon their arrival an OWASP volunteer will be around to greet them and take them to the trainings. This is to ensure that the winners are taken care of, and that they feel welcome and comfortable. The two training days prior to the conference should give the winners a chance to get to know local chapter volunteers and early attendees. Winners are encouraged to attend trainings that interest them and to mingle with fellow trainees. If there is a welcome event, winners should be encouraged to attend as well.&lt;br /&gt;
&lt;br /&gt;
==Conference Days==&lt;br /&gt;
During the two days of the conference an OWASP volunteer will be available to show the winners around, introduce them to staff members, and get them acquainted with conference goers. The volunteer will also be responsible for getting the winners to the Women in AppSec scheduled activities, if any are planned. The volunteers should be made available if the winners have any questions or need help with anything. It is important that the winners get the full OWASP AppSec experience. This includes attending sessions of interests and encouraging winners to participate in the various activities provided at the Global AppSecs. &lt;br /&gt;
&lt;br /&gt;
=PAST WINNERS=&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
==Carrie Schaper, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Nancy Lornston, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tara Wilson, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chandni Bhowmik, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=CONTACT=&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193801</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193801"/>
				<updated>2015-04-21T21:10:22Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: /* PLANNING */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
==Women in Application Security Program==&lt;br /&gt;
&lt;br /&gt;
The purpose of the Women in AppSec Program is to increase the participation of women in the field of application security. The program was successfully launched in 2011 at AppSec USA, and the aim is to run the program at every OWASP Global AppSec going forward. The Women in AppSec program is for any female interested in getting involved in AppSec or those already involved but looking to boost their career. This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
In 2015, this program is being re-launched at AppSec EU in Amsterndam, May 19 - 22 with the theme &amp;quot;Women in AppSec - Making it Happen&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regional conferences are encouraged to host the Women in AppSec program, as well. We encourage you to read this page in full, and reach out to us via the [http://www.tfaforms.com/308703 Contact Form] or [mailto:support@owasp.org OWASP Support] if you have any questions on how to successfully run the program at your event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC3.jpg| left|330px]]  &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:IMG_5579.JPG|left|325px]]&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC2.jpg|left|330px]] &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
*[https://www.isc2.org/PressReleaseDetails.aspx?id=11240 (ISC)²® Report Reveals Women's Perspective and Skills are Transforming the Information Security Industry October 29, 2013].&lt;br /&gt;
&lt;br /&gt;
*[https://www.youtube.com/watch?v=62i4o15NbgA&amp;amp;list=PLpr-xdpM8wG8ODR2zWs06JkMmlRiLyBXU&amp;amp;index=42 Women in AppSec Panel at AppSec USA 2013: Women in Information Security: Who Are We? Where Are We Going? Why? -- Joan Goodchild (Audio Only)]&lt;br /&gt;
&lt;br /&gt;
=ABOUT THE PROGRAM=&lt;br /&gt;
==Women in AppSec==&lt;br /&gt;
The OWASP Foundation, in recognition of value to both organizations and society, is working to support and enhance programs that increase the participation of women in the field of information and application security. The OWASP Foundation Women in AppSec Program provides merit-based funding for women to attend participating OWASP AppSec conferences. OWASP’s current program objective is to encourage female students at both the undergraduate and graduate levels, instructors, and professional working women who are dedicated to a career in information security and/or application development, to expand their skills and pursue application security. Interested applicants are encouraged to apply to the program running within their region of residence.&lt;br /&gt;
&lt;br /&gt;
==Current Program==&lt;br /&gt;
The program us currently being re-launched for AppSec EU 2015&lt;br /&gt;
===There is still work to be done - what can we do to Make it Happen?===&lt;br /&gt;
During AppSec EU there will be a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hope to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions will be open to all so we can help build support for the women around us. &lt;br /&gt;
&lt;br /&gt;
=== Past Eligibility Criteria===&lt;br /&gt;
[[Image:IMG_5746.JPG|right|500x260px]]&lt;br /&gt;
Below is the list of eligibility criteria used to select the winners in 2013. &lt;br /&gt;
&lt;br /&gt;
* Has provided 2 responsive contacts as reference, and both references are familiar with the candidate, application security, and OWASP.&lt;br /&gt;
* Both references have provided letters of recommendation.&lt;br /&gt;
* Has relevant/appropriate achievement goals for attending the conference.&lt;br /&gt;
* Is the applicant from the region that the conference is taking place in.&lt;br /&gt;
* Has background in volunteering for OWASP or similar organizations.&lt;br /&gt;
* Has participated in one of OWASP's programs or activities?&lt;br /&gt;
* Is either studying, wishing to study, working in AppSec, or interested in working in AppSec.&lt;br /&gt;
* Has financial need.&lt;br /&gt;
* Is a paid OWASP member, and/or employer/school is an OWASP sponsor.&lt;br /&gt;
* Has an interest in exploring application security&lt;br /&gt;
&lt;br /&gt;
We encourage you to create your own set of criteria that will fit the Women In AppSec that you are planning within your region. The criteria above is meant to be a guideline of what has been used in the past.&lt;br /&gt;
&lt;br /&gt;
==Winners==&lt;br /&gt;
&lt;br /&gt;
In the past, we have typically had two winners selected for the sponsorship award; however, the number of winners depends on how much you can afford to sponsor. We recommend that you raise $3000 USD for each winner, at least. In the past, we have given each winner a free conference pass, one free training, and free travel and accommodation to attend the event. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--  &lt;br /&gt;
=GLOBAL CONFERENCES=&lt;br /&gt;
==Global AppSec Conferences==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec_APAC.jpg|right|x375px]] &lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in software security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific. Additionally, regional events are held in locations such as Brazil, China, India, Ireland, Israel, and Washington D.C just to name a few. The aim of the foundation is to bring the Women in AppSec Program to each of the four global conference taking place in 2014.&lt;br /&gt;
&lt;br /&gt;
==AppSec APAC==&lt;br /&gt;
&lt;br /&gt;
The AppSec APAC global conference takes place in the Asian-Pacific region. This conference is a reunion of local software security leaders, and aims to present cutting-edge ideas to attendees. OWASP events attract a worldwide audience interested in “what’s next”, and this global conference is no different. The conference is expected to draw 200-250 technologists each year from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many more. Women from the Asia-Pacific region are encouraged to apply to the program taking place during AppSec APAC. &lt;br /&gt;
&lt;br /&gt;
==AppSec EU==&lt;br /&gt;
&lt;br /&gt;
The AppSec EU global conference take place in the European region. Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers, travel to hear the cutting-edge ideas presented by the software security industry's top talent. This conference is expected to draw 400-500 attendees each year from various regions within the Europe and beyond. Women from the European region are encouraged to apply to the program taking place during AppSec EU Research &lt;br /&gt;
&lt;br /&gt;
==AppSec Latam==&lt;br /&gt;
&lt;br /&gt;
The AppSec LATAM global conference takes place in the Latin American region. AppSec LATAM is a reunion of Latin American, software security leaders, providing a platform to discuss, participate in, and innovate within the software security industry. The conference is expected to draw 200-250 attendees from the Latin American region and beyond. Women in the Latin American region are encouraged to apply to the program taking place during AppSec LATAM. &lt;br /&gt;
&lt;br /&gt;
==AppSec USA==&lt;br /&gt;
&lt;br /&gt;
The AppSec USA global conference takes place in the North American region. AppSec USA is a world-class software security conference for technologists, auditors, risk managers, and entrepreneurs, gathering the world's top practitioner, to share the latest research and practices. This conference is expected to draw over 300 attendees within the North American region. AppSec USA is typically OWASP's biggest conference of the year so women are encouraged to apply to the program taking place during AppSec USA if they live or will be traveling from within North America.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=PLANNING=&lt;br /&gt;
==Pre-Conference==&lt;br /&gt;
&lt;br /&gt;
The majority of the planning involved in running the Women in AppSec Program occurs before the conference or regional event. Below, you will find a brief outline of the tasks your team will have to take on. &lt;br /&gt;
&lt;br /&gt;
====Planning &amp;amp; Selection Team====&lt;br /&gt;
&lt;br /&gt;
The first step you will need to take care of is the selection of your planning and selection team. These are the individuals that will be helping you manage the pre-event planning process and the selection of the sessions during the event. You will typically need a team of 5-6 people. The selection committee will then be broken down into several sub-teams of one to two people who will then work on sponsorship, marketing, the grading process, and the call for entries. &lt;br /&gt;
&lt;br /&gt;
==== Sub-Team Roles ====&lt;br /&gt;
&lt;br /&gt;
'''Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
Two people should be responsible for developing the materials and seeking out sponsorships for the program. They will be in charge of creating the sponsorship packages, flyers, and seeking out sponsorship from other chapters and organizations.&lt;br /&gt;
&lt;br /&gt;
'''Marketing'''&lt;br /&gt;
&lt;br /&gt;
At least two people should be responsible for marketing the event. Their job will consist of putting together press releases, keeping the event planners updated on progress, and &lt;br /&gt;
communicating progress to the overall community. They will also be responsible for getting the message out when the team is ready to start accepting applicants. &lt;br /&gt;
&lt;br /&gt;
====Budget====&lt;br /&gt;
As mentioned above, it is up to your team to decide what it is you wish to do during the event - that will determine the budget. &lt;br /&gt;
&lt;br /&gt;
====Sponsorship====&lt;br /&gt;
It is very important to start reaching out to the overall OWASP community and their corporate contacts as potential sponsorship leads. Develop a Sponsorship Strategy and put together a sponsorship flyer outlining the program, what you are seeking, and the benefits of sponsorship. Give incentive for sponsorship and details about the program to get potential sponsors interested. Make sure to include the successes of past Women in AppSec conference events. Once you have your materials and sponsorship packages sorted, you can get started with sponsorship seeking activities. Below you will find an example of the Women in AppSec 2013 sponsorship flyer we sent out to potential sponsors. &lt;br /&gt;
&lt;br /&gt;
[http://appsecusa.org/2013/wp-content/uploads/2013/06/women-in-appsec-sponsorship.pdf Sample of 2013 Sponsorship Flyer]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===During the conference===&lt;br /&gt;
Be sure the engage the women there in the sessions you have organized, encourage them to not only attend but to be active participants. Its not all about the women try and encourage some men too, for this initiative to be successful it must be inclusive. &lt;br /&gt;
&lt;br /&gt;
==Post-Conference==&lt;br /&gt;
&lt;br /&gt;
After the conference, it is very important to gather feedback from the participants to make sure they enjoyed the experience. Ask them for a brief description about their experience, with a picture attached for the website. Then write up a review and lessons learned page to document the experience with the program. Make sure to include what can be improved upon in the future.&lt;br /&gt;
&lt;br /&gt;
=ON THE DAY=&lt;br /&gt;
==Training Days==&lt;br /&gt;
Prior to the conference, the winners will arrive during the training workshops. Upon their arrival an OWASP volunteer will be around to greet them and take them to the trainings. This is to ensure that the winners are taken care of, and that they feel welcome and comfortable. The two training days prior to the conference should give the winners a chance to get to know local chapter volunteers and early attendees. Winners are encouraged to attend trainings that interest them and to mingle with fellow trainees. If there is a welcome event, winners should be encouraged to attend as well.&lt;br /&gt;
&lt;br /&gt;
==Conference Days==&lt;br /&gt;
During the two days of the conference an OWASP volunteer will be available to show the winners around, introduce them to staff members, and get them acquainted with conference goers. The volunteer will also be responsible for getting the winners to the Women in AppSec scheduled activities, if any are planned. The volunteers should be made available if the winners have any questions or need help with anything. It is important that the winners get the full OWASP AppSec experience. This includes attending sessions of interests and encouraging winners to participate in the various activities provided at the Global AppSecs. &lt;br /&gt;
&lt;br /&gt;
=PAST WINNERS=&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
==Carrie Schaper, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Nancy Lornston, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tara Wilson, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chandni Bhowmik, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=CONTACT=&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193799</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193799"/>
				<updated>2015-04-21T21:03:54Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: /* ABOUT THE PROGRAM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
==Women in Application Security Program==&lt;br /&gt;
&lt;br /&gt;
The purpose of the Women in AppSec Program is to increase the participation of women in the field of application security. The program was successfully launched in 2011 at AppSec USA, and the aim is to run the program at every OWASP Global AppSec going forward. The Women in AppSec program is for any female interested in getting involved in AppSec or those already involved but looking to boost their career. This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
In 2015, this program is being re-launched at AppSec EU in Amsterndam, May 19 - 22 with the theme &amp;quot;Women in AppSec - Making it Happen&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regional conferences are encouraged to host the Women in AppSec program, as well. We encourage you to read this page in full, and reach out to us via the [http://www.tfaforms.com/308703 Contact Form] or [mailto:support@owasp.org OWASP Support] if you have any questions on how to successfully run the program at your event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC3.jpg| left|330px]]  &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:IMG_5579.JPG|left|325px]]&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC2.jpg|left|330px]] &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
*[https://www.isc2.org/PressReleaseDetails.aspx?id=11240 (ISC)²® Report Reveals Women's Perspective and Skills are Transforming the Information Security Industry October 29, 2013].&lt;br /&gt;
&lt;br /&gt;
*[https://www.youtube.com/watch?v=62i4o15NbgA&amp;amp;list=PLpr-xdpM8wG8ODR2zWs06JkMmlRiLyBXU&amp;amp;index=42 Women in AppSec Panel at AppSec USA 2013: Women in Information Security: Who Are We? Where Are We Going? Why? -- Joan Goodchild (Audio Only)]&lt;br /&gt;
&lt;br /&gt;
=ABOUT THE PROGRAM=&lt;br /&gt;
==Women in AppSec==&lt;br /&gt;
The OWASP Foundation, in recognition of value to both organizations and society, is working to support and enhance programs that increase the participation of women in the field of information and application security. The OWASP Foundation Women in AppSec Program provides merit-based funding for women to attend participating OWASP AppSec conferences. OWASP’s current program objective is to encourage female students at both the undergraduate and graduate levels, instructors, and professional working women who are dedicated to a career in information security and/or application development, to expand their skills and pursue application security. Interested applicants are encouraged to apply to the program running within their region of residence.&lt;br /&gt;
&lt;br /&gt;
==Current Program==&lt;br /&gt;
The program us currently being re-launched for AppSec EU 2015&lt;br /&gt;
===There is still work to be done - what can we do to Make it Happen?===&lt;br /&gt;
During AppSec EU there will be a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hope to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions will be open to all so we can help build support for the women around us. &lt;br /&gt;
&lt;br /&gt;
=== Past Eligibility Criteria===&lt;br /&gt;
[[Image:IMG_5746.JPG|right|500x260px]]&lt;br /&gt;
Below is the list of eligibility criteria used to select the winners in 2013. &lt;br /&gt;
&lt;br /&gt;
* Has provided 2 responsive contacts as reference, and both references are familiar with the candidate, application security, and OWASP.&lt;br /&gt;
* Both references have provided letters of recommendation.&lt;br /&gt;
* Has relevant/appropriate achievement goals for attending the conference.&lt;br /&gt;
* Is the applicant from the region that the conference is taking place in.&lt;br /&gt;
* Has background in volunteering for OWASP or similar organizations.&lt;br /&gt;
* Has participated in one of OWASP's programs or activities?&lt;br /&gt;
* Is either studying, wishing to study, working in AppSec, or interested in working in AppSec.&lt;br /&gt;
* Has financial need.&lt;br /&gt;
* Is a paid OWASP member, and/or employer/school is an OWASP sponsor.&lt;br /&gt;
* Has an interest in exploring application security&lt;br /&gt;
&lt;br /&gt;
We encourage you to create your own set of criteria that will fit the Women In AppSec that you are planning within your region. The criteria above is meant to be a guideline of what has been used in the past.&lt;br /&gt;
&lt;br /&gt;
==Winners==&lt;br /&gt;
&lt;br /&gt;
In the past, we have typically had two winners selected for the sponsorship award; however, the number of winners depends on how much you can afford to sponsor. We recommend that you raise $3000 USD for each winner, at least. In the past, we have given each winner a free conference pass, one free training, and free travel and accommodation to attend the event. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--  &lt;br /&gt;
=GLOBAL CONFERENCES=&lt;br /&gt;
==Global AppSec Conferences==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec_APAC.jpg|right|x375px]] &lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in software security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific. Additionally, regional events are held in locations such as Brazil, China, India, Ireland, Israel, and Washington D.C just to name a few. The aim of the foundation is to bring the Women in AppSec Program to each of the four global conference taking place in 2014.&lt;br /&gt;
&lt;br /&gt;
==AppSec APAC==&lt;br /&gt;
&lt;br /&gt;
The AppSec APAC global conference takes place in the Asian-Pacific region. This conference is a reunion of local software security leaders, and aims to present cutting-edge ideas to attendees. OWASP events attract a worldwide audience interested in “what’s next”, and this global conference is no different. The conference is expected to draw 200-250 technologists each year from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many more. Women from the Asia-Pacific region are encouraged to apply to the program taking place during AppSec APAC. &lt;br /&gt;
&lt;br /&gt;
==AppSec EU==&lt;br /&gt;
&lt;br /&gt;
The AppSec EU global conference take place in the European region. Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers, travel to hear the cutting-edge ideas presented by the software security industry's top talent. This conference is expected to draw 400-500 attendees each year from various regions within the Europe and beyond. Women from the European region are encouraged to apply to the program taking place during AppSec EU Research &lt;br /&gt;
&lt;br /&gt;
==AppSec Latam==&lt;br /&gt;
&lt;br /&gt;
The AppSec LATAM global conference takes place in the Latin American region. AppSec LATAM is a reunion of Latin American, software security leaders, providing a platform to discuss, participate in, and innovate within the software security industry. The conference is expected to draw 200-250 attendees from the Latin American region and beyond. Women in the Latin American region are encouraged to apply to the program taking place during AppSec LATAM. &lt;br /&gt;
&lt;br /&gt;
==AppSec USA==&lt;br /&gt;
&lt;br /&gt;
The AppSec USA global conference takes place in the North American region. AppSec USA is a world-class software security conference for technologists, auditors, risk managers, and entrepreneurs, gathering the world's top practitioner, to share the latest research and practices. This conference is expected to draw over 300 attendees within the North American region. AppSec USA is typically OWASP's biggest conference of the year so women are encouraged to apply to the program taking place during AppSec USA if they live or will be traveling from within North America.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=PLANNING=&lt;br /&gt;
==Pre-Conference==&lt;br /&gt;
&lt;br /&gt;
The majority of the planning involved in running the Women in AppSec Program occurs before the conference or regional event. Below, you will find a brief outline of the tasks your team will have to take on. &lt;br /&gt;
&lt;br /&gt;
====Planning &amp;amp; Selection Team====&lt;br /&gt;
&lt;br /&gt;
The first step you will need to take care of is the selection of your planning and selection team. These are the individuals that will be helping you manage the pre-event planning process and the selection of the candidates. You will typically need a team of 5-6 people. The selection committee will then be broken down into several sub-teams of one to two people who will then work on sponsorship, marketing, the grading process, and the call for entries. &lt;br /&gt;
&lt;br /&gt;
==== Sub-Team Roles ====&lt;br /&gt;
&lt;br /&gt;
'''Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
Two people should be responsible for developing the materials and seeking out sponsorships for the program. They will be in charge of creating the sponsorship packages, flyers, and seeking out sponsorship from other chapters and organizations.&lt;br /&gt;
&lt;br /&gt;
'''Marketing'''&lt;br /&gt;
&lt;br /&gt;
At least two people should be responsible for marketing the event. Their job will consist of putting together press releases, keeping the event planners updated on progress, and &lt;br /&gt;
communicating progress to the overall community. They will also be responsible for getting the message out when the team is ready to start accepting applicants. &lt;br /&gt;
&lt;br /&gt;
'''Grading Proces'''&lt;br /&gt;
&lt;br /&gt;
While everyone on the committee will be involved in grading, one person will be in charge of the grading process. They will create spreadsheets similar to those originally created for the selection committee, and for making sure everyone has what they need for the grading process. This team will also be responsible for making sure the grading is complete on schedule, and that the announcement of the winners is made before the event. &lt;br /&gt;
&lt;br /&gt;
'''Call for Entries'''&lt;br /&gt;
&lt;br /&gt;
Finally, one to two people will be in charge of the call for entries. Depending on the amount of entries, this might work better with two people as it requires collecting entries, arranging them, and sorting them out to the other graders. The call for entries team is responsible for making the forms, and for developing at least the first draft of the selection criteria. &lt;br /&gt;
&lt;br /&gt;
====Award Details====&lt;br /&gt;
&lt;br /&gt;
This is the fun bit. You and your team will need to decide on the details of the awards. This involves making decisions such as if the winners will be provided travel and accommodation, or free training and conference attendance. Typically, we have covered both travel and accommodation for the two winners as well as one training class. We also provided the winners with a free conference pass; however, the award you choose to sponsor depends on the funds you are able to raise. It is also dependent on what your team decides is the best award package to give away based on your resources. &lt;br /&gt;
&lt;br /&gt;
====Budget====&lt;br /&gt;
As mentioned above, it is up to your team to decide what it is you wish to award each winner. I recommend raising at least $6,000 USD to cover the expenses for each winner if you are going to cover travel and accommodation as well as conference passes and a free training class. &lt;br /&gt;
&lt;br /&gt;
====Sponsorship====&lt;br /&gt;
It is very important to start reaching out to the overall OWASP community and their corporate contacts as potential sponsorship leads. Develop a Sponsorship Strategy and put together a sponsorship flyer outlining the program, what you are seeking, and the benefits of sponsorship. Give incentive for sponsorship and details about the program to get potential sponsors interested. Make sure to include the successes of past Women in AppSec conference events. Once you have your materials and sponsorship packages sorted, you can get started with sponsorship seeking activities. Below you will find an example of the Women in AppSec 2013 sponsorship flyer we sent out to potential sponsors. &lt;br /&gt;
&lt;br /&gt;
[http://appsecusa.org/2013/wp-content/uploads/2013/06/women-in-appsec-sponsorship.pdf Sample of 2013 Sponsorship Flyer]&lt;br /&gt;
&lt;br /&gt;
====Application Process====&lt;br /&gt;
You will need to start developing the application process while the sponsorship activities are going on. Make sure to develop the application timeline with deadlines for each stage. Deadlines are critically important, and there has to be a cut off point. Create a deadline for when submissions should be in, for when letters of recommendation should be received, the timeline for the grading process, the date the top 5 will be selected, and the date the final winners will be selected and announced. You will also need to develop a set of selection criteria that the team will use to grade all of the applicants against. Be specific on the criteria you are looking for in candidates. Especially note that only women in the region that the conference is being held can submitted for consideration. After you have all of these details sorted out, you will need to start the Call for Entries. Make sure create an online form where applicants can submit their details to the team. &lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/document/d/1iZDNogemeAoHBnrfn2dVe212Bct4ZJiXeVNj3j5JsWg/edit Sample Selection Criteria]&lt;br /&gt;
&lt;br /&gt;
====Selection Process====&lt;br /&gt;
&lt;br /&gt;
The selection of the winners can be a very lengthy process especially if you have received more than 30 applicants. In the past, the grading has been split between each program team member. Each member will be randomly allocated a handful of applicants which they will grade using the pre-determined selection criteria. Once the grading is complete, you can make the final selection on candidates and announce the winners as a team. &lt;br /&gt;
&lt;br /&gt;
After the winners have been selected and announced, the team will need to help the winners arrange travel, accommodations, and event logistics. Upon their arrival at the conference center, insure they are taken care of by an OWASP volunteer, someone who will get them settled and that they make it to panels and trainings without issue. The bigger the conference, the more important it is to make sure the winners are not lost in the crowd. &lt;br /&gt;
&lt;br /&gt;
==Post-Conference==&lt;br /&gt;
&lt;br /&gt;
After the conference, it is very important to gather feedback from the winners to make sure they enjoyed the experience. Ask the winners for a brief description about their experience, with a picture attached for the website. Then write up a review and lessons learned page to document the experience with the program. Make sure to include what can be improved upon in the future. &lt;br /&gt;
&lt;br /&gt;
=ON THE DAY=&lt;br /&gt;
==Training Days==&lt;br /&gt;
Prior to the conference, the winners will arrive during the training workshops. Upon their arrival an OWASP volunteer will be around to greet them and take them to the trainings. This is to ensure that the winners are taken care of, and that they feel welcome and comfortable. The two training days prior to the conference should give the winners a chance to get to know local chapter volunteers and early attendees. Winners are encouraged to attend trainings that interest them and to mingle with fellow trainees. If there is a welcome event, winners should be encouraged to attend as well.&lt;br /&gt;
&lt;br /&gt;
==Conference Days==&lt;br /&gt;
During the two days of the conference an OWASP volunteer will be available to show the winners around, introduce them to staff members, and get them acquainted with conference goers. The volunteer will also be responsible for getting the winners to the Women in AppSec scheduled activities, if any are planned. The volunteers should be made available if the winners have any questions or need help with anything. It is important that the winners get the full OWASP AppSec experience. This includes attending sessions of interests and encouraging winners to participate in the various activities provided at the Global AppSecs. &lt;br /&gt;
&lt;br /&gt;
=PAST WINNERS=&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
==Carrie Schaper, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Nancy Lornston, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tara Wilson, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chandni Bhowmik, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=CONTACT=&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193797</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193797"/>
				<updated>2015-04-21T21:01:42Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: /* ABOUT THE PROGRAM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
==Women in Application Security Program==&lt;br /&gt;
&lt;br /&gt;
The purpose of the Women in AppSec Program is to increase the participation of women in the field of application security. The program was successfully launched in 2011 at AppSec USA, and the aim is to run the program at every OWASP Global AppSec going forward. The Women in AppSec program is for any female interested in getting involved in AppSec or those already involved but looking to boost their career. This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
In 2015, this program is being re-launched at AppSec EU in Amsterndam, May 19 - 22 with the theme &amp;quot;Women in AppSec - Making it Happen&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regional conferences are encouraged to host the Women in AppSec program, as well. We encourage you to read this page in full, and reach out to us via the [http://www.tfaforms.com/308703 Contact Form] or [mailto:support@owasp.org OWASP Support] if you have any questions on how to successfully run the program at your event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC3.jpg| left|330px]]  &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:IMG_5579.JPG|left|325px]]&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC2.jpg|left|330px]] &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
*[https://www.isc2.org/PressReleaseDetails.aspx?id=11240 (ISC)²® Report Reveals Women's Perspective and Skills are Transforming the Information Security Industry October 29, 2013].&lt;br /&gt;
&lt;br /&gt;
*[https://www.youtube.com/watch?v=62i4o15NbgA&amp;amp;list=PLpr-xdpM8wG8ODR2zWs06JkMmlRiLyBXU&amp;amp;index=42 Women in AppSec Panel at AppSec USA 2013: Women in Information Security: Who Are We? Where Are We Going? Why? -- Joan Goodchild (Audio Only)]&lt;br /&gt;
&lt;br /&gt;
=ABOUT THE PROGRAM=&lt;br /&gt;
==Women in AppSec==&lt;br /&gt;
The OWASP Foundation, in recognition of value to both organizations and society, is working to support and enhance programs that increase the participation of women in the field of information and application security. The OWASP Foundation Women in AppSec Program provides merit-based funding for women to attend participating OWASP AppSec conferences. OWASP’s current program objective is to encourage female students at both the undergraduate and graduate levels, instructors, and professional working women who are dedicated to a career in information security and/or application development, to expand their skills and pursue application security. Interested applicants are encouraged to apply to the program running within their region of residence.&lt;br /&gt;
&lt;br /&gt;
==Current Program==&lt;br /&gt;
There is still work to be done - what can we do to Make it Happen?&lt;br /&gt;
During AppSec EU there will be a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hope to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions will be open to all so we can help build support for the women around us. &lt;br /&gt;
&lt;br /&gt;
=== Past Eligibility Criteria===&lt;br /&gt;
[[Image:IMG_5746.JPG|right|500x260px]]&lt;br /&gt;
Below is the list of eligibility criteria used to select the winners in 2013. &lt;br /&gt;
&lt;br /&gt;
* Has provided 2 responsive contacts as reference, and both references are familiar with the candidate, application security, and OWASP.&lt;br /&gt;
* Both references have provided letters of recommendation.&lt;br /&gt;
* Has relevant/appropriate achievement goals for attending the conference.&lt;br /&gt;
* Is the applicant from the region that the conference is taking place in.&lt;br /&gt;
* Has background in volunteering for OWASP or similar organizations.&lt;br /&gt;
* Has participated in one of OWASP's programs or activities?&lt;br /&gt;
* Is either studying, wishing to study, working in AppSec, or interested in working in AppSec.&lt;br /&gt;
* Has financial need.&lt;br /&gt;
* Is a paid OWASP member, and/or employer/school is an OWASP sponsor.&lt;br /&gt;
* Has an interest in exploring application security&lt;br /&gt;
&lt;br /&gt;
We encourage you to create your own set of criteria that will fit the Women In AppSec that you are planning within your region. The criteria above is meant to be a guideline of what has been used in the past.&lt;br /&gt;
&lt;br /&gt;
==Winners==&lt;br /&gt;
&lt;br /&gt;
In the past, we have typically had two winners selected for the sponsorship award; however, the number of winners depends on how much you can afford to sponsor. We recommend that you raise $3000 USD for each winner, at least. In the past, we have given each winner a free conference pass, one free training, and free travel and accommodation to attend the event. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--  &lt;br /&gt;
=GLOBAL CONFERENCES=&lt;br /&gt;
==Global AppSec Conferences==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec_APAC.jpg|right|x375px]] &lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in software security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific. Additionally, regional events are held in locations such as Brazil, China, India, Ireland, Israel, and Washington D.C just to name a few. The aim of the foundation is to bring the Women in AppSec Program to each of the four global conference taking place in 2014.&lt;br /&gt;
&lt;br /&gt;
==AppSec APAC==&lt;br /&gt;
&lt;br /&gt;
The AppSec APAC global conference takes place in the Asian-Pacific region. This conference is a reunion of local software security leaders, and aims to present cutting-edge ideas to attendees. OWASP events attract a worldwide audience interested in “what’s next”, and this global conference is no different. The conference is expected to draw 200-250 technologists each year from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many more. Women from the Asia-Pacific region are encouraged to apply to the program taking place during AppSec APAC. &lt;br /&gt;
&lt;br /&gt;
==AppSec EU==&lt;br /&gt;
&lt;br /&gt;
The AppSec EU global conference take place in the European region. Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers, travel to hear the cutting-edge ideas presented by the software security industry's top talent. This conference is expected to draw 400-500 attendees each year from various regions within the Europe and beyond. Women from the European region are encouraged to apply to the program taking place during AppSec EU Research &lt;br /&gt;
&lt;br /&gt;
==AppSec Latam==&lt;br /&gt;
&lt;br /&gt;
The AppSec LATAM global conference takes place in the Latin American region. AppSec LATAM is a reunion of Latin American, software security leaders, providing a platform to discuss, participate in, and innovate within the software security industry. The conference is expected to draw 200-250 attendees from the Latin American region and beyond. Women in the Latin American region are encouraged to apply to the program taking place during AppSec LATAM. &lt;br /&gt;
&lt;br /&gt;
==AppSec USA==&lt;br /&gt;
&lt;br /&gt;
The AppSec USA global conference takes place in the North American region. AppSec USA is a world-class software security conference for technologists, auditors, risk managers, and entrepreneurs, gathering the world's top practitioner, to share the latest research and practices. This conference is expected to draw over 300 attendees within the North American region. AppSec USA is typically OWASP's biggest conference of the year so women are encouraged to apply to the program taking place during AppSec USA if they live or will be traveling from within North America.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=PLANNING=&lt;br /&gt;
==Pre-Conference==&lt;br /&gt;
&lt;br /&gt;
The majority of the planning involved in running the Women in AppSec Program occurs before the conference or regional event. Below, you will find a brief outline of the tasks your team will have to take on. &lt;br /&gt;
&lt;br /&gt;
====Planning &amp;amp; Selection Team====&lt;br /&gt;
&lt;br /&gt;
The first step you will need to take care of is the selection of your planning and selection team. These are the individuals that will be helping you manage the pre-event planning process and the selection of the candidates. You will typically need a team of 5-6 people. The selection committee will then be broken down into several sub-teams of one to two people who will then work on sponsorship, marketing, the grading process, and the call for entries. &lt;br /&gt;
&lt;br /&gt;
==== Sub-Team Roles ====&lt;br /&gt;
&lt;br /&gt;
'''Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
Two people should be responsible for developing the materials and seeking out sponsorships for the program. They will be in charge of creating the sponsorship packages, flyers, and seeking out sponsorship from other chapters and organizations.&lt;br /&gt;
&lt;br /&gt;
'''Marketing'''&lt;br /&gt;
&lt;br /&gt;
At least two people should be responsible for marketing the event. Their job will consist of putting together press releases, keeping the event planners updated on progress, and &lt;br /&gt;
communicating progress to the overall community. They will also be responsible for getting the message out when the team is ready to start accepting applicants. &lt;br /&gt;
&lt;br /&gt;
'''Grading Proces'''&lt;br /&gt;
&lt;br /&gt;
While everyone on the committee will be involved in grading, one person will be in charge of the grading process. They will create spreadsheets similar to those originally created for the selection committee, and for making sure everyone has what they need for the grading process. This team will also be responsible for making sure the grading is complete on schedule, and that the announcement of the winners is made before the event. &lt;br /&gt;
&lt;br /&gt;
'''Call for Entries'''&lt;br /&gt;
&lt;br /&gt;
Finally, one to two people will be in charge of the call for entries. Depending on the amount of entries, this might work better with two people as it requires collecting entries, arranging them, and sorting them out to the other graders. The call for entries team is responsible for making the forms, and for developing at least the first draft of the selection criteria. &lt;br /&gt;
&lt;br /&gt;
====Award Details====&lt;br /&gt;
&lt;br /&gt;
This is the fun bit. You and your team will need to decide on the details of the awards. This involves making decisions such as if the winners will be provided travel and accommodation, or free training and conference attendance. Typically, we have covered both travel and accommodation for the two winners as well as one training class. We also provided the winners with a free conference pass; however, the award you choose to sponsor depends on the funds you are able to raise. It is also dependent on what your team decides is the best award package to give away based on your resources. &lt;br /&gt;
&lt;br /&gt;
====Budget====&lt;br /&gt;
As mentioned above, it is up to your team to decide what it is you wish to award each winner. I recommend raising at least $6,000 USD to cover the expenses for each winner if you are going to cover travel and accommodation as well as conference passes and a free training class. &lt;br /&gt;
&lt;br /&gt;
====Sponsorship====&lt;br /&gt;
It is very important to start reaching out to the overall OWASP community and their corporate contacts as potential sponsorship leads. Develop a Sponsorship Strategy and put together a sponsorship flyer outlining the program, what you are seeking, and the benefits of sponsorship. Give incentive for sponsorship and details about the program to get potential sponsors interested. Make sure to include the successes of past Women in AppSec conference events. Once you have your materials and sponsorship packages sorted, you can get started with sponsorship seeking activities. Below you will find an example of the Women in AppSec 2013 sponsorship flyer we sent out to potential sponsors. &lt;br /&gt;
&lt;br /&gt;
[http://appsecusa.org/2013/wp-content/uploads/2013/06/women-in-appsec-sponsorship.pdf Sample of 2013 Sponsorship Flyer]&lt;br /&gt;
&lt;br /&gt;
====Application Process====&lt;br /&gt;
You will need to start developing the application process while the sponsorship activities are going on. Make sure to develop the application timeline with deadlines for each stage. Deadlines are critically important, and there has to be a cut off point. Create a deadline for when submissions should be in, for when letters of recommendation should be received, the timeline for the grading process, the date the top 5 will be selected, and the date the final winners will be selected and announced. You will also need to develop a set of selection criteria that the team will use to grade all of the applicants against. Be specific on the criteria you are looking for in candidates. Especially note that only women in the region that the conference is being held can submitted for consideration. After you have all of these details sorted out, you will need to start the Call for Entries. Make sure create an online form where applicants can submit their details to the team. &lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/document/d/1iZDNogemeAoHBnrfn2dVe212Bct4ZJiXeVNj3j5JsWg/edit Sample Selection Criteria]&lt;br /&gt;
&lt;br /&gt;
====Selection Process====&lt;br /&gt;
&lt;br /&gt;
The selection of the winners can be a very lengthy process especially if you have received more than 30 applicants. In the past, the grading has been split between each program team member. Each member will be randomly allocated a handful of applicants which they will grade using the pre-determined selection criteria. Once the grading is complete, you can make the final selection on candidates and announce the winners as a team. &lt;br /&gt;
&lt;br /&gt;
After the winners have been selected and announced, the team will need to help the winners arrange travel, accommodations, and event logistics. Upon their arrival at the conference center, insure they are taken care of by an OWASP volunteer, someone who will get them settled and that they make it to panels and trainings without issue. The bigger the conference, the more important it is to make sure the winners are not lost in the crowd. &lt;br /&gt;
&lt;br /&gt;
==Post-Conference==&lt;br /&gt;
&lt;br /&gt;
After the conference, it is very important to gather feedback from the winners to make sure they enjoyed the experience. Ask the winners for a brief description about their experience, with a picture attached for the website. Then write up a review and lessons learned page to document the experience with the program. Make sure to include what can be improved upon in the future. &lt;br /&gt;
&lt;br /&gt;
=ON THE DAY=&lt;br /&gt;
==Training Days==&lt;br /&gt;
Prior to the conference, the winners will arrive during the training workshops. Upon their arrival an OWASP volunteer will be around to greet them and take them to the trainings. This is to ensure that the winners are taken care of, and that they feel welcome and comfortable. The two training days prior to the conference should give the winners a chance to get to know local chapter volunteers and early attendees. Winners are encouraged to attend trainings that interest them and to mingle with fellow trainees. If there is a welcome event, winners should be encouraged to attend as well.&lt;br /&gt;
&lt;br /&gt;
==Conference Days==&lt;br /&gt;
During the two days of the conference an OWASP volunteer will be available to show the winners around, introduce them to staff members, and get them acquainted with conference goers. The volunteer will also be responsible for getting the winners to the Women in AppSec scheduled activities, if any are planned. The volunteers should be made available if the winners have any questions or need help with anything. It is important that the winners get the full OWASP AppSec experience. This includes attending sessions of interests and encouraging winners to participate in the various activities provided at the Global AppSecs. &lt;br /&gt;
&lt;br /&gt;
=PAST WINNERS=&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
==Carrie Schaper, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Nancy Lornston, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tara Wilson, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chandni Bhowmik, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=CONTACT=&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193796</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193796"/>
				<updated>2015-04-21T21:01:11Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: /* ABOUT THE PROGRAM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
==Women in Application Security Program==&lt;br /&gt;
&lt;br /&gt;
The purpose of the Women in AppSec Program is to increase the participation of women in the field of application security. The program was successfully launched in 2011 at AppSec USA, and the aim is to run the program at every OWASP Global AppSec going forward. The Women in AppSec program is for any female interested in getting involved in AppSec or those already involved but looking to boost their career. This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
In 2015, this program is being re-launched at AppSec EU in Amsterndam, May 19 - 22 with the theme &amp;quot;Women in AppSec - Making it Happen&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regional conferences are encouraged to host the Women in AppSec program, as well. We encourage you to read this page in full, and reach out to us via the [http://www.tfaforms.com/308703 Contact Form] or [mailto:support@owasp.org OWASP Support] if you have any questions on how to successfully run the program at your event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC3.jpg| left|330px]]  &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:IMG_5579.JPG|left|325px]]&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC2.jpg|left|330px]] &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
*[https://www.isc2.org/PressReleaseDetails.aspx?id=11240 (ISC)²® Report Reveals Women's Perspective and Skills are Transforming the Information Security Industry October 29, 2013].&lt;br /&gt;
&lt;br /&gt;
*[https://www.youtube.com/watch?v=62i4o15NbgA&amp;amp;list=PLpr-xdpM8wG8ODR2zWs06JkMmlRiLyBXU&amp;amp;index=42 Women in AppSec Panel at AppSec USA 2013: Women in Information Security: Who Are We? Where Are We Going? Why? -- Joan Goodchild (Audio Only)]&lt;br /&gt;
&lt;br /&gt;
=ABOUT THE PROGRAM=&lt;br /&gt;
==Women in AppSec==&lt;br /&gt;
The OWASP Foundation, in recognition of value to both organizations and society, is working to support and enhance programs that increase the participation of women in the field of information and application security. The OWASP Foundation Women in AppSec Program provides merit-based funding for women to attend participating OWASP AppSec conferences. OWASP’s current program objective is to encourage female students at both the undergraduate and graduate levels, instructors, and professional working women who are dedicated to a career in information security and/or application development, to expand their skills and pursue application security. Interested applicants are encouraged to apply to the program running within their region of residence.&lt;br /&gt;
&lt;br /&gt;
==Current Program==&lt;br /&gt;
There is still work to be done - what can we do to Make it Happen?&lt;br /&gt;
During AppSec EU there will be a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hope to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions will be open to all so we can help build support for the women around us. &lt;br /&gt;
&lt;br /&gt;
== Past Eligibility Criteria==&lt;br /&gt;
[[Image:IMG_5746.JPG|right|500x260px]]&lt;br /&gt;
Below is the list of eligibility criteria used to select the winners in 2013. &lt;br /&gt;
&lt;br /&gt;
* Has provided 2 responsive contacts as reference, and both references are familiar with the candidate, application security, and OWASP.&lt;br /&gt;
* Both references have provided letters of recommendation.&lt;br /&gt;
* Has relevant/appropriate achievement goals for attending the conference.&lt;br /&gt;
* Is the applicant from the region that the conference is taking place in.&lt;br /&gt;
* Has background in volunteering for OWASP or similar organizations.&lt;br /&gt;
* Has participated in one of OWASP's programs or activities?&lt;br /&gt;
* Is either studying, wishing to study, working in AppSec, or interested in working in AppSec.&lt;br /&gt;
* Has financial need.&lt;br /&gt;
* Is a paid OWASP member, and/or employer/school is an OWASP sponsor.&lt;br /&gt;
* Has an interest in exploring application security&lt;br /&gt;
&lt;br /&gt;
We encourage you to create your own set of criteria that will fit the Women In AppSec that you are planning within your region. The criteria above is meant to be a guideline of what has been used in the past.&lt;br /&gt;
&lt;br /&gt;
==Winners==&lt;br /&gt;
&lt;br /&gt;
In the past, we have typically had two winners selected for the sponsorship award; however, the number of winners depends on how much you can afford to sponsor. We recommend that you raise $3000 USD for each winner, at least. In the past, we have given each winner a free conference pass, one free training, and free travel and accommodation to attend the event. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--  &lt;br /&gt;
=GLOBAL CONFERENCES=&lt;br /&gt;
==Global AppSec Conferences==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec_APAC.jpg|right|x375px]] &lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in software security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific. Additionally, regional events are held in locations such as Brazil, China, India, Ireland, Israel, and Washington D.C just to name a few. The aim of the foundation is to bring the Women in AppSec Program to each of the four global conference taking place in 2014.&lt;br /&gt;
&lt;br /&gt;
==AppSec APAC==&lt;br /&gt;
&lt;br /&gt;
The AppSec APAC global conference takes place in the Asian-Pacific region. This conference is a reunion of local software security leaders, and aims to present cutting-edge ideas to attendees. OWASP events attract a worldwide audience interested in “what’s next”, and this global conference is no different. The conference is expected to draw 200-250 technologists each year from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many more. Women from the Asia-Pacific region are encouraged to apply to the program taking place during AppSec APAC. &lt;br /&gt;
&lt;br /&gt;
==AppSec EU==&lt;br /&gt;
&lt;br /&gt;
The AppSec EU global conference take place in the European region. Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers, travel to hear the cutting-edge ideas presented by the software security industry's top talent. This conference is expected to draw 400-500 attendees each year from various regions within the Europe and beyond. Women from the European region are encouraged to apply to the program taking place during AppSec EU Research &lt;br /&gt;
&lt;br /&gt;
==AppSec Latam==&lt;br /&gt;
&lt;br /&gt;
The AppSec LATAM global conference takes place in the Latin American region. AppSec LATAM is a reunion of Latin American, software security leaders, providing a platform to discuss, participate in, and innovate within the software security industry. The conference is expected to draw 200-250 attendees from the Latin American region and beyond. Women in the Latin American region are encouraged to apply to the program taking place during AppSec LATAM. &lt;br /&gt;
&lt;br /&gt;
==AppSec USA==&lt;br /&gt;
&lt;br /&gt;
The AppSec USA global conference takes place in the North American region. AppSec USA is a world-class software security conference for technologists, auditors, risk managers, and entrepreneurs, gathering the world's top practitioner, to share the latest research and practices. This conference is expected to draw over 300 attendees within the North American region. AppSec USA is typically OWASP's biggest conference of the year so women are encouraged to apply to the program taking place during AppSec USA if they live or will be traveling from within North America.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=PLANNING=&lt;br /&gt;
==Pre-Conference==&lt;br /&gt;
&lt;br /&gt;
The majority of the planning involved in running the Women in AppSec Program occurs before the conference or regional event. Below, you will find a brief outline of the tasks your team will have to take on. &lt;br /&gt;
&lt;br /&gt;
====Planning &amp;amp; Selection Team====&lt;br /&gt;
&lt;br /&gt;
The first step you will need to take care of is the selection of your planning and selection team. These are the individuals that will be helping you manage the pre-event planning process and the selection of the candidates. You will typically need a team of 5-6 people. The selection committee will then be broken down into several sub-teams of one to two people who will then work on sponsorship, marketing, the grading process, and the call for entries. &lt;br /&gt;
&lt;br /&gt;
==== Sub-Team Roles ====&lt;br /&gt;
&lt;br /&gt;
'''Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
Two people should be responsible for developing the materials and seeking out sponsorships for the program. They will be in charge of creating the sponsorship packages, flyers, and seeking out sponsorship from other chapters and organizations.&lt;br /&gt;
&lt;br /&gt;
'''Marketing'''&lt;br /&gt;
&lt;br /&gt;
At least two people should be responsible for marketing the event. Their job will consist of putting together press releases, keeping the event planners updated on progress, and &lt;br /&gt;
communicating progress to the overall community. They will also be responsible for getting the message out when the team is ready to start accepting applicants. &lt;br /&gt;
&lt;br /&gt;
'''Grading Proces'''&lt;br /&gt;
&lt;br /&gt;
While everyone on the committee will be involved in grading, one person will be in charge of the grading process. They will create spreadsheets similar to those originally created for the selection committee, and for making sure everyone has what they need for the grading process. This team will also be responsible for making sure the grading is complete on schedule, and that the announcement of the winners is made before the event. &lt;br /&gt;
&lt;br /&gt;
'''Call for Entries'''&lt;br /&gt;
&lt;br /&gt;
Finally, one to two people will be in charge of the call for entries. Depending on the amount of entries, this might work better with two people as it requires collecting entries, arranging them, and sorting them out to the other graders. The call for entries team is responsible for making the forms, and for developing at least the first draft of the selection criteria. &lt;br /&gt;
&lt;br /&gt;
====Award Details====&lt;br /&gt;
&lt;br /&gt;
This is the fun bit. You and your team will need to decide on the details of the awards. This involves making decisions such as if the winners will be provided travel and accommodation, or free training and conference attendance. Typically, we have covered both travel and accommodation for the two winners as well as one training class. We also provided the winners with a free conference pass; however, the award you choose to sponsor depends on the funds you are able to raise. It is also dependent on what your team decides is the best award package to give away based on your resources. &lt;br /&gt;
&lt;br /&gt;
====Budget====&lt;br /&gt;
As mentioned above, it is up to your team to decide what it is you wish to award each winner. I recommend raising at least $6,000 USD to cover the expenses for each winner if you are going to cover travel and accommodation as well as conference passes and a free training class. &lt;br /&gt;
&lt;br /&gt;
====Sponsorship====&lt;br /&gt;
It is very important to start reaching out to the overall OWASP community and their corporate contacts as potential sponsorship leads. Develop a Sponsorship Strategy and put together a sponsorship flyer outlining the program, what you are seeking, and the benefits of sponsorship. Give incentive for sponsorship and details about the program to get potential sponsors interested. Make sure to include the successes of past Women in AppSec conference events. Once you have your materials and sponsorship packages sorted, you can get started with sponsorship seeking activities. Below you will find an example of the Women in AppSec 2013 sponsorship flyer we sent out to potential sponsors. &lt;br /&gt;
&lt;br /&gt;
[http://appsecusa.org/2013/wp-content/uploads/2013/06/women-in-appsec-sponsorship.pdf Sample of 2013 Sponsorship Flyer]&lt;br /&gt;
&lt;br /&gt;
====Application Process====&lt;br /&gt;
You will need to start developing the application process while the sponsorship activities are going on. Make sure to develop the application timeline with deadlines for each stage. Deadlines are critically important, and there has to be a cut off point. Create a deadline for when submissions should be in, for when letters of recommendation should be received, the timeline for the grading process, the date the top 5 will be selected, and the date the final winners will be selected and announced. You will also need to develop a set of selection criteria that the team will use to grade all of the applicants against. Be specific on the criteria you are looking for in candidates. Especially note that only women in the region that the conference is being held can submitted for consideration. After you have all of these details sorted out, you will need to start the Call for Entries. Make sure create an online form where applicants can submit their details to the team. &lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/document/d/1iZDNogemeAoHBnrfn2dVe212Bct4ZJiXeVNj3j5JsWg/edit Sample Selection Criteria]&lt;br /&gt;
&lt;br /&gt;
====Selection Process====&lt;br /&gt;
&lt;br /&gt;
The selection of the winners can be a very lengthy process especially if you have received more than 30 applicants. In the past, the grading has been split between each program team member. Each member will be randomly allocated a handful of applicants which they will grade using the pre-determined selection criteria. Once the grading is complete, you can make the final selection on candidates and announce the winners as a team. &lt;br /&gt;
&lt;br /&gt;
After the winners have been selected and announced, the team will need to help the winners arrange travel, accommodations, and event logistics. Upon their arrival at the conference center, insure they are taken care of by an OWASP volunteer, someone who will get them settled and that they make it to panels and trainings without issue. The bigger the conference, the more important it is to make sure the winners are not lost in the crowd. &lt;br /&gt;
&lt;br /&gt;
==Post-Conference==&lt;br /&gt;
&lt;br /&gt;
After the conference, it is very important to gather feedback from the winners to make sure they enjoyed the experience. Ask the winners for a brief description about their experience, with a picture attached for the website. Then write up a review and lessons learned page to document the experience with the program. Make sure to include what can be improved upon in the future. &lt;br /&gt;
&lt;br /&gt;
=ON THE DAY=&lt;br /&gt;
==Training Days==&lt;br /&gt;
Prior to the conference, the winners will arrive during the training workshops. Upon their arrival an OWASP volunteer will be around to greet them and take them to the trainings. This is to ensure that the winners are taken care of, and that they feel welcome and comfortable. The two training days prior to the conference should give the winners a chance to get to know local chapter volunteers and early attendees. Winners are encouraged to attend trainings that interest them and to mingle with fellow trainees. If there is a welcome event, winners should be encouraged to attend as well.&lt;br /&gt;
&lt;br /&gt;
==Conference Days==&lt;br /&gt;
During the two days of the conference an OWASP volunteer will be available to show the winners around, introduce them to staff members, and get them acquainted with conference goers. The volunteer will also be responsible for getting the winners to the Women in AppSec scheduled activities, if any are planned. The volunteers should be made available if the winners have any questions or need help with anything. It is important that the winners get the full OWASP AppSec experience. This includes attending sessions of interests and encouraging winners to participate in the various activities provided at the Global AppSecs. &lt;br /&gt;
&lt;br /&gt;
=PAST WINNERS=&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
==Carrie Schaper, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Nancy Lornston, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tara Wilson, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chandni Bhowmik, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=CONTACT=&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193795</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193795"/>
				<updated>2015-04-21T21:00:57Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: /* ABOUT THE PROGRAM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
==Women in Application Security Program==&lt;br /&gt;
&lt;br /&gt;
The purpose of the Women in AppSec Program is to increase the participation of women in the field of application security. The program was successfully launched in 2011 at AppSec USA, and the aim is to run the program at every OWASP Global AppSec going forward. The Women in AppSec program is for any female interested in getting involved in AppSec or those already involved but looking to boost their career. This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
In 2015, this program is being re-launched at AppSec EU in Amsterndam, May 19 - 22 with the theme &amp;quot;Women in AppSec - Making it Happen&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regional conferences are encouraged to host the Women in AppSec program, as well. We encourage you to read this page in full, and reach out to us via the [http://www.tfaforms.com/308703 Contact Form] or [mailto:support@owasp.org OWASP Support] if you have any questions on how to successfully run the program at your event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC3.jpg| left|330px]]  &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:IMG_5579.JPG|left|325px]]&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC2.jpg|left|330px]] &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
*[https://www.isc2.org/PressReleaseDetails.aspx?id=11240 (ISC)²® Report Reveals Women's Perspective and Skills are Transforming the Information Security Industry October 29, 2013].&lt;br /&gt;
&lt;br /&gt;
*[https://www.youtube.com/watch?v=62i4o15NbgA&amp;amp;list=PLpr-xdpM8wG8ODR2zWs06JkMmlRiLyBXU&amp;amp;index=42 Women in AppSec Panel at AppSec USA 2013: Women in Information Security: Who Are We? Where Are We Going? Why? -- Joan Goodchild (Audio Only)]&lt;br /&gt;
&lt;br /&gt;
=ABOUT THE PROGRAM=&lt;br /&gt;
==Women in AppSec==&lt;br /&gt;
The OWASP Foundation, in recognition of value to both organizations and society, is working to support and enhance programs that increase the participation of women in the field of information and application security. The OWASP Foundation Women in AppSec Program provides merit-based funding for women to attend participating OWASP AppSec conferences. OWASP’s current program objective is to encourage female students at both the undergraduate and graduate levels, instructors, and professional working women who are dedicated to a career in information security and/or application development, to expand their skills and pursue application security. Interested applicants are encouraged to apply to the program running within their region of residence.&lt;br /&gt;
&lt;br /&gt;
==Current Program==&lt;br /&gt;
There is still work to be done - what can we do to Make it Happen?&lt;br /&gt;
During AppSec EU there will be a panel discussion and workshop supported by the Women in AppSec initiative. Through these sessions we hope to encourage women to pursue a career in AppSec and help them realize it is an option for them. These sessions will be open to all so we can help build sipport for the women around us. &lt;br /&gt;
&lt;br /&gt;
== Past Eligibility Criteria==&lt;br /&gt;
[[Image:IMG_5746.JPG|right|500x260px]]&lt;br /&gt;
Below is the list of eligibility criteria used to select the winners in 2013. &lt;br /&gt;
&lt;br /&gt;
* Has provided 2 responsive contacts as reference, and both references are familiar with the candidate, application security, and OWASP.&lt;br /&gt;
* Both references have provided letters of recommendation.&lt;br /&gt;
* Has relevant/appropriate achievement goals for attending the conference.&lt;br /&gt;
* Is the applicant from the region that the conference is taking place in.&lt;br /&gt;
* Has background in volunteering for OWASP or similar organizations.&lt;br /&gt;
* Has participated in one of OWASP's programs or activities?&lt;br /&gt;
* Is either studying, wishing to study, working in AppSec, or interested in working in AppSec.&lt;br /&gt;
* Has financial need.&lt;br /&gt;
* Is a paid OWASP member, and/or employer/school is an OWASP sponsor.&lt;br /&gt;
* Has an interest in exploring application security&lt;br /&gt;
&lt;br /&gt;
We encourage you to create your own set of criteria that will fit the Women In AppSec that you are planning within your region. The criteria above is meant to be a guideline of what has been used in the past.&lt;br /&gt;
&lt;br /&gt;
==Winners==&lt;br /&gt;
&lt;br /&gt;
In the past, we have typically had two winners selected for the sponsorship award; however, the number of winners depends on how much you can afford to sponsor. We recommend that you raise $3000 USD for each winner, at least. In the past, we have given each winner a free conference pass, one free training, and free travel and accommodation to attend the event. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--  &lt;br /&gt;
=GLOBAL CONFERENCES=&lt;br /&gt;
==Global AppSec Conferences==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec_APAC.jpg|right|x375px]] &lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in software security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific. Additionally, regional events are held in locations such as Brazil, China, India, Ireland, Israel, and Washington D.C just to name a few. The aim of the foundation is to bring the Women in AppSec Program to each of the four global conference taking place in 2014.&lt;br /&gt;
&lt;br /&gt;
==AppSec APAC==&lt;br /&gt;
&lt;br /&gt;
The AppSec APAC global conference takes place in the Asian-Pacific region. This conference is a reunion of local software security leaders, and aims to present cutting-edge ideas to attendees. OWASP events attract a worldwide audience interested in “what’s next”, and this global conference is no different. The conference is expected to draw 200-250 technologists each year from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many more. Women from the Asia-Pacific region are encouraged to apply to the program taking place during AppSec APAC. &lt;br /&gt;
&lt;br /&gt;
==AppSec EU==&lt;br /&gt;
&lt;br /&gt;
The AppSec EU global conference take place in the European region. Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers, travel to hear the cutting-edge ideas presented by the software security industry's top talent. This conference is expected to draw 400-500 attendees each year from various regions within the Europe and beyond. Women from the European region are encouraged to apply to the program taking place during AppSec EU Research &lt;br /&gt;
&lt;br /&gt;
==AppSec Latam==&lt;br /&gt;
&lt;br /&gt;
The AppSec LATAM global conference takes place in the Latin American region. AppSec LATAM is a reunion of Latin American, software security leaders, providing a platform to discuss, participate in, and innovate within the software security industry. The conference is expected to draw 200-250 attendees from the Latin American region and beyond. Women in the Latin American region are encouraged to apply to the program taking place during AppSec LATAM. &lt;br /&gt;
&lt;br /&gt;
==AppSec USA==&lt;br /&gt;
&lt;br /&gt;
The AppSec USA global conference takes place in the North American region. AppSec USA is a world-class software security conference for technologists, auditors, risk managers, and entrepreneurs, gathering the world's top practitioner, to share the latest research and practices. This conference is expected to draw over 300 attendees within the North American region. AppSec USA is typically OWASP's biggest conference of the year so women are encouraged to apply to the program taking place during AppSec USA if they live or will be traveling from within North America.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=PLANNING=&lt;br /&gt;
==Pre-Conference==&lt;br /&gt;
&lt;br /&gt;
The majority of the planning involved in running the Women in AppSec Program occurs before the conference or regional event. Below, you will find a brief outline of the tasks your team will have to take on. &lt;br /&gt;
&lt;br /&gt;
====Planning &amp;amp; Selection Team====&lt;br /&gt;
&lt;br /&gt;
The first step you will need to take care of is the selection of your planning and selection team. These are the individuals that will be helping you manage the pre-event planning process and the selection of the candidates. You will typically need a team of 5-6 people. The selection committee will then be broken down into several sub-teams of one to two people who will then work on sponsorship, marketing, the grading process, and the call for entries. &lt;br /&gt;
&lt;br /&gt;
==== Sub-Team Roles ====&lt;br /&gt;
&lt;br /&gt;
'''Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
Two people should be responsible for developing the materials and seeking out sponsorships for the program. They will be in charge of creating the sponsorship packages, flyers, and seeking out sponsorship from other chapters and organizations.&lt;br /&gt;
&lt;br /&gt;
'''Marketing'''&lt;br /&gt;
&lt;br /&gt;
At least two people should be responsible for marketing the event. Their job will consist of putting together press releases, keeping the event planners updated on progress, and &lt;br /&gt;
communicating progress to the overall community. They will also be responsible for getting the message out when the team is ready to start accepting applicants. &lt;br /&gt;
&lt;br /&gt;
'''Grading Proces'''&lt;br /&gt;
&lt;br /&gt;
While everyone on the committee will be involved in grading, one person will be in charge of the grading process. They will create spreadsheets similar to those originally created for the selection committee, and for making sure everyone has what they need for the grading process. This team will also be responsible for making sure the grading is complete on schedule, and that the announcement of the winners is made before the event. &lt;br /&gt;
&lt;br /&gt;
'''Call for Entries'''&lt;br /&gt;
&lt;br /&gt;
Finally, one to two people will be in charge of the call for entries. Depending on the amount of entries, this might work better with two people as it requires collecting entries, arranging them, and sorting them out to the other graders. The call for entries team is responsible for making the forms, and for developing at least the first draft of the selection criteria. &lt;br /&gt;
&lt;br /&gt;
====Award Details====&lt;br /&gt;
&lt;br /&gt;
This is the fun bit. You and your team will need to decide on the details of the awards. This involves making decisions such as if the winners will be provided travel and accommodation, or free training and conference attendance. Typically, we have covered both travel and accommodation for the two winners as well as one training class. We also provided the winners with a free conference pass; however, the award you choose to sponsor depends on the funds you are able to raise. It is also dependent on what your team decides is the best award package to give away based on your resources. &lt;br /&gt;
&lt;br /&gt;
====Budget====&lt;br /&gt;
As mentioned above, it is up to your team to decide what it is you wish to award each winner. I recommend raising at least $6,000 USD to cover the expenses for each winner if you are going to cover travel and accommodation as well as conference passes and a free training class. &lt;br /&gt;
&lt;br /&gt;
====Sponsorship====&lt;br /&gt;
It is very important to start reaching out to the overall OWASP community and their corporate contacts as potential sponsorship leads. Develop a Sponsorship Strategy and put together a sponsorship flyer outlining the program, what you are seeking, and the benefits of sponsorship. Give incentive for sponsorship and details about the program to get potential sponsors interested. Make sure to include the successes of past Women in AppSec conference events. Once you have your materials and sponsorship packages sorted, you can get started with sponsorship seeking activities. Below you will find an example of the Women in AppSec 2013 sponsorship flyer we sent out to potential sponsors. &lt;br /&gt;
&lt;br /&gt;
[http://appsecusa.org/2013/wp-content/uploads/2013/06/women-in-appsec-sponsorship.pdf Sample of 2013 Sponsorship Flyer]&lt;br /&gt;
&lt;br /&gt;
====Application Process====&lt;br /&gt;
You will need to start developing the application process while the sponsorship activities are going on. Make sure to develop the application timeline with deadlines for each stage. Deadlines are critically important, and there has to be a cut off point. Create a deadline for when submissions should be in, for when letters of recommendation should be received, the timeline for the grading process, the date the top 5 will be selected, and the date the final winners will be selected and announced. You will also need to develop a set of selection criteria that the team will use to grade all of the applicants against. Be specific on the criteria you are looking for in candidates. Especially note that only women in the region that the conference is being held can submitted for consideration. After you have all of these details sorted out, you will need to start the Call for Entries. Make sure create an online form where applicants can submit their details to the team. &lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/document/d/1iZDNogemeAoHBnrfn2dVe212Bct4ZJiXeVNj3j5JsWg/edit Sample Selection Criteria]&lt;br /&gt;
&lt;br /&gt;
====Selection Process====&lt;br /&gt;
&lt;br /&gt;
The selection of the winners can be a very lengthy process especially if you have received more than 30 applicants. In the past, the grading has been split between each program team member. Each member will be randomly allocated a handful of applicants which they will grade using the pre-determined selection criteria. Once the grading is complete, you can make the final selection on candidates and announce the winners as a team. &lt;br /&gt;
&lt;br /&gt;
After the winners have been selected and announced, the team will need to help the winners arrange travel, accommodations, and event logistics. Upon their arrival at the conference center, insure they are taken care of by an OWASP volunteer, someone who will get them settled and that they make it to panels and trainings without issue. The bigger the conference, the more important it is to make sure the winners are not lost in the crowd. &lt;br /&gt;
&lt;br /&gt;
==Post-Conference==&lt;br /&gt;
&lt;br /&gt;
After the conference, it is very important to gather feedback from the winners to make sure they enjoyed the experience. Ask the winners for a brief description about their experience, with a picture attached for the website. Then write up a review and lessons learned page to document the experience with the program. Make sure to include what can be improved upon in the future. &lt;br /&gt;
&lt;br /&gt;
=ON THE DAY=&lt;br /&gt;
==Training Days==&lt;br /&gt;
Prior to the conference, the winners will arrive during the training workshops. Upon their arrival an OWASP volunteer will be around to greet them and take them to the trainings. This is to ensure that the winners are taken care of, and that they feel welcome and comfortable. The two training days prior to the conference should give the winners a chance to get to know local chapter volunteers and early attendees. Winners are encouraged to attend trainings that interest them and to mingle with fellow trainees. If there is a welcome event, winners should be encouraged to attend as well.&lt;br /&gt;
&lt;br /&gt;
==Conference Days==&lt;br /&gt;
During the two days of the conference an OWASP volunteer will be available to show the winners around, introduce them to staff members, and get them acquainted with conference goers. The volunteer will also be responsible for getting the winners to the Women in AppSec scheduled activities, if any are planned. The volunteers should be made available if the winners have any questions or need help with anything. It is important that the winners get the full OWASP AppSec experience. This includes attending sessions of interests and encouraging winners to participate in the various activities provided at the Global AppSecs. &lt;br /&gt;
&lt;br /&gt;
=PAST WINNERS=&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
==Carrie Schaper, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Nancy Lornston, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tara Wilson, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chandni Bhowmik, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=CONTACT=&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193793</id>
		<title>Women In AppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Women_In_AppSec&amp;diff=193793"/>
				<updated>2015-04-21T20:58:04Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: /* Women in Application Security Program */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=WELCOME=&lt;br /&gt;
==Women in Application Security Program==&lt;br /&gt;
&lt;br /&gt;
The purpose of the Women in AppSec Program is to increase the participation of women in the field of application security. The program was successfully launched in 2011 at AppSec USA, and the aim is to run the program at every OWASP Global AppSec going forward. The Women in AppSec program is for any female interested in getting involved in AppSec or those already involved but looking to boost their career. This includes female undergraduate and graduate students, instructors, and professionals who are dedicated to information security or application development. &lt;br /&gt;
&lt;br /&gt;
In 2015, this program is being re-launched at AppSec EU in Amsterndam, May 19 - 22 with the theme &amp;quot;Women in AppSec - Making it Happen&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Regional conferences are encouraged to host the Women in AppSec program, as well. We encourage you to read this page in full, and reach out to us via the [http://www.tfaforms.com/308703 Contact Form] or [mailto:support@owasp.org OWASP Support] if you have any questions on how to successfully run the program at your event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
! width=&amp;quot;400&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC3.jpg| left|330px]]  &amp;lt;br/&amp;gt;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:IMG_5579.JPG|left|325px]]&lt;br /&gt;
| align=&amp;quot;left&amp;quot; | [[Image:WiAAPAC2.jpg|left|330px]] &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
==Links==&lt;br /&gt;
*[https://www.isc2.org/PressReleaseDetails.aspx?id=11240 (ISC)²® Report Reveals Women's Perspective and Skills are Transforming the Information Security Industry October 29, 2013].&lt;br /&gt;
&lt;br /&gt;
*[https://www.youtube.com/watch?v=62i4o15NbgA&amp;amp;list=PLpr-xdpM8wG8ODR2zWs06JkMmlRiLyBXU&amp;amp;index=42 Women in AppSec Panel at AppSec USA 2013: Women in Information Security: Who Are We? Where Are We Going? Why? -- Joan Goodchild (Audio Only)]&lt;br /&gt;
&lt;br /&gt;
=ABOUT THE PROGRAM=&lt;br /&gt;
==Women in AppSec==&lt;br /&gt;
The OWASP Foundation, in recognition of value to both organizations and society, is working to support and enhance programs that increase the participation of women in the field of information and application security. The OWASP Foundation Women in AppSec Program provides merit-based funding for women to attend participating OWASP AppSec conferences. OWASP’s current program objective is to encourage female students at both the undergraduate and graduate levels, instructors, and professional working women who are dedicated to a career in information security and/or application development, to expand their skills and pursue application security. Interested applicants are encouraged to apply to the program running within their region of residence.&lt;br /&gt;
&lt;br /&gt;
== Past Eligibility Criteria==&lt;br /&gt;
[[Image:IMG_5746.JPG|right|500x260px]]&lt;br /&gt;
Below is the list of eligibility criteria used to select the winners in 2013. &lt;br /&gt;
&lt;br /&gt;
* Has provided 2 responsive contacts as reference, and both references are familiar with the candidate, application security, and OWASP.&lt;br /&gt;
* Both references have provided letters of recommendation.&lt;br /&gt;
* Has relevant/appropriate achievement goals for attending the conference.&lt;br /&gt;
* Is the applicant from the region that the conference is taking place in.&lt;br /&gt;
* Has background in volunteering for OWASP or similar organizations.&lt;br /&gt;
* Has participated in one of OWASP's programs or activities?&lt;br /&gt;
* Is either studying, wishing to study, working in AppSec, or interested in working in AppSec.&lt;br /&gt;
* Has financial need.&lt;br /&gt;
* Is a paid OWASP member, and/or employer/school is an OWASP sponsor.&lt;br /&gt;
* Has an interest in exploring application security&lt;br /&gt;
&lt;br /&gt;
We encourage you to create your own set of criteria that will fit the Women In AppSec that you are planning within your region. The criteria above is meant to be a guideline of what has been used in the past.&lt;br /&gt;
&lt;br /&gt;
==Winners==&lt;br /&gt;
&lt;br /&gt;
In the past, we have typically had two winners selected for the sponsorship award; however, the number of winners depends on how much you can afford to sponsor. We recommend that you raise $3000 USD for each winner, at least. In the past, we have given each winner a free conference pass, one free training, and free travel and accommodation to attend the event. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--  &lt;br /&gt;
=GLOBAL CONFERENCES=&lt;br /&gt;
==Global AppSec Conferences==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec_APAC.jpg|right|x375px]] &lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in software security. This series was launched in the United States in 2004 and Europe in 2005. Global AppSec conferences are held annually in North America, Latin America, Europe, and Asia Pacific. Additionally, regional events are held in locations such as Brazil, China, India, Ireland, Israel, and Washington D.C just to name a few. The aim of the foundation is to bring the Women in AppSec Program to each of the four global conference taking place in 2014.&lt;br /&gt;
&lt;br /&gt;
==AppSec APAC==&lt;br /&gt;
&lt;br /&gt;
The AppSec APAC global conference takes place in the Asian-Pacific region. This conference is a reunion of local software security leaders, and aims to present cutting-edge ideas to attendees. OWASP events attract a worldwide audience interested in “what’s next”, and this global conference is no different. The conference is expected to draw 200-250 technologists each year from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many more. Women from the Asia-Pacific region are encouraged to apply to the program taking place during AppSec APAC. &lt;br /&gt;
&lt;br /&gt;
==AppSec EU==&lt;br /&gt;
&lt;br /&gt;
The AppSec EU global conference take place in the European region. Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers, travel to hear the cutting-edge ideas presented by the software security industry's top talent. This conference is expected to draw 400-500 attendees each year from various regions within the Europe and beyond. Women from the European region are encouraged to apply to the program taking place during AppSec EU Research &lt;br /&gt;
&lt;br /&gt;
==AppSec Latam==&lt;br /&gt;
&lt;br /&gt;
The AppSec LATAM global conference takes place in the Latin American region. AppSec LATAM is a reunion of Latin American, software security leaders, providing a platform to discuss, participate in, and innovate within the software security industry. The conference is expected to draw 200-250 attendees from the Latin American region and beyond. Women in the Latin American region are encouraged to apply to the program taking place during AppSec LATAM. &lt;br /&gt;
&lt;br /&gt;
==AppSec USA==&lt;br /&gt;
&lt;br /&gt;
The AppSec USA global conference takes place in the North American region. AppSec USA is a world-class software security conference for technologists, auditors, risk managers, and entrepreneurs, gathering the world's top practitioner, to share the latest research and practices. This conference is expected to draw over 300 attendees within the North American region. AppSec USA is typically OWASP's biggest conference of the year so women are encouraged to apply to the program taking place during AppSec USA if they live or will be traveling from within North America.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=PLANNING=&lt;br /&gt;
==Pre-Conference==&lt;br /&gt;
&lt;br /&gt;
The majority of the planning involved in running the Women in AppSec Program occurs before the conference or regional event. Below, you will find a brief outline of the tasks your team will have to take on. &lt;br /&gt;
&lt;br /&gt;
====Planning &amp;amp; Selection Team====&lt;br /&gt;
&lt;br /&gt;
The first step you will need to take care of is the selection of your planning and selection team. These are the individuals that will be helping you manage the pre-event planning process and the selection of the candidates. You will typically need a team of 5-6 people. The selection committee will then be broken down into several sub-teams of one to two people who will then work on sponsorship, marketing, the grading process, and the call for entries. &lt;br /&gt;
&lt;br /&gt;
==== Sub-Team Roles ====&lt;br /&gt;
&lt;br /&gt;
'''Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
Two people should be responsible for developing the materials and seeking out sponsorships for the program. They will be in charge of creating the sponsorship packages, flyers, and seeking out sponsorship from other chapters and organizations.&lt;br /&gt;
&lt;br /&gt;
'''Marketing'''&lt;br /&gt;
&lt;br /&gt;
At least two people should be responsible for marketing the event. Their job will consist of putting together press releases, keeping the event planners updated on progress, and &lt;br /&gt;
communicating progress to the overall community. They will also be responsible for getting the message out when the team is ready to start accepting applicants. &lt;br /&gt;
&lt;br /&gt;
'''Grading Proces'''&lt;br /&gt;
&lt;br /&gt;
While everyone on the committee will be involved in grading, one person will be in charge of the grading process. They will create spreadsheets similar to those originally created for the selection committee, and for making sure everyone has what they need for the grading process. This team will also be responsible for making sure the grading is complete on schedule, and that the announcement of the winners is made before the event. &lt;br /&gt;
&lt;br /&gt;
'''Call for Entries'''&lt;br /&gt;
&lt;br /&gt;
Finally, one to two people will be in charge of the call for entries. Depending on the amount of entries, this might work better with two people as it requires collecting entries, arranging them, and sorting them out to the other graders. The call for entries team is responsible for making the forms, and for developing at least the first draft of the selection criteria. &lt;br /&gt;
&lt;br /&gt;
====Award Details====&lt;br /&gt;
&lt;br /&gt;
This is the fun bit. You and your team will need to decide on the details of the awards. This involves making decisions such as if the winners will be provided travel and accommodation, or free training and conference attendance. Typically, we have covered both travel and accommodation for the two winners as well as one training class. We also provided the winners with a free conference pass; however, the award you choose to sponsor depends on the funds you are able to raise. It is also dependent on what your team decides is the best award package to give away based on your resources. &lt;br /&gt;
&lt;br /&gt;
====Budget====&lt;br /&gt;
As mentioned above, it is up to your team to decide what it is you wish to award each winner. I recommend raising at least $6,000 USD to cover the expenses for each winner if you are going to cover travel and accommodation as well as conference passes and a free training class. &lt;br /&gt;
&lt;br /&gt;
====Sponsorship====&lt;br /&gt;
It is very important to start reaching out to the overall OWASP community and their corporate contacts as potential sponsorship leads. Develop a Sponsorship Strategy and put together a sponsorship flyer outlining the program, what you are seeking, and the benefits of sponsorship. Give incentive for sponsorship and details about the program to get potential sponsors interested. Make sure to include the successes of past Women in AppSec conference events. Once you have your materials and sponsorship packages sorted, you can get started with sponsorship seeking activities. Below you will find an example of the Women in AppSec 2013 sponsorship flyer we sent out to potential sponsors. &lt;br /&gt;
&lt;br /&gt;
[http://appsecusa.org/2013/wp-content/uploads/2013/06/women-in-appsec-sponsorship.pdf Sample of 2013 Sponsorship Flyer]&lt;br /&gt;
&lt;br /&gt;
====Application Process====&lt;br /&gt;
You will need to start developing the application process while the sponsorship activities are going on. Make sure to develop the application timeline with deadlines for each stage. Deadlines are critically important, and there has to be a cut off point. Create a deadline for when submissions should be in, for when letters of recommendation should be received, the timeline for the grading process, the date the top 5 will be selected, and the date the final winners will be selected and announced. You will also need to develop a set of selection criteria that the team will use to grade all of the applicants against. Be specific on the criteria you are looking for in candidates. Especially note that only women in the region that the conference is being held can submitted for consideration. After you have all of these details sorted out, you will need to start the Call for Entries. Make sure create an online form where applicants can submit their details to the team. &lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/document/d/1iZDNogemeAoHBnrfn2dVe212Bct4ZJiXeVNj3j5JsWg/edit Sample Selection Criteria]&lt;br /&gt;
&lt;br /&gt;
====Selection Process====&lt;br /&gt;
&lt;br /&gt;
The selection of the winners can be a very lengthy process especially if you have received more than 30 applicants. In the past, the grading has been split between each program team member. Each member will be randomly allocated a handful of applicants which they will grade using the pre-determined selection criteria. Once the grading is complete, you can make the final selection on candidates and announce the winners as a team. &lt;br /&gt;
&lt;br /&gt;
After the winners have been selected and announced, the team will need to help the winners arrange travel, accommodations, and event logistics. Upon their arrival at the conference center, insure they are taken care of by an OWASP volunteer, someone who will get them settled and that they make it to panels and trainings without issue. The bigger the conference, the more important it is to make sure the winners are not lost in the crowd. &lt;br /&gt;
&lt;br /&gt;
==Post-Conference==&lt;br /&gt;
&lt;br /&gt;
After the conference, it is very important to gather feedback from the winners to make sure they enjoyed the experience. Ask the winners for a brief description about their experience, with a picture attached for the website. Then write up a review and lessons learned page to document the experience with the program. Make sure to include what can be improved upon in the future. &lt;br /&gt;
&lt;br /&gt;
=ON THE DAY=&lt;br /&gt;
==Training Days==&lt;br /&gt;
Prior to the conference, the winners will arrive during the training workshops. Upon their arrival an OWASP volunteer will be around to greet them and take them to the trainings. This is to ensure that the winners are taken care of, and that they feel welcome and comfortable. The two training days prior to the conference should give the winners a chance to get to know local chapter volunteers and early attendees. Winners are encouraged to attend trainings that interest them and to mingle with fellow trainees. If there is a welcome event, winners should be encouraged to attend as well.&lt;br /&gt;
&lt;br /&gt;
==Conference Days==&lt;br /&gt;
During the two days of the conference an OWASP volunteer will be available to show the winners around, introduce them to staff members, and get them acquainted with conference goers. The volunteer will also be responsible for getting the winners to the Women in AppSec scheduled activities, if any are planned. The volunteers should be made available if the winners have any questions or need help with anything. It is important that the winners get the full OWASP AppSec experience. This includes attending sessions of interests and encouraging winners to participate in the various activities provided at the Global AppSecs. &lt;br /&gt;
&lt;br /&gt;
=PAST WINNERS=&lt;br /&gt;
==Previous Women in AppSec Winners==&lt;br /&gt;
Following their experience at AppSec, winners are encouraged to write a short piece about their experience at the conference and their participation in the Women in AppSec program. Here, they outline their experience with the Women in AppSec Program in their own words. &lt;br /&gt;
&lt;br /&gt;
==Carrie Schaper, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Carrie Schaper Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;OWASP Appsec proved to be a great experience for me, uniting and interacting with friends, professionals, and colleagues from the Information Security space from across the US and Internationally whom were in attendance.  The huge space and well organized functions such as the: trainings, expert talks, panels, bug-bounty, lock-picking village and social events all enhanced the conference experience.  Participating on the Women in IT panel was a wonderful experience, as many women were in attendance and participated in collaborative discussions.  OWASP Appsec held in NY this year, was a premier NY conference not to be missed.  Thank you to OWASP, its attendees and organizers.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Nancy Lornston, 2013 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Nancy Lorntson Small.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |&amp;quot;AppSec 2013 was an awesome experience!  Nowhere in the world can you find the top security experts all in one place at one time (and participate in a marriage proposal!). The conference presentations were well organized and the speakers were prepared to share pros, cons, successes and failures of their work in order to advance the application security domain. The variety of vendors was terrific as well.&lt;br /&gt;
 &lt;br /&gt;
The Women in AppSec panel was an opportunity to advance women's position in the community.  Each speaker shared some very candid remarks about their personal experiences and by the end, it was clear that while more work needs to be done, there is a sincere interest by companies, universities and the industry in general to work on doing the things needed to attract more women to the profession.&lt;br /&gt;
 &lt;br /&gt;
The training course I attended (Open source tools) lived up to it's billing and I came away with several invaluable tips and strategies to improve our program.&lt;br /&gt;
 &lt;br /&gt;
A huge thank you to the Women in App Sec Panel and OWASP in general for this opportunity to attend the premier Application Security Conference in the world.&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Tara Wilson, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Tara wilson.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |“Being fortunate enough to receive the Women in AppSec sponsorhsip is a unique and valuable experience. It is a great opportunity for women to have a chance to bolster their skills and dive deep into the world of application security. I found that attending the conference was not only a great way to experience what the OWASP community has to offer, but it also gives students a chance to network with a great group of people who are passionate about their field and willing to share a wealth of information.” &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Chandni Bhowmik, 2011 Winner==&lt;br /&gt;
{| style=&amp;quot;background-color: transparent&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;200&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;1000&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:Chandni_bhowmik.jpg|100px]]&lt;br /&gt;
| align=&amp;quot;justify&amp;quot; |Chandni Bhowmik is currently completing an M.S. in Computer Security and Information Assurance at the Rochester Institute of Technology (RIT). Her first introduction to OWASP was through the project WebScarab during an application security lab last spring at RIT and her interest in OWASP grew ever since. Over the summer, she started programming open source web applications using built-in security features of Django and Python. She is interested in becoming an information security researcher, and hopes to leverage learning at OWASP AppSec USA 2011 in ad-hoc architecture, mobile platforms and over-all concepts of web application security. Besides secure programming, Chandni enjoys her current research involving digital image forensics and machine learning. In addition to attending school, she has interned in IT security and compliance at Paychex, a Rochester based payroll processing company, and gained industrial experience working an assistant systems engineer for Tata Consultancy Services, a global IT firm. &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=CONTACT=&lt;br /&gt;
&lt;br /&gt;
==Contact Us==&lt;br /&gt;
&lt;br /&gt;
If you are interested in another piece of OWASP design for your event or project, please let us know by using the [http://owasp4.owasp.org/contactus.html OWASP Contact Us form]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cork&amp;diff=192691</id>
		<title>Cork</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cork&amp;diff=192691"/>
				<updated>2015-04-03T13:25:56Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cork|extra= [[File:Owasp_logo_ireland_small.jpg]]| The chapter leaders are [mailto:fiona.collins@owasp.org Fiona Collins] and [mailto:darren.fitzpatrick@owasp.org Darren Fitzpatrick].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cork|emailarchives=http://lists.owasp.org/pipermail/owasp-Cork}}&lt;br /&gt;
&lt;br /&gt;
'''Becoming a chapter sponsor means that you get your organisation mentioned in meeting promotion (including on this page), recognition at the beginning of the meeting and promotional material at the meeting. &amp;lt;br&amp;gt;&lt;br /&gt;
We currently have the following sponsorship options available: &amp;lt;br&amp;gt;&lt;br /&gt;
€250 for an individual meeting sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
€1500 for annual chapter sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
Contact any of the board members below for more information. &amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Cork Board  ==&lt;br /&gt;
&lt;br /&gt;
Should you have a question about the local chapter, would like to get more involved contact any of the following people below &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chapter Leads''': &lt;br /&gt;
&lt;br /&gt;
*[mailto:fiona.collins(at)owasp.org Fiona Collins]&amp;lt;br&amp;gt;&lt;br /&gt;
*[mailto:darren.fitzpatrick@owasp.org Darren Fitzpatrick]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Details and registration for all chapter meetingsis available on our Meet-Up page: http://www.meetup.com/OWASP-Cork/'''&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings - 2015 ==&lt;br /&gt;
&lt;br /&gt;
=== Cork Security Event - Mach 24 ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Amalgamating IT Security Best Practices Within an Organisation''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
On March 24th we held a joing security event with CorkSec, ISACA, and (ISC)2. &lt;br /&gt;
Slides from the talks are available here: &amp;lt;br&amp;gt;&lt;br /&gt;
[https://drive.google.com/file/d/0B2v5SuBDC0ejWHUyUkJtLThpSUE/view?usp=sharing, Securing Innovation] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://drive.google.com/file/d/0B2v5SuBDC0ejYXhRUEhtOEdTWVU/view?usp=sharing, The Weakest Link] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc. &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings - 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''Details and registration for all chapter meetingsis available on our Meet-Up page: http://www.meetup.com/OWASP-Cork/'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP December Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - December 11 2014''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 11 December 2014&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: UCC, Western Gateway Building, Room G04&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Western Road, Cork'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.co­m/maps/place/Western+­Gateway+Building+-+UC­C/@51.8934237,-8.4990­742,17z/ Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/218796493/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The next OWASP Cork Chapter meeting is taking place on Thursday December 11th in UCC (Western Gateway Building, WGB G04) at 7PM. &lt;br /&gt;
&lt;br /&gt;
Hope to see you there. &lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Eoin Carroll - Android Webview Exploitation&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Eoin Carroll is an IT Security Engineer and member of OWASP since 2009. Based in Cork and works on all things security with keen interests in the Android Stack, Threat Modeling, HTML5, Cryptanalysis, Reversing and Exploitation.&lt;br /&gt;
&lt;br /&gt;
Eoin has 13 years’ experience spanning across the IT, Semi-Conductor and Medical Device industries, working as an Electronic Engineer for 10 yrs and in Security for the last 3 years.&lt;br /&gt;
&lt;br /&gt;
Android Webview Exploitation&lt;br /&gt;
&lt;br /&gt;
This talk will focus on the AddJavascriptInterface which is remotely exploitable leading to Shell and Cross Application Scripting (XAS). Eoin will discuss the importance of Threat Modeling with cross platform development frameworks such as Phonegap/Cordova as well as security tools such as Drozer and AFE (Android Exploitation Framework).&lt;br /&gt;
&lt;br /&gt;
The session will finish with a MITM demo exploiting the AddJavascriptInterface.&lt;br /&gt;
&lt;br /&gt;
Slides are available here: [https://drive.google.com/file/d/0B2v5SuBDC0ejVFN5WlZaSTJyYU0/view?usp=sharing, OWASP Android Webview Explotiation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: Eoin Keary &amp;amp; Rahim Jina - 2014 EdgeScan Vulnerability Stats Report&lt;br /&gt;
&lt;br /&gt;
Eoin Keary - BCC Risk Advisory / OWASP&lt;br /&gt;
&lt;br /&gt;
Eoin is international board member and vice chair of OWASP, The Open Web Application Security Project (owasp.org), and during his time in OWASP he has lead the OWASP Testing and Security Code Review Guides and also contributed to OWASP SAMM, and the OWASP Cheat Sheet Series. &lt;br /&gt;
Eoin is a well-known technical leader in industry in the area of software security and penetration testing, and has led global security engagements for some of the world's largest financial services and consumer products companies. He was a senior manager, responsible for penetration testing in EMEA for a “big 4” professional services firm for 4.5 years. He is the CTO and founder of BCC Risk Advisory Ltd (bccriskadvisory.com) an Irish company who specialise in secure application development, advisory, penetration testing, Mobile &amp;amp; Cloud security and training. &lt;br /&gt;
Eoin has delivered security training and talks for OWASP to over 600 developers in the past year including events such as RSA (2013), RSA Europe, OWASP EU (2013), OWASP Dublin 2013.&lt;br /&gt;
&lt;br /&gt;
Rahim Jina - BCC Risk Advisory / OWASP&lt;br /&gt;
&lt;br /&gt;
Rahim is a member of OWASP and has contributed to many open source security projects over the past 8 years such as the OWASP Testing and Security Code Review Guides and also OWASP SAMM. Previously Rahim was a senior consultant at a “big 4” professional services for and the head of security for a large VoIP/IPT company in Los Angeles, USA and now works as the Director of information security for BCC Risk Advisory (bccriskadvisory.com). His is also responsible for the security architecture of the edgescan.com vulnerability management solution.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will go along to the Woolshed bar for some drinks and chats after the talk: (http://www.woolshedbaa.com/cork/)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc. &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP September Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - September 22 2014''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Monday 22nd September&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: UCC (WGB G.14)&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Western Gateway Building, UCC, Western Rd, Cork, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.co­m/maps/place/Western+­Gateway+Building+-+UC­C/@51.8934237,-8.4990­742,17z/ Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/207323992/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The next OWASP Cork Chapter meeting is taking place on Monday September 22nd in UCC (WGB G.14) at 7PM. &lt;br /&gt;
&lt;br /&gt;
We would like to treat all attendees to some beer and pizza after the talks in the Woolshed bar (Mardyke - http://www.woolshedbaa.com/cork/)&lt;br /&gt;
&lt;br /&gt;
Hope to see you there.&lt;br /&gt;
&lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Introduction to OWASP ZAP&lt;br /&gt;
&lt;br /&gt;
Overview of the OWASP ZAP tool. &lt;br /&gt;
&lt;br /&gt;
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.&lt;br /&gt;
&lt;br /&gt;
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.&lt;br /&gt;
&lt;br /&gt;
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: Mark Denihan - OWASP Security Shepherd&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skill set demographic. Shepherd covers the OWASP Top Ten web app risks and has recently been injected with totally new content to cover the OWASP Top Ten Mobile risks as well. Many of these levels include insufficient mitigations and protections to these risks, such as blacklist filters, atrocious encoding schemes, barbaric security mechanisms and poor security configuration. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well. In this presentation we're going to look at the Shepherd platform itself from both a learning and teaching perspective. Some of Shepherd's lessons and challenges will be demonstrated and we'll also walkthrough how easy it is to stand up a Security Shepherd instance and how it can be tailored to suit any web/mobile app sec teaching environments. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc.&lt;br /&gt;
&lt;br /&gt;
=== OWASP September Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - Joint event with CorkSec''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Tuesday 2nd September&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: SoHo&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Grand Parade, Cork, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/SoHo+Bar+%26+Restaurant/@51.897763,-8.47554,17z/data=!3m1!4b1!4m2!3m1!1s0x4844901091595791:0xd69636673a833492 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/203006902/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The first OWASP Cork Chapter meeting is taking place on Tuesday September 1st upstairs in SoHo bar on Grand Parade. This meeting is a joint event with the CorkSec group (http://www.meetup.com/CorkSec/). We would love if you could stay around after for a chat and some networking.&lt;br /&gt;
&lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Web to Shell by Darren Fitzpatrick&lt;br /&gt;
&lt;br /&gt;
Darren will introduce the concept of getting a shell through a website. This basically means remotely taking over the server on which a web application is installed. After a little theory, he will go about delivering demonstrations of this in action. Demos will include common attack vectors of this type and one recent and quite common ruby on rails specific remote exploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: How I got into Security by Jack Baylor&lt;br /&gt;
&lt;br /&gt;
In this short talk I'll be covering:&lt;br /&gt;
&lt;br /&gt;
* my education and previous work experience&lt;br /&gt;
* what courses I wish I'd covered but didn't&lt;br /&gt;
* how I got interested initially&lt;br /&gt;
* how I started researching and networking&lt;br /&gt;
* how I came about working in Qualcomm&lt;br /&gt;
* how some others broke into security (through polling others here and through talking to people on LinkedIn etc...), &lt;br /&gt;
* what courses I intend to take in the next 1, 2 and 5 years&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Chapters in Ireland ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Dublin'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Ireland-Dublin&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:Owen.Pendlebury(at)owasp.org Owen Pendlebury] +353876605277&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member/Global Board Member''' [[User:EoinKeary|Eoin Keary]] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:fcerullo(at)owasp.org Fabio Cerullo] +353877817468&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Mark.Denihan(at)owasp.org Mark Denihan]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP Limerick'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Limerick&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:marian.ventuneac(at)owasp.org Marian Ventuneac]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cork&amp;diff=187632</id>
		<title>Cork</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cork&amp;diff=187632"/>
				<updated>2015-01-06T16:08:09Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cork|extra= [[File:Owasp_logo_ireland_small.jpg]]| The chapter leaders are [mailto:fiona.collins@owasp.org Fiona Collins] and [mailto:darren.fitzpatrick@owasp.org Darren Fitzpatrick].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cork|emailarchives=http://lists.owasp.org/pipermail/owasp-Cork}}&lt;br /&gt;
&lt;br /&gt;
'''Becoming a chapter sponsor means that you get your organisation mentioned in meeting promotion (including on this page), recognition at the beginning of the meeting and promotional material at the meeting. &amp;lt;br&amp;gt;&lt;br /&gt;
We currently have the following sponsorship options available: &amp;lt;br&amp;gt;&lt;br /&gt;
€250 for an individual meeting sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
€1500 for annual chapter sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
Contact any of the board members below for more information. &amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Cork Board  ==&lt;br /&gt;
&lt;br /&gt;
Should you have a question about the local chapter, would like to get more involved contact any of the following people below &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chapter Leads''': &lt;br /&gt;
&lt;br /&gt;
*[mailto:fiona.collins(at)owasp.org Fiona Collins]&amp;lt;br&amp;gt;&lt;br /&gt;
*[mailto:darren.fitzpatrick@owasp.org Darren Fitzpatrick]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings - 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''Details and registration for all chapter meetingsis available on our Meet-Up page: http://www.meetup.com/OWASP-Cork/'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP December Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - December 11 2014''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 11 December 2014&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: UCC, Western Gateway Building, Room G04&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Western Road, Cork'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.co­m/maps/place/Western+­Gateway+Building+-+UC­C/@51.8934237,-8.4990­742,17z/ Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/218796493/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The next OWASP Cork Chapter meeting is taking place on Thursday December 11th in UCC (Western Gateway Building, WGB G04) at 7PM. &lt;br /&gt;
&lt;br /&gt;
Hope to see you there. &lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Eoin Carroll - Android Webview Exploitation&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Eoin Carroll is an IT Security Engineer and member of OWASP since 2009. Based in Cork and works on all things security with keen interests in the Android Stack, Threat Modeling, HTML5, Cryptanalysis, Reversing and Exploitation.&lt;br /&gt;
&lt;br /&gt;
Eoin has 13 years’ experience spanning across the IT, Semi-Conductor and Medical Device industries, working as an Electronic Engineer for 10 yrs and in Security for the last 3 years.&lt;br /&gt;
&lt;br /&gt;
Android Webview Exploitation&lt;br /&gt;
&lt;br /&gt;
This talk will focus on the AddJavascriptInterface which is remotely exploitable leading to Shell and Cross Application Scripting (XAS). Eoin will discuss the importance of Threat Modeling with cross platform development frameworks such as Phonegap/Cordova as well as security tools such as Drozer and AFE (Android Exploitation Framework).&lt;br /&gt;
&lt;br /&gt;
The session will finish with a MITM demo exploiting the AddJavascriptInterface.&lt;br /&gt;
&lt;br /&gt;
Slides are available here: [https://drive.google.com/file/d/0B2v5SuBDC0ejVFN5WlZaSTJyYU0/view?usp=sharing, OWASP Android Webview Explotiation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: Eoin Keary &amp;amp; Rahim Jina - 2014 EdgeScan Vulnerability Stats Report&lt;br /&gt;
&lt;br /&gt;
Eoin Keary - BCC Risk Advisory / OWASP&lt;br /&gt;
&lt;br /&gt;
Eoin is international board member and vice chair of OWASP, The Open Web Application Security Project (owasp.org), and during his time in OWASP he has lead the OWASP Testing and Security Code Review Guides and also contributed to OWASP SAMM, and the OWASP Cheat Sheet Series. &lt;br /&gt;
Eoin is a well-known technical leader in industry in the area of software security and penetration testing, and has led global security engagements for some of the world's largest financial services and consumer products companies. He was a senior manager, responsible for penetration testing in EMEA for a “big 4” professional services firm for 4.5 years. He is the CTO and founder of BCC Risk Advisory Ltd (bccriskadvisory.com) an Irish company who specialise in secure application development, advisory, penetration testing, Mobile &amp;amp; Cloud security and training. &lt;br /&gt;
Eoin has delivered security training and talks for OWASP to over 600 developers in the past year including events such as RSA (2013), RSA Europe, OWASP EU (2013), OWASP Dublin 2013.&lt;br /&gt;
&lt;br /&gt;
Rahim Jina - BCC Risk Advisory / OWASP&lt;br /&gt;
&lt;br /&gt;
Rahim is a member of OWASP and has contributed to many open source security projects over the past 8 years such as the OWASP Testing and Security Code Review Guides and also OWASP SAMM. Previously Rahim was a senior consultant at a “big 4” professional services for and the head of security for a large VoIP/IPT company in Los Angeles, USA and now works as the Director of information security for BCC Risk Advisory (bccriskadvisory.com). His is also responsible for the security architecture of the edgescan.com vulnerability management solution.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will go along to the Woolshed bar for some drinks and chats after the talk: (http://www.woolshedbaa.com/cork/)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc. &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP September Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - September 22 2014''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Monday 22nd September&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: UCC (WGB G.14)&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Western Gateway Building, UCC, Western Rd, Cork, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.co­m/maps/place/Western+­Gateway+Building+-+UC­C/@51.8934237,-8.4990­742,17z/ Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/207323992/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The next OWASP Cork Chapter meeting is taking place on Monday September 22nd in UCC (WGB G.14) at 7PM. &lt;br /&gt;
&lt;br /&gt;
We would like to treat all attendees to some beer and pizza after the talks in the Woolshed bar (Mardyke - http://www.woolshedbaa.com/cork/)&lt;br /&gt;
&lt;br /&gt;
Hope to see you there.&lt;br /&gt;
&lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Introduction to OWASP ZAP&lt;br /&gt;
&lt;br /&gt;
Overview of the OWASP ZAP tool. &lt;br /&gt;
&lt;br /&gt;
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.&lt;br /&gt;
&lt;br /&gt;
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.&lt;br /&gt;
&lt;br /&gt;
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: Mark Denihan - OWASP Security Shepherd&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skill set demographic. Shepherd covers the OWASP Top Ten web app risks and has recently been injected with totally new content to cover the OWASP Top Ten Mobile risks as well. Many of these levels include insufficient mitigations and protections to these risks, such as blacklist filters, atrocious encoding schemes, barbaric security mechanisms and poor security configuration. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well. In this presentation we're going to look at the Shepherd platform itself from both a learning and teaching perspective. Some of Shepherd's lessons and challenges will be demonstrated and we'll also walkthrough how easy it is to stand up a Security Shepherd instance and how it can be tailored to suit any web/mobile app sec teaching environments. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc.&lt;br /&gt;
&lt;br /&gt;
=== OWASP September Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - Joint event with CorkSec''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Tuesday 2nd September&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: SoHo&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Grand Parade, Cork, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/SoHo+Bar+%26+Restaurant/@51.897763,-8.47554,17z/data=!3m1!4b1!4m2!3m1!1s0x4844901091595791:0xd69636673a833492 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/203006902/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The first OWASP Cork Chapter meeting is taking place on Tuesday September 1st upstairs in SoHo bar on Grand Parade. This meeting is a joint event with the CorkSec group (http://www.meetup.com/CorkSec/). We would love if you could stay around after for a chat and some networking.&lt;br /&gt;
&lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Web to Shell by Darren Fitzpatrick&lt;br /&gt;
&lt;br /&gt;
Darren will introduce the concept of getting a shell through a website. This basically means remotely taking over the server on which a web application is installed. After a little theory, he will go about delivering demonstrations of this in action. Demos will include common attack vectors of this type and one recent and quite common ruby on rails specific remote exploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: How I got into Security by Jack Baylor&lt;br /&gt;
&lt;br /&gt;
In this short talk I'll be covering:&lt;br /&gt;
&lt;br /&gt;
* my education and previous work experience&lt;br /&gt;
* what courses I wish I'd covered but didn't&lt;br /&gt;
* how I got interested initially&lt;br /&gt;
* how I started researching and networking&lt;br /&gt;
* how I came about working in Qualcomm&lt;br /&gt;
* how some others broke into security (through polling others here and through talking to people on LinkedIn etc...), &lt;br /&gt;
* what courses I intend to take in the next 1, 2 and 5 years&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Chapters in Ireland ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Dublin'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Ireland-Dublin&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:Owen.Pendlebury(at)owasp.org Owen Pendlebury] +353876605277&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member/Global Board Member''' [[User:EoinKeary|Eoin Keary]] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:fcerullo(at)owasp.org Fabio Cerullo] +353877817468&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Mark.Denihan(at)owasp.org Mark Denihan]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP Limerick'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Limerick&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:marian.ventuneac(at)owasp.org Marian Ventuneac]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cork&amp;diff=186120</id>
		<title>Cork</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cork&amp;diff=186120"/>
				<updated>2014-11-28T12:49:38Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cork|extra= [[File:Owasp_logo_ireland_small.jpg]]| The chapter leaders are [mailto:fiona.collins@owasp.org Fiona Collins] and [mailto:darren.fitzpatrick@owasp.org Darren Fitzpatrick].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cork|emailarchives=http://lists.owasp.org/pipermail/owasp-Cork}}&lt;br /&gt;
&lt;br /&gt;
'''Becoming a chapter sponsor means that you get your organisation mentioned in meeting promotion (including on this page), recognition at the beginning of the meeting and promotional material at the meeting. &amp;lt;br&amp;gt;&lt;br /&gt;
We currently have the following sponsorship options available: &amp;lt;br&amp;gt;&lt;br /&gt;
€250 for an individual meeting sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
€1500 for annual chapter sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
Contact any of the board members below for more information. &amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Cork Board  ==&lt;br /&gt;
&lt;br /&gt;
Should you have a question about the local chapter, would like to get more involved contact any of the following people below &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chapter Leads''': &lt;br /&gt;
&lt;br /&gt;
*[mailto:fiona.collins(at)owasp.org Fiona Collins]&amp;lt;br&amp;gt;&lt;br /&gt;
*[mailto:darren.fitzpatrick@owasp.org Darren Fitzpatrick]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings - 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''Details and registration for all chapter meetingsis available on our Meet-Up page: http://www.meetup.com/OWASP-Cork/'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP December Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - December 11 2014''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 11 December 2014&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: UCC, Western Gateway Building, Room G04&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Western Road, Cork'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.co­m/maps/place/Western+­Gateway+Building+-+UC­C/@51.8934237,-8.4990­742,17z/ Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/218796493/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The next OWASP Cork Chapter meeting is taking place on Thursday December 11th in UCC (Western Gateway Building, WGB G04) at 7PM. &lt;br /&gt;
&lt;br /&gt;
Hope to see you there. &lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Eoin Carroll - Android Webview Exploitation&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Eoin Carroll is an IT Security Engineer and member of OWASP since 2009. Based in Cork and works on all things security with keen interests in the Android Stack, Threat Modeling, HTML5, Cryptanalysis, Reversing and Exploitation.&lt;br /&gt;
&lt;br /&gt;
Eoin has 13 years’ experience spanning across the IT, Semi-Conductor and Medical Device industries, working as an Electronic Engineer for 10 yrs and in Security for the last 3 years.&lt;br /&gt;
&lt;br /&gt;
Android Webview Exploitation&lt;br /&gt;
&lt;br /&gt;
This talk will focus on the AddJavascriptInterface which is remotely exploitable leading to Shell and Cross Application Scripting (XAS). Eoin will discuss the importance of Threat Modeling with cross platform development frameworks such as Phonegap/Cordova as well as security tools such as Drozer and AFE (Android Exploitation Framework).&lt;br /&gt;
&lt;br /&gt;
The session will finish with a MITM demo exploiting the AddJavascriptInterface.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: Eoin Keary &amp;amp; Rahim Jina - 2014 EdgeScan Vulnerability Stats Report&lt;br /&gt;
&lt;br /&gt;
Eoin Keary - BCC Risk Advisory / OWASP&lt;br /&gt;
&lt;br /&gt;
Eoin is international board member and vice chair of OWASP, The Open Web Application Security Project (owasp.org), and during his time in OWASP he has lead the OWASP Testing and Security Code Review Guides and also contributed to OWASP SAMM, and the OWASP Cheat Sheet Series. &lt;br /&gt;
Eoin is a well-known technical leader in industry in the area of software security and penetration testing, and has led global security engagements for some of the world's largest financial services and consumer products companies. He was a senior manager, responsible for penetration testing in EMEA for a “big 4” professional services firm for 4.5 years. He is the CTO and founder of BCC Risk Advisory Ltd (bccriskadvisory.com) an Irish company who specialise in secure application development, advisory, penetration testing, Mobile &amp;amp; Cloud security and training. &lt;br /&gt;
Eoin has delivered security training and talks for OWASP to over 600 developers in the past year including events such as RSA (2013), RSA Europe, OWASP EU (2013), OWASP Dublin 2013.&lt;br /&gt;
&lt;br /&gt;
Rahim Jina - BCC Risk Advisory / OWASP&lt;br /&gt;
&lt;br /&gt;
Rahim is a member of OWASP and has contributed to many open source security projects over the past 8 years such as the OWASP Testing and Security Code Review Guides and also OWASP SAMM. Previously Rahim was a senior consultant at a “big 4” professional services for and the head of security for a large VoIP/IPT company in Los Angeles, USA and now works as the Director of information security for BCC Risk Advisory (bccriskadvisory.com). His is also responsible for the security architecture of the edgescan.com vulnerability management solution.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will go along to the Woolshed bar for some drinks and chats after the talk: (http://www.woolshedbaa.com/cork/)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc. &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP September Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - September 22 2014''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Monday 22nd September&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: UCC (WGB G.14)&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Western Gateway Building, UCC, Western Rd, Cork, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.co­m/maps/place/Western+­Gateway+Building+-+UC­C/@51.8934237,-8.4990­742,17z/ Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/207323992/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The next OWASP Cork Chapter meeting is taking place on Monday September 22nd in UCC (WGB G.14) at 7PM. &lt;br /&gt;
&lt;br /&gt;
We would like to treat all attendees to some beer and pizza after the talks in the Woolshed bar (Mardyke - http://www.woolshedbaa.com/cork/)&lt;br /&gt;
&lt;br /&gt;
Hope to see you there.&lt;br /&gt;
&lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Introduction to OWASP ZAP&lt;br /&gt;
&lt;br /&gt;
Overview of the OWASP ZAP tool. &lt;br /&gt;
&lt;br /&gt;
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.&lt;br /&gt;
&lt;br /&gt;
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.&lt;br /&gt;
&lt;br /&gt;
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: Mark Denihan - OWASP Security Shepherd&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skill set demographic. Shepherd covers the OWASP Top Ten web app risks and has recently been injected with totally new content to cover the OWASP Top Ten Mobile risks as well. Many of these levels include insufficient mitigations and protections to these risks, such as blacklist filters, atrocious encoding schemes, barbaric security mechanisms and poor security configuration. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well. In this presentation we're going to look at the Shepherd platform itself from both a learning and teaching perspective. Some of Shepherd's lessons and challenges will be demonstrated and we'll also walkthrough how easy it is to stand up a Security Shepherd instance and how it can be tailored to suit any web/mobile app sec teaching environments. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc.&lt;br /&gt;
&lt;br /&gt;
=== OWASP September Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - Joint event with CorkSec''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Tuesday 2nd September&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: SoHo&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Grand Parade, Cork, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/SoHo+Bar+%26+Restaurant/@51.897763,-8.47554,17z/data=!3m1!4b1!4m2!3m1!1s0x4844901091595791:0xd69636673a833492 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/203006902/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The first OWASP Cork Chapter meeting is taking place on Tuesday September 1st upstairs in SoHo bar on Grand Parade. This meeting is a joint event with the CorkSec group (http://www.meetup.com/CorkSec/). We would love if you could stay around after for a chat and some networking.&lt;br /&gt;
&lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Web to Shell by Darren Fitzpatrick&lt;br /&gt;
&lt;br /&gt;
Darren will introduce the concept of getting a shell through a website. This basically means remotely taking over the server on which a web application is installed. After a little theory, he will go about delivering demonstrations of this in action. Demos will include common attack vectors of this type and one recent and quite common ruby on rails specific remote exploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: How I got into Security by Jack Baylor&lt;br /&gt;
&lt;br /&gt;
In this short talk I'll be covering:&lt;br /&gt;
&lt;br /&gt;
* my education and previous work experience&lt;br /&gt;
* what courses I wish I'd covered but didn't&lt;br /&gt;
* how I got interested initially&lt;br /&gt;
* how I started researching and networking&lt;br /&gt;
* how I came about working in Qualcomm&lt;br /&gt;
* how some others broke into security (through polling others here and through talking to people on LinkedIn etc...), &lt;br /&gt;
* what courses I intend to take in the next 1, 2 and 5 years&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Chapters in Ireland ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Dublin'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Ireland-Dublin&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:Owen.Pendlebury(at)owasp.org Owen Pendlebury] +353876605277&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member/Global Board Member''' [[User:EoinKeary|Eoin Keary]] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:fcerullo(at)owasp.org Fabio Cerullo] +353877817468&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Mark.Denihan(at)owasp.org Mark Denihan]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP Limerick'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Limerick&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:marian.ventuneac(at)owasp.org Marian Ventuneac]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cork&amp;diff=185639</id>
		<title>Cork</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cork&amp;diff=185639"/>
				<updated>2014-11-20T10:35:57Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cork|extra= [[File:Owasp_logo_ireland_small.jpg]]| The chapter leaders are [mailto:fiona.collins@owasp.org Fiona Collins] and [mailto:darren.fitzpatrick@owasp.org Darren Fitzpatrick].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cork|emailarchives=http://lists.owasp.org/pipermail/owasp-Cork}}&lt;br /&gt;
&lt;br /&gt;
'''Becoming a chapter sponsor means that you get your organisation mentioned in meeting promotion (including on this page), recognition at the beginning of the meeting and promotional material at the meeting. &amp;lt;br&amp;gt;&lt;br /&gt;
We currently have the following sponsorship options available: &amp;lt;br&amp;gt;&lt;br /&gt;
€250 for an individual meeting sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
€1500 for annual chapter sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
Contact any of the board members below for more information. &amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Cork Board  ==&lt;br /&gt;
&lt;br /&gt;
Should you have a question about the local chapter, would like to get more involved contact any of the following people below &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chapter Leads''': &lt;br /&gt;
&lt;br /&gt;
*[mailto:fiona.collins(at)owasp.org Fiona Collins]&amp;lt;br&amp;gt;&lt;br /&gt;
*[mailto:darren.fitzpatrick@owasp.org Darren Fitzpatrick]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings - 2014 ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP Decemberr Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - December 11 2014''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 11 December 2014&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: UCC, Western Gateway Building, Room G04&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Western Road, Cork'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.co­m/maps/place/Western+­Gateway+Building+-+UC­C/@51.8934237,-8.4990­742,17z/ Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/218796493/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The next OWASP Cork Chapter meeting is taking place on Thursday December 11th in UCC (Western Gateway Building, WGB G04) at 7PM. &lt;br /&gt;
&lt;br /&gt;
Hope to see you there. &lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Eoin Carroll - Android Webview Exploitation&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Eoin Carroll is an IT Security Engineer and member of OWASP since 2009. Based in Cork and works on all things security with keen interests in the Android Stack, Threat Modeling, HTML5, Cryptanalysis, Reversing and Exploitation.&lt;br /&gt;
&lt;br /&gt;
Eoin has 13 years’ experience spanning across the IT, Semi-Conductor and Medical Device industries, working as an Electronic Engineer for 10 yrs and in Security for the last 3 years.&lt;br /&gt;
&lt;br /&gt;
Android Webview Exploitation&lt;br /&gt;
&lt;br /&gt;
This talk will focus on the AddJavascriptInterface which is remotely exploitable leading to Shell and Cross Application Scripting (XAS). Eoin will discuss the importance of Threat Modeling with cross platform development frameworks such as Phonegap/Cordova as well as security tools such as Drozer and AFE (Android Exploitation Framework).&lt;br /&gt;
&lt;br /&gt;
The session will finish with a MITM demo exploiting the AddJavascriptInterface.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: Eoin Keary &amp;amp; Rahim Jina - 2014 EdgeScan Vulnerability Stats Report&lt;br /&gt;
&lt;br /&gt;
Eoin Keary - BCC Risk Advisory / OWASP&lt;br /&gt;
&lt;br /&gt;
Eoin is international board member and vice chair of OWASP, The Open Web Application Security Project (owasp.org), and during his time in OWASP he has lead the OWASP Testing and Security Code Review Guides and also contributed to OWASP SAMM, and the OWASP Cheat Sheet Series. &lt;br /&gt;
Eoin is a well-known technical leader in industry in the area of software security and penetration testing, and has led global security engagements for some of the world's largest financial services and consumer products companies. He was a senior manager, responsible for penetration testing in EMEA for a “big 4” professional services firm for 4.5 years. He is the CTO and founder of BCC Risk Advisory Ltd (bccriskadvisory.com) an Irish company who specialise in secure application development, advisory, penetration testing, Mobile &amp;amp; Cloud security and training. &lt;br /&gt;
Eoin has delivered security training and talks for OWASP to over 600 developers in the past year including events such as RSA (2013), RSA Europe, OWASP EU (2013), OWASP Dublin 2013.&lt;br /&gt;
&lt;br /&gt;
Rahim Jina - BCC Risk Advisory / OWASP&lt;br /&gt;
&lt;br /&gt;
Rahim is a member of OWASP and has contributed to many open source security projects over the past 8 years such as the OWASP Testing and Security Code Review Guides and also OWASP SAMM. Previously Rahim was a senior consultant at a “big 4” professional services for and the head of security for a large VoIP/IPT company in Los Angeles, USA and now works as the Director of information security for BCC Risk Advisory (bccriskadvisory.com). His is also responsible for the security architecture of the edgescan.com vulnerability management solution.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will go along to the Woolshed bar for some drinks and chats after the talk: (http://www.woolshedbaa.com/cork/)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc. &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP September Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - September 22 2014''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Monday 22nd September&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: UCC (WGB G.14)&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Western Gateway Building, UCC, Western Rd, Cork, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.co­m/maps/place/Western+­Gateway+Building+-+UC­C/@51.8934237,-8.4990­742,17z/ Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/207323992/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The next OWASP Cork Chapter meeting is taking place on Monday September 22nd in UCC (WGB G.14) at 7PM. &lt;br /&gt;
&lt;br /&gt;
We would like to treat all attendees to some beer and pizza after the talks in the Woolshed bar (Mardyke - http://www.woolshedbaa.com/cork/)&lt;br /&gt;
&lt;br /&gt;
Hope to see you there.&lt;br /&gt;
&lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Introduction to OWASP ZAP&lt;br /&gt;
&lt;br /&gt;
Overview of the OWASP ZAP tool. &lt;br /&gt;
&lt;br /&gt;
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.&lt;br /&gt;
&lt;br /&gt;
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.&lt;br /&gt;
&lt;br /&gt;
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: Mark Denihan - OWASP Security Shepherd&lt;br /&gt;
&lt;br /&gt;
The OWASP Security Shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skill set demographic. Shepherd covers the OWASP Top Ten web app risks and has recently been injected with totally new content to cover the OWASP Top Ten Mobile risks as well. Many of these levels include insufficient mitigations and protections to these risks, such as blacklist filters, atrocious encoding schemes, barbaric security mechanisms and poor security configuration. The modules have been crafted to provide not only a challenge for a security novice, but security professionals as well. In this presentation we're going to look at the Shepherd platform itself from both a learning and teaching perspective. Some of Shepherd's lessons and challenges will be demonstrated and we'll also walkthrough how easy it is to stand up a Security Shepherd instance and how it can be tailored to suit any web/mobile app sec teaching environments. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are provided free of charge although OWASP membership is encouraged and besides supporting the organisation, will provide the holder with benefits in other areas such as free/discounted entry to conferences, etc.&lt;br /&gt;
&lt;br /&gt;
=== OWASP September Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - Joint event with CorkSec''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Tuesday 2nd September&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: SoHo&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Grand Parade, Cork, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/SoHo+Bar+%26+Restaurant/@51.897763,-8.47554,17z/data=!3m1!4b1!4m2!3m1!1s0x4844901091595791:0xd69636673a833492 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/203006902/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The first OWASP Cork Chapter meeting is taking place on Tuesday September 1st upstairs in SoHo bar on Grand Parade. This meeting is a joint event with the CorkSec group (http://www.meetup.com/CorkSec/). We would love if you could stay around after for a chat and some networking.&lt;br /&gt;
&lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Web to Shell by Darren Fitzpatrick&lt;br /&gt;
&lt;br /&gt;
Darren will introduce the concept of getting a shell through a website. This basically means remotely taking over the server on which a web application is installed. After a little theory, he will go about delivering demonstrations of this in action. Demos will include common attack vectors of this type and one recent and quite common ruby on rails specific remote exploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: How I got into Security by Jack Baylor&lt;br /&gt;
&lt;br /&gt;
In this short talk I'll be covering:&lt;br /&gt;
&lt;br /&gt;
* my education and previous work experience&lt;br /&gt;
* what courses I wish I'd covered but didn't&lt;br /&gt;
* how I got interested initially&lt;br /&gt;
* how I started researching and networking&lt;br /&gt;
* how I came about working in Qualcomm&lt;br /&gt;
* how some others broke into security (through polling others here and through talking to people on LinkedIn etc...), &lt;br /&gt;
* what courses I intend to take in the next 1, 2 and 5 years&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Chapters in Ireland ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Dublin'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Ireland-Dublin&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:Owen.Pendlebury(at)owasp.org Owen Pendlebury] +353876605277&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member/Global Board Member''' [[User:EoinKeary|Eoin Keary]] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:fcerullo(at)owasp.org Fabio Cerullo] +353877817468&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Mark.Denihan(at)owasp.org Mark Denihan]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP Limerick'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Limerick&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:marian.ventuneac(at)owasp.org Marian Ventuneac]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cork&amp;diff=181424</id>
		<title>Cork</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cork&amp;diff=181424"/>
				<updated>2014-08-29T09:23:40Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cork|extra= [[File:Owasp_logo_ireland_small.jpg]]| The chapter leaders are [mailto:fiona.collins@owasp.org Fiona Collins] and [mailto:darren.fitzpatrick@owasp.org Darren Fitzpatrick].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cork|emailarchives=http://lists.owasp.org/pipermail/owasp-Cork}}&lt;br /&gt;
&lt;br /&gt;
'''Becoming a chapter sponsor means that you get your organisation mentioned in meeting promotion (including on this page), recognition at the beginning of the meeting and promotional material at the meeting. &amp;lt;br&amp;gt;&lt;br /&gt;
We currently have the following sponsorship options available: &amp;lt;br&amp;gt;&lt;br /&gt;
€250 for an individual meeting sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
€1500 for annual chapter sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
Contact any of the board members below for more information. &amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Cork Board  ==&lt;br /&gt;
&lt;br /&gt;
Should you have a question about the local chapter, would like to get more involved contact any of the following people below &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chapter Leads''': &lt;br /&gt;
&lt;br /&gt;
*[mailto:fiona.collins(at)owasp.org Fiona Collins]&amp;lt;br&amp;gt;&lt;br /&gt;
*[mailto:darren.fitzpatrick@owasp.org Darren Fitzpatrick]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Other OWASP Chapters in Ireland ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Dublin'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Ireland-Dublin&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:Owen.Pendlebury(at)owasp.org Owen Pendlebury] +353876605277&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member/Global Board Member''' [[User:EoinKeary|Eoin Keary]] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:fcerullo(at)owasp.org Fabio Cerullo] +353877817468&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Mark.Denihan(at)owasp.org Mark Denihan]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP Limerick'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Limerick&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:marian.ventuneac(at)owasp.org Marian Ventuneac]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings - 2014 ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP September Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - Joint event with CorkSec''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Tuesday 2nd September&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: SoHo&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Grand Parade, Cork, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/SoHo+Bar+%26+Restaurant/@51.897763,-8.47554,17z/data=!3m1!4b1!4m2!3m1!1s0x4844901091595791:0xd69636673a833492 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/203006902/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The first OWASP Cork Chapter meeting is taking place on Tuesday September 1st upstairs in SoHo bar on Grand Parade. This meeting is a joint event with the CorkSec group (http://www.meetup.com/CorkSec/). We would love if you could stay around after for a chat and some networking.&lt;br /&gt;
&lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Web to Shell by Darren Fitzpatrick&lt;br /&gt;
&lt;br /&gt;
Darren will introduce the concept of getting a shell through a website. This basically means remotely taking over the server on which a web application is installed. After a little theory, he will go about delivering demonstrations of this in action. Demos will include common attack vectors of this type and one recent and quite common ruby on rails specific remote exploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: How I got into Security by Jack Baylor&lt;br /&gt;
&lt;br /&gt;
In this short talk I'll be covering:&lt;br /&gt;
&lt;br /&gt;
* my education and previous work experience&lt;br /&gt;
* what courses I wish I'd covered but didn't&lt;br /&gt;
* how I got interested initially&lt;br /&gt;
* how I started researching and networking&lt;br /&gt;
* how I came about working in Qualcomm&lt;br /&gt;
* how some others broke into security (through polling others here and through talking to people on LinkedIn etc...), &lt;br /&gt;
* what courses I intend to take in the next 1, 2 and 5 years&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cork&amp;diff=181089</id>
		<title>Cork</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cork&amp;diff=181089"/>
				<updated>2014-08-25T13:20:22Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cork|extra=The chapter leaders are [mailto:fiona.collins@owasp.org Fiona Collins] and [mailto:darren.fitzpatrick@owasp.org Darren Fitzpatrick].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cork|emailarchives=http://lists.owasp.org/pipermail/owasp-Cork}}&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings - 2014 ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP September Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Meeting - Joint event with CorkSec''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Tuesday 2nd September&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Doors: 19:00 &amp;lt;br&amp;gt;Talks start: 19:15&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: SoHo&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Grand Parade, Cork, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/SoHo+Bar+%26+Restaurant/@51.897763,-8.47554,17z/data=!3m1!4b1!4m2!3m1!1s0x4844901091595791:0xd69636673a833492 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.meetup.com/OWASP-Cork/events/203006902/ Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The first OWASP Cork Chapter meeting is taking place on Tuesday September 1st upstairs in SoHo bar on Grand Parade. This meeting is a joint event with the CorkSec group (http://www.meetup.com/CorkSec/). We would love if you could stay around after for a chat and some networking.&lt;br /&gt;
&lt;br /&gt;
There are two talks lined up:&lt;br /&gt;
&lt;br /&gt;
Talk 1: Web to Shell by Darren Fitzpatrick&lt;br /&gt;
&lt;br /&gt;
Darren will introduce the concept of getting a shell through a website. This basically means remotely taking over the server on which a web application is installed. After a little theory, he will go about delivering demonstrations of this in action. Demos will include common attack vectors of this type and one recent and quite common ruby on rails specific remote exploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Talk 2: How I got into Security by Jack Baylor&lt;br /&gt;
&lt;br /&gt;
In this short talk I'll be covering:&lt;br /&gt;
&lt;br /&gt;
* my education and previous work experience&lt;br /&gt;
* what courses I wish I'd covered but didn't&lt;br /&gt;
* how I got interested initially&lt;br /&gt;
* how I started researching and networking&lt;br /&gt;
* how I came about working in Qualcomm&lt;br /&gt;
* how some others broke into security (through polling others here and through talking to people on LinkedIn etc...), &lt;br /&gt;
* what courses I intend to take in the next 1, 2 and 5 years&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cork&amp;diff=179929</id>
		<title>Cork</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cork&amp;diff=179929"/>
				<updated>2014-08-05T07:03:06Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cork|extra=The chapter leaders are [mailto:fiona.collins@owasp.org Fiona Collins] and [mailto:darren.fitzpatrick@owasp.org Darren Fitzpatrick].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cork|emailarchives=http://lists.owasp.org/pipermail/owasp-Cork}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dublin&amp;diff=175127</id>
		<title>Dublin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dublin&amp;diff=175127"/>
				<updated>2014-05-15T20:01:13Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ireland|extra= [[File:Owasp_logo_ireland_small.jpg]]| mailinglistsite=https://lists.owasp.org/mailman/listinfo/owasp-ireland}} become a [http://www.owasp.org/index.php/Membership#Categories_of_Membership_.26_Supporters Member or Annual Chapter Sponsor(s)]. &amp;lt;br&amp;gt;&lt;br /&gt;
Becoming a chapter sponsor means that you get your organisation mentioned in meeting promotion (including on this page), recognition at the beginning of the meeting and promotional material at the meeting. &amp;lt;br&amp;gt;&lt;br /&gt;
We currently have the following sponsorship options available: &amp;lt;br&amp;gt;&lt;br /&gt;
€250 for an individual meeting sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
€1500 for annual chapter sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
Contact any of the board members below for more information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Board  ==&lt;br /&gt;
&lt;br /&gt;
Should you have a question about the local chapter, would like to get more involved contact ANY of the following people below &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:fiona.collins(at)owasp.org Fiona Collins]&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member/Global Board Member''' [[User:EoinKeary|Eoin Keary]] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:fcerullo(at)owasp.org Fabio Cerullo] +353877817468&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Owen.Pendlebury(at)owasp.org Owen Pendlebury]&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Darren.Fitzpatrick(at)owasp.org Darren Fitzpatrick]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Advisor''' [mailto:rahim.jina(at)owasp.org Rahim Jina]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''OWASP Ireland'''&amp;lt;br&amp;gt;23 The Chandler, Rahtborne Village &amp;lt;br&amp;gt;Ashtown, Dublin 15, Ireland &amp;lt;br&amp;gt;Tel: +353877817468 | Fax: +353877817468 &amp;lt;br&amp;gt;&amp;lt;paypal&amp;gt;Ireland&amp;lt;/paypal&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Dublin Chapter 2014 ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event (2)===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Matt Johansen Sr. Manager for the Threat Research Center at WhiteHat Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 22nd May&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: Morgan McKinley Dublin office &amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: Morgan McKinley, Connaught House, No.1 Burlington Road, Dublin 4 (off the canal, across from the Mespil Hotel. On the second floor.)'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://www.google.ie/maps/place/Connaught+House/@53.332691,-6.2473347,17z/data=!3m1!4b1!4m2!3m1!1s0x48670ebdacbb7d5f:0x5c32fa5458ed31b9 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-may-tickets-11644682559 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to WhiteHat Security - https://www.whitehatsec.com/ &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''*&amp;quot;Top 10 Web Hacks of 2013&amp;quot;*'''&lt;br /&gt;
&lt;br /&gt;
'''Matt Johansen Sr. Manager for the Threat Research Center at WhiteHat Security'''&lt;br /&gt;
&lt;br /&gt;
Matt Johansen is a Sr. Manager for the Threat Research Center at WhiteHat Security where he manages a team of Application Security Specialists, Engineers and Supervisors to prevent website security attacks and protect companies' and their customers' data. Before this he was an Application Security Engineer where he oversaw and assessed more than 35,000 web applications that WhiteHat has under contract for many Fortune 500 companies across a range of technologies.&lt;br /&gt;
 &lt;br /&gt;
He was previously a security consultant for VerSprite, where he was responsible for performing network and web application penetration tests. Mr. Johansen is also an instructor of Web Application Security at Adelphi University, where he received his Bachelor of Science in Computer Science, and San Jose State University. He has also been utilized by the SANS Institute as an industry expert for certification review.&lt;br /&gt;
 &lt;br /&gt;
List of past talks including videos/slides - http://mattjay.github.io/talks/ (BlackHat, DEFCON, RSA, SXSW, Many BSides, etc.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Every year the security community produces a stunning number of new Web hacking techniques that are published in various white papers, blog posts, magazine articles, mailing list emails, conference presentations, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and their mobile platform equivalents. Beyond individual vulnerabilities with CVE numbers or system compromises, we are solely focused on new and creative methods of Web-based attack. Now in its eighth year, the Top 10 Web Hacking Techniques list encourages information sharing, provides a centralized knowledge base, and recognizes researchers who contribute excellent work.&lt;br /&gt;
 &lt;br /&gt;
In this talk, We will do a technical deep dive and take you through the Top 10 Web Hacks of 2013 as picked by an expert panel of judges.&lt;br /&gt;
 &lt;br /&gt;
This year’s winners are:&lt;br /&gt;
&lt;br /&gt;
1 - Mario Heiderich – Mutation XSS&amp;lt;br&amp;gt;&lt;br /&gt;
2 - Angelo Prado, Neal Harris, Yoel Gluck – BREACH&amp;lt;br&amp;gt;&lt;br /&gt;
3 - Pixel Perfect Timing Attacks with HTML5&amp;lt;br&amp;gt;&lt;br /&gt;
4 - Lucky 13 Attack&amp;lt;br&amp;gt;&lt;br /&gt;
5 - Weaknesses in RC4&amp;lt;br&amp;gt;&lt;br /&gt;
6 - Timur Yunusov and Alexey Osipov – XML Out of Band Data Retrieval&amp;lt;br&amp;gt;&lt;br /&gt;
7 - Million Browser Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
8 - Large Scale Detection of DOM based XSS&amp;lt;br&amp;gt;&lt;br /&gt;
9 - Tor Hidden-Service Passive De-Cloaking&amp;lt;br&amp;gt;&lt;br /&gt;
10 - HTML5 Hard Disk Filler™ API&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event (1)===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Eoin Kearyof BCC Risk Advisory and Matej Saksida of Realex''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 1st May&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-may-tickets-11354041243 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to BCC Risk Advisory (http://www.bccriskadvisory.com/) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: *&amp;quot;Top 10 defensive Java developer controls&amp;quot;*'''&lt;br /&gt;
&lt;br /&gt;
'''Eoin Keary - BCC Risk Advisory - (http://ie.linkedin.com/in/eoinkeary)'''&lt;br /&gt;
&lt;br /&gt;
OWASP board member since 2009. Elected to position of global Vice Chair, September 2011. A long time member of OWASP. Based in Dublin and director of BCC Risk Advisory Ltd.&lt;br /&gt;
Eoin Keary has been with OWASP since 2004. He is based in Ireland and runs a software security practice, bccriskadvisory.com. He is currently on the global board of the OWASP foundation, he was elected to the board in 2009. During this time Eoin assisted in founding the OWASP legal entity in Europe and has helped provide structure to OWASPs finances and strategy. &lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
In this talk Eoin shall go through a list of developer controls in order to help prevent common security vulnerabilities such those focused in the&lt;br /&gt;
OWASP Top 10 2013. From input validation to contextual output encoding to crypto-secure storage, Eoin shall call out what developers can do to help&lt;br /&gt;
mitigate such issues. Many of the mitigations are simple and use established API's such that developer need not be security experts and just&lt;br /&gt;
use core components to help improve their security posture.&lt;br /&gt;
&lt;br /&gt;
[[File:Top_Ten_Java_Defenses.pdf|200px|thumb|left|Eoin Keary BCC Risk Advisory talk]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Talk 2: *&amp;quot;Social Engineering - The Art of Human Hacking&amp;quot;.*'''&lt;br /&gt;
&lt;br /&gt;
'''Matej Saksida - Realex Payments - (http://ie.linkedin.com/pub/matej-saksida-cism/20/412/176)'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Nowadays if you want to hack a corporation or damage a personal &amp;quot;enemy&amp;quot; fast, Social Engineering techniques work every time and more often than not&lt;br /&gt;
it works the first time. In this talk Matej shall go through what is social engineering is, types of social engineering and related threats.&lt;br /&gt;
Matej shall call out practical example how to use Facebook to ruin someone's life and what countermeasures can be used against social engineering attacks.&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation_Social_Engineering.pdf|200px|thumb|left|Matej Saksida Realex talk]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP March Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Rahim Jina of BCC Risk Advisory and Stephen Scott of Espion''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 13th March&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-tickets-10802455435 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to Espion (http://www.espiongroup.com/)&lt;br /&gt;
&lt;br /&gt;
Talk 1: Building a shield of security - Vulnerability Management by the numbers and dumb robots!&lt;br /&gt;
&lt;br /&gt;
Rahim Jina - BCC Risk Advisory&lt;br /&gt;
&lt;br /&gt;
Rahim has been an active member of OWASP since 2008 and has contributed to many projects such as the OWASP Security Code Review Guide and is an ex-board member of the Irish Chapter. Previously Rahim was a senior security consultant at a “big 4” professional services firm and more recently, the head of security for Fonality Inc, a VoIP service provider based in Los Angeles. Rahim is currently a director for BCC Risk Advisory (bccriskadvisory.com), based in Dublin, Ireland. He is also responsible for the security architecture of the edgescan.comvulnerability management solution.&lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
This presentation discusses how builders, breakers and defenders should look at vulnerability management when attempting to keep hackers at bay. We discuss the most common vulnerabilities which are not detected by security tools nor automation but nevertheless are common and can be used to commit real fraud resulting in financial loss. We will see that Web Application Firewalls are ineffective against such attacks and why the only practical solution is to apply a layered approach across all aspects of the SDLC.&lt;br /&gt;
&lt;br /&gt;
 [[File:BCC_Risk_Advisory_-_OWASP_Dublin_-_Vulnerability_Management_by_the_numbers_and_dumb_robots!.pdf|200px|thumb|left|Rahim BCC Risk Advisory talk]]&lt;br /&gt;
&lt;br /&gt;
Talk 2: &amp;quot;PCI's Changing Environment - What You Need to Know &amp;amp; Why You Need To Know It&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Stephen Scott - Senior Consultant and PCI QSA in Espion's Information Government practice&lt;br /&gt;
&lt;br /&gt;
Stephen Scott, Consultancy Team lead in Espion, is an experienced information security, risk and compliance consultant whose experience spans across many different areas including, PCI DSS, information security, risk management, group internal audit, IT service management and regulatory compliance. Stephen has extensive experience with information security, internal control testing, compliance programmes, information risk management, and process improvement. Stephen has worked across a wide range of industry verticals, including financial, industrial and insurance.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
PCI DSS – The Payment Card Industry Data Security Standard sets common requirements for securing payment card information (credit, debit, some gift cards), and lays out a range of controls relating to auditing, scanning and assessment.&lt;br /&gt;
&lt;br /&gt;
This presentation discusses the ever evolving PCI environment, specifically focusing on the changes in the recent release of version 3 of the PCI DSS standard.  Stephen will start off by giving a brief background to PCI, including motivators for merchant and service providers to adhere to the standard.  In addition to this, the presentation will highlight what security considerations are relevant to application and information security practitioners.&lt;br /&gt;
&lt;br /&gt;
[[File:PCIs_Changing_Environment_-_What_You_Need_to_Know_&amp;amp;_Why_You_Need_To_Know_It..ppt|200px|thumb|left|Stephen Espion Talk]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2013 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP July Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Jeremiah Grossman - Another Year in Web Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 4th July&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 17:30 &amp;lt;br&amp;gt;Talk: 18:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.eventbrite.com/event/7127672059 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Jeremiah Grossman of WhiteHat Security will be in Dublin and will be talking at our next chapter event. His talk &amp;quot;Another Year In Web Security: What did 2012 teach us about survival in the coming years?&amp;quot; promises a great insight into the future of web security.&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, founder and CTO of WhiteHat Security, is a world-renowned expert in web application security and a founding member of the Web Application Security Consortium (WASC). At WhiteHat, Mr. Grossman is responsible for web application security R&amp;amp;D and industry evangelism. He is a frequent speaker at industry events including the BlackHat Briefings, ISACA's Networks Security Conference, NASA, ISSA and Defcon. &lt;br /&gt;
&lt;br /&gt;
A trusted media resource, Mr. Grossman has been featured in USA Today, the Washington Post, Information Week, NBC Nightly News, and many others. Mr. Grossman is also a featured expert and frequent contributor on TechTarget'sSearchAppSecurity.com.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP June Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training. [https://www.owasp.org/index.php/EUTour2013#Training Info about the training session])'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference. [https://www.owasp.org/index.php/EUTour2013#Dublin Info and registration link for the conference])''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event ===&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''TRAINING &amp;amp; TALKS''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Dublin - Realex Payments Application Security Workshop''' == &lt;br /&gt;
'''Thursday 30th May'''&amp;lt;br&amp;gt; ''('''Training'''. 1:30pm- 5:00pm)'' &amp;lt;br&amp;gt;('''Talks'''. 6:00pm - 8:00pm)''&amp;lt;br&amp;gt;[http://www.eventbrite.com/event/6665658163/eorg Click here for more information]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Training'''&lt;br /&gt;
&lt;br /&gt;
Eoin Keary will be delivering free application security training between 2pm and 5pm on the 30th May. Eoin was the founder of OWASP Ireland and is currently the global vice chair for OWASP (amongst many other things!  https://www.owasp.org/index.php/Eoin_Keary). He has delivered application security training to many developers and security professionals around the world and recently delivered a training course to over 400 people at the RSA Conference.&lt;br /&gt;
&lt;br /&gt;
The training will focus on secure application development and why we can't hack ourselves secure. It will be covering why penetration testing on its own does not work approaches to improvement including &amp;quot;knowing what you don't know&amp;quot; and how to measure change.&lt;br /&gt;
&lt;br /&gt;
It will be technical training covering XSS eradication, client side security and browser DOM curiosities.&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
The talks will be starting at 6pm in our office and OWASP have arranged two very interesting talks! Diarmaid McManus https://twitter.com/elephant_rb from Realex Payments will be expanding his award winning SecurityBSides London Rookie Track talk https://www.securityninja.co.uk/application-security/securitybsides-london-esp-security-plugin/ to include more details about static analysis approaches and his research and development work on ESP: Security Plugin https://github.com/diarmaid-mcmanus/ESPSecurityPlugin.&lt;br /&gt;
&lt;br /&gt;
Hugh Pearse https://twitter.com/hughpearse will be talking about Low Level Exploits and this looks like it will be a great talk:&lt;br /&gt;
&lt;br /&gt;
“In 2010 Mr Haroon Meer from thinkst.com presented a timeline of memory corruption vulnerabilities and their mitigation techniques dating from 1985 to 2010. In his 35 page publication he referenced almost 150 events in low level information security history. The scope of the presentation &amp;quot;Low Level Exploits&amp;quot; is to explain in detail some of the most significant attacks in from Haroon Meers research. The attacks covered in this presentation include buffer overflows on the stack, heap overflows, integer overflows, format strings, null pointers and ROP chains. This brings us to exploits in the present day where researchers are looking for the successor of the buffer overflow attack, next big exploit.”&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2011 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== [[Ireland/Training/OWASP projects and resources you can use TODAY]] ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp logo Ireland Training 11 March 2010.gif]]&lt;br /&gt;
&lt;br /&gt;
*'''Overview &amp;amp; Goal'''&lt;br /&gt;
**Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle. &lt;br /&gt;
**This course aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them. &lt;br /&gt;
**The course will be very practical where demonstration and hands-on exercises will be provided for the tools covered. &lt;br /&gt;
**If you are interested in participating in the hands on portion of the course, please bring a laptop. &lt;br /&gt;
*'''Dates'''&lt;br /&gt;
**March, 2011, 11&lt;br /&gt;
*'''Course Main Content and Registration'''&lt;br /&gt;
**[[Ireland/Training/OWASP projects and resources you can use TODAY|Click here]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dublin2010.gif]]&lt;br /&gt;
&lt;br /&gt;
Click [[OWASP IRELAND 2010]] for more information &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010 Agenda  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== AUG 2010  ====&lt;br /&gt;
== OWASP August Event ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 11/8/2010 6:00pm - 8:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' OWASP ESAPI Swingset: Introduction &amp;amp; Demo by Cathal Courtney&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The ESAPI Swingset is a web application which demonstrates common security vulnerabilities and asks users to secure the application against these vulnerabilities using the ESAPI library. The application is intended for Java Developers. The goal of the application is to teach developers about the functionality of the ESAPI library and give users a practical understanding of how it can be used to protect web applications against common security vulnerabilities. During the talk, Cathal will demonstrate how to install and use ESAPI Swingset in your organization. A copy of the latest version will be also provided to the attendees.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Cathal is an experienced developer working at AIB and is currently the ESAPI Swingset project leader. More information about this project could be found here: [http://www.owasp.org/index.php/ESAPI_Swingset Esapi SwingSet]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' Not available&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' Security Implications for Web Applications based on SOA by John Marmelstein&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The main point of SOA (in this context) is combining systems and applications to make new applications, or a big 'overall' application.This higher inter-operability does (by default) lower security. For a start, a request originating from a web user might end up at several back end systems, which do not know who or what the request came from.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each back end system might have no access to the customer data, have a different security models, and serve serveral front end. Each of the above systems could be under different ownership, thus the owners have different concerns and priorities. Also, the basic solution at a technical level include single sign on, or security as a service. This can be costly, give limited coverage and have a performance hit. But is pretty much the only way to do it. The other thing to do (probably in tandem) is strict management, and delegation of authority.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John has about 13 years in IT. Most of this in distributed systems and 'Middleware' integration software. Including BEA (now owned by Oracle). Mainly working on Enterprise Java and more recently on Microsoft BizTalk. Various industries, incuding financials, public services, and a fish farm.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== SEP 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND 2010  ==&lt;br /&gt;
&lt;br /&gt;
Due to popular demand we are hosting the 2nd OWASP IRELAND event, '''OWASP Ireland 2010'''. &amp;lt;br&amp;gt;Continuing last years highly successful conference, with more than 150 attendees from across the globe OWASP is happy to repeat this positive experience. &amp;lt;br&amp;gt;Delegates from numerous industry verticals attended the 2009 event; from government to finance to telecoms. Share your thoughts at this open event with some of the most experienced individuals in the information security industry. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_IRELAND_2010 [[Image:Dublin2010.gif]]]&amp;lt;br&amp;gt;[[OWASP_IRELAND_2010]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' '''September 17th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Trinity College Dublin, The Hamilton Building &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [[Eoin Keary|Eoin Keary]]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Subscribe to the OWASP Ireland [https://lists.owasp.org/mailman/listinfo/owasp-ireland mail list] for the up-to-date information.''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OCT 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== NOV 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== DEC 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== 2010 Chapter Plan  ====&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Educational Outreach&amp;lt;br&amp;gt;Summary: Drive education awareness of OWASP among Irish Universities and Third Level Institutions. &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Fabio Cerullo &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Industry Outreach&amp;lt;br&amp;gt;Summary: Raise awareness of OWASP among Irish industry.&amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Eoin Keary&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Membership Drive &amp;lt;br&amp;gt;Summary: Increase local chapter members individuals and corporate supporters &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Project Participants: Rahim Jina&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Hands-On Training&amp;lt;br&amp;gt;Summary: Provide 1-day, 3-day and 5-day hands-on classroom / online training classes&amp;lt;br&amp;gt;Next Milestone: Organize Training Offerings&amp;lt;br&amp;gt;Project Participants: Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Call For Presentations for 2010 is now open - please contact fcerullo(@)owasp.org / +353877817468 if you would like to speak or can host a meeting. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;*Note meeting hosts are provided with annual chapter sponsorship and free seats in training classes. The OWASP Foundation, Ireland chapter focuses on implementation of efforts defined by the [http://www.owasp.org/index.php/Global_Committee_Pages Global Committee] as well as new concepts and ideas defined locally. Below are a list of ACTIVE projects assigned to individual active members and teams within the local chapter. If you would like to help out on ANY of these efforts, contact them directly to get involved &lt;br /&gt;
&lt;br /&gt;
==== FEB 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Event - What is the O2 Platform?  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 19/2/2010 3:00pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP O2 Platform - Open Platform for automating application security knowledge and workflows &amp;lt;br&amp;gt;'''Abstract:''' In this talk Dinis Cruz will show the OWASP O2 Platform which is an open source toolkit specifically designed for developers and security consultants to be able to perform quick, effective and thorough 'source-code-driven' application security reviews. The OWASP O2 Platform (http://www.owasp.org/index.php/OWASP_O2_Platform) consumes results from the scanning engines from Ounce Labs, Microsoft's CAT.NET tool, FindBugs, CodeCrawler and AppScan DE, and also provides limited support for Fortify and OWASP WebScarab dumps. In the past, there has been a very healthy skepticism on the usability of Source Code analysis engines to find commonly found vulnerablities in real world applications. This presentation will show that with some creative and powerful tools, it IS possible to use O2 to discover those issues. This presentation will also show O2's advanced support for Struts and Spring MVC. &lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development. For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences. At OWASP, Dinis is the leader of the [[OWASP O2 Platform]] project, member of the OWASP [[Global Projects Committee]], chair of the [[OWASP Connections Committee]] and member of the [[About The Open Web Application Security Project#Global_Board_Members|OWASP Board]]. &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' http://www.o2-ounceopen.com/files-binaries-source-and-demo/old-documents-and-presentations/OWASP_O2_Platform_-_AppSec_Ireland_Sep_2009.pdf &lt;br /&gt;
&lt;br /&gt;
== IISF/OWASP – February Chapter Meeting  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 25/2/2010 2:00pm - 4:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Georgian Suite, Buswells Hotel, Molesworth St., Dublin 2 &lt;br /&gt;
&lt;br /&gt;
'''Title:''' An overview of Web Application Security threats and technologies. Practical advice and techniques for improving Application Security, presented by OWASP. &lt;br /&gt;
&lt;br /&gt;
2:00 - Introduction by IISF Chairman &lt;br /&gt;
&lt;br /&gt;
2:05 - Presentation&amp;amp;nbsp;: “Practical advice for improving Application Security” - Introduction to OWASP and OWASP Top Ten - Demonstration video of typical web based attacks with high level explanation - Live SQL injection demo using WebGoat &amp;amp;amp; WebScarab - Live Cross Site Scripting demo using WebGoat &amp;amp;amp; WebScarab &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part1.ppt]] &lt;br /&gt;
&lt;br /&gt;
3:00 - Coffee &lt;br /&gt;
&lt;br /&gt;
3:20 – Presentation continues - Application Security: &amp;quot;The problems we are faced with&amp;quot; - The Application Security Verification Standard - SDLC &amp;amp;amp; Security Assurance Maturity Model - Code Review versus traditional Runtime Testing. - Q&amp;amp;amp;A &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part2.pptx]] &lt;br /&gt;
&lt;br /&gt;
4:00 - Close of Meeting &lt;br /&gt;
&lt;br /&gt;
4:05 - Traditional networking in Buswells Bar &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP - 26/3/2010  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== APR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Live CD - An open environment for Web Application Security  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 16/4/2010 2:30pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP Live CD - An open environment for Web Application Security &amp;lt;br&amp;gt;'''Abstract:''' This CD collects some of the best open source security projects in a single environment. Web developers, testers and security professionals can boot from this Live CD and have access to a full security testing suite. This presentation aims to provide a showcase for the great OWASP tools and documentation materials available in the CD, tips and tricks, and also some introductory stuff regarding code review and penetration testing. &amp;lt;br&amp;gt;Training is aimed at introductory /intermediate level in terms of pen testing, code review and tools. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Rahim Jina''' &amp;lt;br&amp;gt;Rahim Jina currently works as a senior consultant for Ernst &amp;amp;amp; Young's Risk Advisory Services in Dublin. He has worked there for nearly four years primarily delivering penetration testing services to clients globally, focusing on web applications and secure code review. He has been involved with OWASP for the past two years, being involved in the Summer of Code 2008 as lead reviewer for the Code Review Guide 2009. He has also made contributions to the SAMM project (OpenSAMM). He holds an MSC in Security and Forensic Computing from DCU and a degree in computer science from Trinity college. &amp;lt;br&amp;gt;'''Eoin Keary''' &amp;lt;br&amp;gt;Eoin is a long time member of OWASP and have contributed year on year to OWASP projects and the OWASP mission of fighting the causes of software insecurity. He is based in Dublin, Ireland and run the Ernst &amp;amp;amp; Young application security team across Europe. His OWASP contributions to date include the OWASP Code Review Guide, OWASP Testing Guide, OWASP SAMM, and OWASP ASVS. He is a member of the OWASP Global Industry Committee, chair of the OWASP Conferences Committee and member of the OWASP Global Board. Eoin founded the OWASP Ireland chapter back in 2004 and currently serves as Vice President of the OWASP Ireland Board. &lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/d/db/P1040923_1024.JPG [[Image:|P1040923_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/d/db/P1040923_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/f/f3/P1040927_1024.JPG [[Image:|P1040927_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/f/f3/P1040927_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/6/64/P1040929_1024.JPG [[Image:|P1040929_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/6/64/P1040929_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
'''Download Presentation:''' [http://www.owasp.org/images/e/ee/OWASP_Live_CD.pptx [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After OWASP Live CD training &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAY 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Trials &amp;amp;amp; Tribulations of WAF Implementation  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Trials &amp;amp;amp; Tribulations of WAF Implementation&amp;lt;br&amp;gt;'''Abstract:''' A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.&amp;lt;br&amp;gt;Mark will be presenting on his experience in implementing a Web Application Firewall solution through all phases from research to implementation. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Mark Hillick - Application Networking Team, Citrix Systems''' &amp;lt;br&amp;gt;Mark Hillick has 10 years experience in relation to Internet, networking, systems administration and security engineering. &lt;br /&gt;
&lt;br /&gt;
Mark graduated from Queen's University, where he studied Mathematics. &lt;br /&gt;
&lt;br /&gt;
Mark joined AIB from Queen's where he joined the Internet Infrastructure team, where he was responsible for designing, building and securing the Internet service in and out of AIB. He is a prominent member of the IT Security community in Ireland and has presented at several local security forums such as IISF and Owasp. Mark is one of the founding members of IRISS CERT, where he is also a Volunteer Incident Handler. He helped organise IRISSCon 2009, where he also designed and built HackEire 2009, the first Ethical Hacking 'Capture The Flag' contest in Ireland.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[Image:20052010017.jpg|thumb|A caption from Mark's talk]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [http://docs.google.com/fileview?id=0B3vrVYEosFeEZDMyZjIzYTktMzNkZC00ZjBlLWFiYTgtNThjZGE4YTE1NmFj [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After WAF presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUN 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Define Security Requirements - A practical approach  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Define Security Requirements - A practical approach&amp;lt;br&amp;gt;'''Abstract:''' The Data Protection Act states that &amp;quot;appropriate security measures&amp;quot; must be taken to protect personal data. How do you specify the appropriate security measures for a website which processes personal data? It is an important step in a development project, but is often neglected. In this talk, Alexis will descibe his own experiences of assessing web application, and will also look in more detail at what the Data Protection Commissioner says. He will then take a fictional website and look at a practical approach to specifying the security requirements that the fictional application should meet. This will use the kind of risk-based techniques outlined by OWASP or the Microsoft Secure Development Lifecycle (SDL). Issues discussed will include encryption, authentication, access control, audit, etc. The result will be a list of security requirements that can be carried into the design and development phases. Attendees should be able to apply the ideas to their own development projects. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Alexis Fitzgerald - Rits Information Security Group''' &amp;lt;br&amp;gt;For the last six years Alexis has worked for Rits Information Security Group, where he performs application penetration testing assignments as well as advising clients on application security issues. Before that, he spent many years as a developer (mainly in the financial sector), and he continues to be involved in development. Alexis holds an MSc in Information Security from the University of London, Royal Holloway.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:OWASP Ireland June10.pdf]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After Alexis presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUL 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Ireland]]&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dublin&amp;diff=170693</id>
		<title>Dublin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dublin&amp;diff=170693"/>
				<updated>2014-03-24T11:04:20Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: Added sponsorship detail&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ireland|extra= [[File:Owasp_logo_ireland_small.jpg]]| mailinglistsite=https://lists.owasp.org/mailman/listinfo/owasp-ireland}} become a [http://www.owasp.org/index.php/Membership#Categories_of_Membership_.26_Supporters Member or Annual Chapter Sponsor(s)]. &amp;lt;br&amp;gt;&lt;br /&gt;
Becoming a chapter sponsor means that you get your organisation mentioned in meeting promotion (including on this page), recognition at the beginning of the meeting and promotional material at the meeting. &amp;lt;br&amp;gt;&lt;br /&gt;
We currently have the following sponsorship options available: &amp;lt;br&amp;gt;&lt;br /&gt;
€250 for an individual meeting sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
€1500 for annual chapter sponsorship&amp;lt;br&amp;gt;&lt;br /&gt;
Contact any of the board members below for more information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Board  ==&lt;br /&gt;
&lt;br /&gt;
Should you have a question about the local chapter, would like to get more involved contact ANY of the following people below &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:fiona.collins(at)owasp.org Fiona Collins]&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member/Global Board Member''' [[User:EoinKeary|Eoin Keary]] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:fcerullo(at)owasp.org Fabio Cerullo] +353877817468&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Owen.Pendlebury(at)owasp.org Owen Pendlebury]&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Darren.Fitzpatrick(at)owasp.org Darren Fitzpatrick]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Advisor''' [mailto:rahim.jina(at)owasp.org Rahim Jina]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''OWASP Ireland'''&amp;lt;br&amp;gt;23 The Chandler, Rahtborne Village &amp;lt;br&amp;gt;Ashtown, Dublin 15, Ireland &amp;lt;br&amp;gt;Tel: +353877817468 | Fax: +353877817468 &amp;lt;br&amp;gt;&amp;lt;paypal&amp;gt;Ireland&amp;lt;/paypal&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Dublin Chapter 2014 ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP March Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Rahim Jina of BCC Risk Advisory and Stephen Scott of Espion''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 13th March&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-tickets-10802455435 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to Espion (http://www.espiongroup.com/)&lt;br /&gt;
&lt;br /&gt;
Talk 1: Building a shield of security - Vulnerability Management by the numbers and dumb robots!&lt;br /&gt;
&lt;br /&gt;
Rahim Jina - BCC Risk Advisory&lt;br /&gt;
&lt;br /&gt;
Rahim has been an active member of OWASP since 2008 and has contributed to many projects such as the OWASP Security Code Review Guide and is an ex-board member of the Irish Chapter. Previously Rahim was a senior security consultant at a “big 4” professional services firm and more recently, the head of security for Fonality Inc, a VoIP service provider based in Los Angeles. Rahim is currently a director for BCC Risk Advisory (bccriskadvisory.com), based in Dublin, Ireland. He is also responsible for the security architecture of the edgescan.comvulnerability management solution.&lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
This presentation discusses how builders, breakers and defenders should look at vulnerability management when attempting to keep hackers at bay. We discuss the most common vulnerabilities which are not detected by security tools nor automation but nevertheless are common and can be used to commit real fraud resulting in financial loss. We will see that Web Application Firewalls are ineffective against such attacks and why the only practical solution is to apply a layered approach across all aspects of the SDLC.&lt;br /&gt;
&lt;br /&gt;
 [[File:BCC_Risk_Advisory_-_OWASP_Dublin_-_Vulnerability_Management_by_the_numbers_and_dumb_robots!.pdf|200px|thumb|left|Rahim BCC Risk Advisory talk]]&lt;br /&gt;
&lt;br /&gt;
Talk 2: &amp;quot;PCI's Changing Environment - What You Need to Know &amp;amp; Why You Need To Know It&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Stephen Scott - Senior Consultant and PCI QSA in Espion's Information Government practice&lt;br /&gt;
&lt;br /&gt;
Stephen Scott, Consultancy Team lead in Espion, is an experienced information security, risk and compliance consultant whose experience spans across many different areas including, PCI DSS, information security, risk management, group internal audit, IT service management and regulatory compliance. Stephen has extensive experience with information security, internal control testing, compliance programmes, information risk management, and process improvement. Stephen has worked across a wide range of industry verticals, including financial, industrial and insurance.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
PCI DSS – The Payment Card Industry Data Security Standard sets common requirements for securing payment card information (credit, debit, some gift cards), and lays out a range of controls relating to auditing, scanning and assessment.&lt;br /&gt;
&lt;br /&gt;
This presentation discusses the ever evolving PCI environment, specifically focusing on the changes in the recent release of version 3 of the PCI DSS standard.  Stephen will start off by giving a brief background to PCI, including motivators for merchant and service providers to adhere to the standard.  In addition to this, the presentation will highlight what security considerations are relevant to application and information security practitioners.&lt;br /&gt;
&lt;br /&gt;
[[File:PCIs_Changing_Environment_-_What_You_Need_to_Know_&amp;amp;_Why_You_Need_To_Know_It..ppt|200px|thumb|left|Stephen Espion Talk]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2013 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP July Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Jeremiah Grossman - Another Year in Web Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 4th July&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 17:30 &amp;lt;br&amp;gt;Talk: 18:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.eventbrite.com/event/7127672059 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Jeremiah Grossman of WhiteHat Security will be in Dublin and will be talking at our next chapter event. His talk &amp;quot;Another Year In Web Security: What did 2012 teach us about survival in the coming years?&amp;quot; promises a great insight into the future of web security.&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, founder and CTO of WhiteHat Security, is a world-renowned expert in web application security and a founding member of the Web Application Security Consortium (WASC). At WhiteHat, Mr. Grossman is responsible for web application security R&amp;amp;D and industry evangelism. He is a frequent speaker at industry events including the BlackHat Briefings, ISACA's Networks Security Conference, NASA, ISSA and Defcon. &lt;br /&gt;
&lt;br /&gt;
A trusted media resource, Mr. Grossman has been featured in USA Today, the Washington Post, Information Week, NBC Nightly News, and many others. Mr. Grossman is also a featured expert and frequent contributor on TechTarget'sSearchAppSecurity.com.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP June Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training. [https://www.owasp.org/index.php/EUTour2013#Training Info about the training session])'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference. [https://www.owasp.org/index.php/EUTour2013#Dublin Info and registration link for the conference])''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event ===&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''TRAINING &amp;amp; TALKS''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Dublin - Realex Payments Application Security Workshop''' == &lt;br /&gt;
'''Thursday 30th May'''&amp;lt;br&amp;gt; ''('''Training'''. 1:30pm- 5:00pm)'' &amp;lt;br&amp;gt;('''Talks'''. 6:00pm - 8:00pm)''&amp;lt;br&amp;gt;[http://www.eventbrite.com/event/6665658163/eorg Click here for more information]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Training'''&lt;br /&gt;
&lt;br /&gt;
Eoin Keary will be delivering free application security training between 2pm and 5pm on the 30th May. Eoin was the founder of OWASP Ireland and is currently the global vice chair for OWASP (amongst many other things!  https://www.owasp.org/index.php/Eoin_Keary). He has delivered application security training to many developers and security professionals around the world and recently delivered a training course to over 400 people at the RSA Conference.&lt;br /&gt;
&lt;br /&gt;
The training will focus on secure application development and why we can't hack ourselves secure. It will be covering why penetration testing on its own does not work approaches to improvement including &amp;quot;knowing what you don't know&amp;quot; and how to measure change.&lt;br /&gt;
&lt;br /&gt;
It will be technical training covering XSS eradication, client side security and browser DOM curiosities.&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
The talks will be starting at 6pm in our office and OWASP have arranged two very interesting talks! Diarmaid McManus https://twitter.com/elephant_rb from Realex Payments will be expanding his award winning SecurityBSides London Rookie Track talk https://www.securityninja.co.uk/application-security/securitybsides-london-esp-security-plugin/ to include more details about static analysis approaches and his research and development work on ESP: Security Plugin https://github.com/diarmaid-mcmanus/ESPSecurityPlugin.&lt;br /&gt;
&lt;br /&gt;
Hugh Pearse https://twitter.com/hughpearse will be talking about Low Level Exploits and this looks like it will be a great talk:&lt;br /&gt;
&lt;br /&gt;
“In 2010 Mr Haroon Meer from thinkst.com presented a timeline of memory corruption vulnerabilities and their mitigation techniques dating from 1985 to 2010. In his 35 page publication he referenced almost 150 events in low level information security history. The scope of the presentation &amp;quot;Low Level Exploits&amp;quot; is to explain in detail some of the most significant attacks in from Haroon Meers research. The attacks covered in this presentation include buffer overflows on the stack, heap overflows, integer overflows, format strings, null pointers and ROP chains. This brings us to exploits in the present day where researchers are looking for the successor of the buffer overflow attack, next big exploit.”&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2011 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== [[Ireland/Training/OWASP projects and resources you can use TODAY]] ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp logo Ireland Training 11 March 2010.gif]]&lt;br /&gt;
&lt;br /&gt;
*'''Overview &amp;amp; Goal'''&lt;br /&gt;
**Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle. &lt;br /&gt;
**This course aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them. &lt;br /&gt;
**The course will be very practical where demonstration and hands-on exercises will be provided for the tools covered. &lt;br /&gt;
**If you are interested in participating in the hands on portion of the course, please bring a laptop. &lt;br /&gt;
*'''Dates'''&lt;br /&gt;
**March, 2011, 11&lt;br /&gt;
*'''Course Main Content and Registration'''&lt;br /&gt;
**[[Ireland/Training/OWASP projects and resources you can use TODAY|Click here]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dublin2010.gif]]&lt;br /&gt;
&lt;br /&gt;
Click [[OWASP IRELAND 2010]] for more information &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010 Agenda  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== AUG 2010  ====&lt;br /&gt;
== OWASP August Event ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 11/8/2010 6:00pm - 8:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' OWASP ESAPI Swingset: Introduction &amp;amp; Demo by Cathal Courtney&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The ESAPI Swingset is a web application which demonstrates common security vulnerabilities and asks users to secure the application against these vulnerabilities using the ESAPI library. The application is intended for Java Developers. The goal of the application is to teach developers about the functionality of the ESAPI library and give users a practical understanding of how it can be used to protect web applications against common security vulnerabilities. During the talk, Cathal will demonstrate how to install and use ESAPI Swingset in your organization. A copy of the latest version will be also provided to the attendees.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Cathal is an experienced developer working at AIB and is currently the ESAPI Swingset project leader. More information about this project could be found here: [http://www.owasp.org/index.php/ESAPI_Swingset Esapi SwingSet]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' Not available&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' Security Implications for Web Applications based on SOA by John Marmelstein&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The main point of SOA (in this context) is combining systems and applications to make new applications, or a big 'overall' application.This higher inter-operability does (by default) lower security. For a start, a request originating from a web user might end up at several back end systems, which do not know who or what the request came from.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each back end system might have no access to the customer data, have a different security models, and serve serveral front end. Each of the above systems could be under different ownership, thus the owners have different concerns and priorities. Also, the basic solution at a technical level include single sign on, or security as a service. This can be costly, give limited coverage and have a performance hit. But is pretty much the only way to do it. The other thing to do (probably in tandem) is strict management, and delegation of authority.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John has about 13 years in IT. Most of this in distributed systems and 'Middleware' integration software. Including BEA (now owned by Oracle). Mainly working on Enterprise Java and more recently on Microsoft BizTalk. Various industries, incuding financials, public services, and a fish farm.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== SEP 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND 2010  ==&lt;br /&gt;
&lt;br /&gt;
Due to popular demand we are hosting the 2nd OWASP IRELAND event, '''OWASP Ireland 2010'''. &amp;lt;br&amp;gt;Continuing last years highly successful conference, with more than 150 attendees from across the globe OWASP is happy to repeat this positive experience. &amp;lt;br&amp;gt;Delegates from numerous industry verticals attended the 2009 event; from government to finance to telecoms. Share your thoughts at this open event with some of the most experienced individuals in the information security industry. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_IRELAND_2010 [[Image:Dublin2010.gif]]]&amp;lt;br&amp;gt;[[OWASP_IRELAND_2010]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' '''September 17th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Trinity College Dublin, The Hamilton Building &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [[Eoin Keary|Eoin Keary]]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Subscribe to the OWASP Ireland [https://lists.owasp.org/mailman/listinfo/owasp-ireland mail list] for the up-to-date information.''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OCT 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== NOV 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== DEC 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== 2010 Chapter Plan  ====&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Educational Outreach&amp;lt;br&amp;gt;Summary: Drive education awareness of OWASP among Irish Universities and Third Level Institutions. &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Fabio Cerullo &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Industry Outreach&amp;lt;br&amp;gt;Summary: Raise awareness of OWASP among Irish industry.&amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Eoin Keary&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Membership Drive &amp;lt;br&amp;gt;Summary: Increase local chapter members individuals and corporate supporters &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Project Participants: Rahim Jina&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Hands-On Training&amp;lt;br&amp;gt;Summary: Provide 1-day, 3-day and 5-day hands-on classroom / online training classes&amp;lt;br&amp;gt;Next Milestone: Organize Training Offerings&amp;lt;br&amp;gt;Project Participants: Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Call For Presentations for 2010 is now open - please contact fcerullo(@)owasp.org / +353877817468 if you would like to speak or can host a meeting. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;*Note meeting hosts are provided with annual chapter sponsorship and free seats in training classes. The OWASP Foundation, Ireland chapter focuses on implementation of efforts defined by the [http://www.owasp.org/index.php/Global_Committee_Pages Global Committee] as well as new concepts and ideas defined locally. Below are a list of ACTIVE projects assigned to individual active members and teams within the local chapter. If you would like to help out on ANY of these efforts, contact them directly to get involved &lt;br /&gt;
&lt;br /&gt;
==== FEB 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Event - What is the O2 Platform?  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 19/2/2010 3:00pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP O2 Platform - Open Platform for automating application security knowledge and workflows &amp;lt;br&amp;gt;'''Abstract:''' In this talk Dinis Cruz will show the OWASP O2 Platform which is an open source toolkit specifically designed for developers and security consultants to be able to perform quick, effective and thorough 'source-code-driven' application security reviews. The OWASP O2 Platform (http://www.owasp.org/index.php/OWASP_O2_Platform) consumes results from the scanning engines from Ounce Labs, Microsoft's CAT.NET tool, FindBugs, CodeCrawler and AppScan DE, and also provides limited support for Fortify and OWASP WebScarab dumps. In the past, there has been a very healthy skepticism on the usability of Source Code analysis engines to find commonly found vulnerablities in real world applications. This presentation will show that with some creative and powerful tools, it IS possible to use O2 to discover those issues. This presentation will also show O2's advanced support for Struts and Spring MVC. &lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development. For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences. At OWASP, Dinis is the leader of the [[OWASP O2 Platform]] project, member of the OWASP [[Global Projects Committee]], chair of the [[OWASP Connections Committee]] and member of the [[About The Open Web Application Security Project#Global_Board_Members|OWASP Board]]. &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' http://www.o2-ounceopen.com/files-binaries-source-and-demo/old-documents-and-presentations/OWASP_O2_Platform_-_AppSec_Ireland_Sep_2009.pdf &lt;br /&gt;
&lt;br /&gt;
== IISF/OWASP – February Chapter Meeting  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 25/2/2010 2:00pm - 4:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Georgian Suite, Buswells Hotel, Molesworth St., Dublin 2 &lt;br /&gt;
&lt;br /&gt;
'''Title:''' An overview of Web Application Security threats and technologies. Practical advice and techniques for improving Application Security, presented by OWASP. &lt;br /&gt;
&lt;br /&gt;
2:00 - Introduction by IISF Chairman &lt;br /&gt;
&lt;br /&gt;
2:05 - Presentation&amp;amp;nbsp;: “Practical advice for improving Application Security” - Introduction to OWASP and OWASP Top Ten - Demonstration video of typical web based attacks with high level explanation - Live SQL injection demo using WebGoat &amp;amp;amp; WebScarab - Live Cross Site Scripting demo using WebGoat &amp;amp;amp; WebScarab &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part1.ppt]] &lt;br /&gt;
&lt;br /&gt;
3:00 - Coffee &lt;br /&gt;
&lt;br /&gt;
3:20 – Presentation continues - Application Security: &amp;quot;The problems we are faced with&amp;quot; - The Application Security Verification Standard - SDLC &amp;amp;amp; Security Assurance Maturity Model - Code Review versus traditional Runtime Testing. - Q&amp;amp;amp;A &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part2.pptx]] &lt;br /&gt;
&lt;br /&gt;
4:00 - Close of Meeting &lt;br /&gt;
&lt;br /&gt;
4:05 - Traditional networking in Buswells Bar &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP - 26/3/2010  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== APR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Live CD - An open environment for Web Application Security  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 16/4/2010 2:30pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP Live CD - An open environment for Web Application Security &amp;lt;br&amp;gt;'''Abstract:''' This CD collects some of the best open source security projects in a single environment. Web developers, testers and security professionals can boot from this Live CD and have access to a full security testing suite. This presentation aims to provide a showcase for the great OWASP tools and documentation materials available in the CD, tips and tricks, and also some introductory stuff regarding code review and penetration testing. &amp;lt;br&amp;gt;Training is aimed at introductory /intermediate level in terms of pen testing, code review and tools. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Rahim Jina''' &amp;lt;br&amp;gt;Rahim Jina currently works as a senior consultant for Ernst &amp;amp;amp; Young's Risk Advisory Services in Dublin. He has worked there for nearly four years primarily delivering penetration testing services to clients globally, focusing on web applications and secure code review. He has been involved with OWASP for the past two years, being involved in the Summer of Code 2008 as lead reviewer for the Code Review Guide 2009. He has also made contributions to the SAMM project (OpenSAMM). He holds an MSC in Security and Forensic Computing from DCU and a degree in computer science from Trinity college. &amp;lt;br&amp;gt;'''Eoin Keary''' &amp;lt;br&amp;gt;Eoin is a long time member of OWASP and have contributed year on year to OWASP projects and the OWASP mission of fighting the causes of software insecurity. He is based in Dublin, Ireland and run the Ernst &amp;amp;amp; Young application security team across Europe. His OWASP contributions to date include the OWASP Code Review Guide, OWASP Testing Guide, OWASP SAMM, and OWASP ASVS. He is a member of the OWASP Global Industry Committee, chair of the OWASP Conferences Committee and member of the OWASP Global Board. Eoin founded the OWASP Ireland chapter back in 2004 and currently serves as Vice President of the OWASP Ireland Board. &lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/d/db/P1040923_1024.JPG [[Image:|P1040923_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/d/db/P1040923_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/f/f3/P1040927_1024.JPG [[Image:|P1040927_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/f/f3/P1040927_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/6/64/P1040929_1024.JPG [[Image:|P1040929_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/6/64/P1040929_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
'''Download Presentation:''' [http://www.owasp.org/images/e/ee/OWASP_Live_CD.pptx [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After OWASP Live CD training &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAY 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Trials &amp;amp;amp; Tribulations of WAF Implementation  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Trials &amp;amp;amp; Tribulations of WAF Implementation&amp;lt;br&amp;gt;'''Abstract:''' A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.&amp;lt;br&amp;gt;Mark will be presenting on his experience in implementing a Web Application Firewall solution through all phases from research to implementation. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Mark Hillick - Application Networking Team, Citrix Systems''' &amp;lt;br&amp;gt;Mark Hillick has 10 years experience in relation to Internet, networking, systems administration and security engineering. &lt;br /&gt;
&lt;br /&gt;
Mark graduated from Queen's University, where he studied Mathematics. &lt;br /&gt;
&lt;br /&gt;
Mark joined AIB from Queen's where he joined the Internet Infrastructure team, where he was responsible for designing, building and securing the Internet service in and out of AIB. He is a prominent member of the IT Security community in Ireland and has presented at several local security forums such as IISF and Owasp. Mark is one of the founding members of IRISS CERT, where he is also a Volunteer Incident Handler. He helped organise IRISSCon 2009, where he also designed and built HackEire 2009, the first Ethical Hacking 'Capture The Flag' contest in Ireland.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[Image:20052010017.jpg|thumb|A caption from Mark's talk]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [http://docs.google.com/fileview?id=0B3vrVYEosFeEZDMyZjIzYTktMzNkZC00ZjBlLWFiYTgtNThjZGE4YTE1NmFj [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After WAF presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUN 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Define Security Requirements - A practical approach  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Define Security Requirements - A practical approach&amp;lt;br&amp;gt;'''Abstract:''' The Data Protection Act states that &amp;quot;appropriate security measures&amp;quot; must be taken to protect personal data. How do you specify the appropriate security measures for a website which processes personal data? It is an important step in a development project, but is often neglected. In this talk, Alexis will descibe his own experiences of assessing web application, and will also look in more detail at what the Data Protection Commissioner says. He will then take a fictional website and look at a practical approach to specifying the security requirements that the fictional application should meet. This will use the kind of risk-based techniques outlined by OWASP or the Microsoft Secure Development Lifecycle (SDL). Issues discussed will include encryption, authentication, access control, audit, etc. The result will be a list of security requirements that can be carried into the design and development phases. Attendees should be able to apply the ideas to their own development projects. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Alexis Fitzgerald - Rits Information Security Group''' &amp;lt;br&amp;gt;For the last six years Alexis has worked for Rits Information Security Group, where he performs application penetration testing assignments as well as advising clients on application security issues. Before that, he spent many years as a developer (mainly in the financial sector), and he continues to be involved in development. Alexis holds an MSc in Information Security from the University of London, Royal Holloway.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:OWASP Ireland June10.pdf]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After Alexis presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUL 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Ireland]]&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dublin&amp;diff=169957</id>
		<title>Dublin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dublin&amp;diff=169957"/>
				<updated>2014-03-11T21:42:43Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ireland|extra= [[File:Owasp_logo_ireland_small.jpg]]| mailinglistsite=https://lists.owasp.org/mailman/listinfo/owasp-ireland}} become a [http://www.owasp.org/index.php/Membership#Categories_of_Membership_.26_Supporters Member or Annual Chapter Sponsor(s)]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Board  ==&lt;br /&gt;
&lt;br /&gt;
Should you have a question about the local chapter, would like to get more involved contact ANY of the following people below &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Chapter Lead''' [mailto:fiona.walsh(at)owasp.org Fiona Walsh]&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member/Global Board Member''' [[User:EoinKeary|Eoin Keary]] &amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:fcerullo(at)owasp.org Fabio Cerullo] +353877817468&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Owen.Pendlebury(at)owasp.org Owen Pendlebury]&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Board Member''' [mailto:Darren.Fitzpatrick(at)owasp.org Darren Fitzpatrick]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Advisor''' [mailto:rahim.jina(at)owasp.org Rahim Jina]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''OWASP Ireland'''&amp;lt;br&amp;gt;23 The Chandler, Rahtborne Village &amp;lt;br&amp;gt;Ashtown, Dublin 15, Ireland &amp;lt;br&amp;gt;Tel: +353877817468 | Fax: +353877817468 &amp;lt;br&amp;gt;&amp;lt;paypal&amp;gt;Ireland&amp;lt;/paypal&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Dublin Chapter 2014 ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP March Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Rahim Jina of BCC Risk Advisory and Stephen Scott of Espion''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 13th March&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 18:30 &amp;lt;br&amp;gt;Talk: 19:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [https://www.eventbrite.ie/e/owasp-chapter-meeting-tickets-10802455435 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | There will be networking afterwards, with beer and pizza thanks to Espion (http://www.espiongroup.com/)&lt;br /&gt;
&lt;br /&gt;
Talk 1: Building a shield of security - Vulnerability Management by the numbers and dumb robots!&lt;br /&gt;
&lt;br /&gt;
Rahim Jina - BCC Risk Advisory&lt;br /&gt;
&lt;br /&gt;
Rahim has been an active member of OWASP since 2008 and has contributed to many projects such as the OWASP Security Code Review Guide and is an ex-board member of the Irish Chapter. Previously Rahim was a senior security consultant at a “big 4” professional services firm and more recently, the head of security for Fonality Inc, a VoIP service provider based in Los Angeles. Rahim is currently a director for BCC Risk Advisory (bccriskadvisory.com), based in Dublin, Ireland. He is also responsible for the security architecture of the edgescan.comvulnerability management solution.&lt;br /&gt;
&lt;br /&gt;
Abstract: &lt;br /&gt;
&lt;br /&gt;
This presentation discusses how builders, breakers and defenders should look at vulnerability management when attempting to keep hackers at bay. We discuss the most common vulnerabilities which are not detected by security tools nor automation but nevertheless are common and can be used to commit real fraud resulting in financial loss. We will see that Web Application Firewalls are ineffective against such attacks and why the only practical solution is to apply a layered approach across all aspects of the SDLC.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Talk 2: &amp;quot;PCI's Changing Environment - What You Need to Know &amp;amp; Why You Need To Know It&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Stephen Scott - Senior Consultant and PCI QSA in Espion's Information Government practice&lt;br /&gt;
&lt;br /&gt;
Stephen Scott, Consultancy Team lead in Espion, is an experienced information security, risk and compliance consultant whose experience spans across many different areas including, PCI DSS, information security, risk management, group internal audit, IT service management and regulatory compliance. Stephen has extensive experience with information security, internal control testing, compliance programmes, information risk management, and process improvement. Stephen has worked across a wide range of industry verticals, including financial, industrial and insurance.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
PCI DSS – The Payment Card Industry Data Security Standard sets common requirements for securing payment card information (credit, debit, some gift cards), and lays out a range of controls relating to auditing, scanning and assessment.&lt;br /&gt;
&lt;br /&gt;
This presentation discusses the ever evolving PCI environment, specifically focusing on the changes in the recent release of version 3 of the PCI DSS standard.  Stephen will start off by giving a brief background to PCI, including motivators for merchant and service providers to adhere to the standard.  In addition to this, the presentation will highlight what security considerations are relevant to application and information security practitioners.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2013 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== OWASP July Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''Chapter Event - Jeremiah Grossman - Another Year in Web Security''' &lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Thursday 4th July&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' Registration: 17:30 &amp;lt;br&amp;gt;Talk: 18:00&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
''(Registration. [http://www.eventbrite.com/event/7127672059 Register here])''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | Jeremiah Grossman of WhiteHat Security will be in Dublin and will be talking at our next chapter event. His talk &amp;quot;Another Year In Web Security: What did 2012 teach us about survival in the coming years?&amp;quot; promises a great insight into the future of web security.&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, founder and CTO of WhiteHat Security, is a world-renowned expert in web application security and a founding member of the Web Application Security Consortium (WASC). At WhiteHat, Mr. Grossman is responsible for web application security R&amp;amp;D and industry evangelism. He is a frequent speaker at industry events including the BlackHat Briefings, ISACA's Networks Security Conference, NASA, ISSA and Defcon. &lt;br /&gt;
&lt;br /&gt;
A trusted media resource, Mr. Grossman has been featured in USA Today, the Washington Post, Information Week, NBC Nightly News, and many others. Mr. Grossman is also a featured expert and frequent contributor on TechTarget'sSearchAppSecurity.com.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP June Event ===&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training. [https://www.owasp.org/index.php/EUTour2013#Training Info about the training session])'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference. [https://www.owasp.org/index.php/EUTour2013#Dublin Info and registration link for the conference])''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== OWASP May Event ===&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''TRAINING &amp;amp; TALKS''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Dublin - Realex Payments Application Security Workshop''' == &lt;br /&gt;
'''Thursday 30th May'''&amp;lt;br&amp;gt; ''('''Training'''. 1:30pm- 5:00pm)'' &amp;lt;br&amp;gt;('''Talks'''. 6:00pm - 8:00pm)''&amp;lt;br&amp;gt;[http://www.eventbrite.com/event/6665658163/eorg Click here for more information]&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Training'''&lt;br /&gt;
&lt;br /&gt;
Eoin Keary will be delivering free application security training between 2pm and 5pm on the 30th May. Eoin was the founder of OWASP Ireland and is currently the global vice chair for OWASP (amongst many other things!  https://www.owasp.org/index.php/Eoin_Keary). He has delivered application security training to many developers and security professionals around the world and recently delivered a training course to over 400 people at the RSA Conference.&lt;br /&gt;
&lt;br /&gt;
The training will focus on secure application development and why we can't hack ourselves secure. It will be covering why penetration testing on its own does not work approaches to improvement including &amp;quot;knowing what you don't know&amp;quot; and how to measure change.&lt;br /&gt;
&lt;br /&gt;
It will be technical training covering XSS eradication, client side security and browser DOM curiosities.&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
The talks will be starting at 6pm in our office and OWASP have arranged two very interesting talks! Diarmaid McManus https://twitter.com/elephant_rb from Realex Payments will be expanding his award winning SecurityBSides London Rookie Track talk https://www.securityninja.co.uk/application-security/securitybsides-london-esp-security-plugin/ to include more details about static analysis approaches and his research and development work on ESP: Security Plugin https://github.com/diarmaid-mcmanus/ESPSecurityPlugin.&lt;br /&gt;
&lt;br /&gt;
Hugh Pearse https://twitter.com/hughpearse will be talking about Low Level Exploits and this looks like it will be a great talk:&lt;br /&gt;
&lt;br /&gt;
“In 2010 Mr Haroon Meer from thinkst.com presented a timeline of memory corruption vulnerabilities and their mitigation techniques dating from 1985 to 2010. In his 35 page publication he referenced almost 150 events in low level information security history. The scope of the presentation &amp;quot;Low Level Exploits&amp;quot; is to explain in detail some of the most significant attacks in from Haroon Meers research. The attacks covered in this presentation include buffer overflows on the stack, heap overflows, integer overflows, format strings, null pointers and ROP chains. This brings us to exploits in the present day where researchers are looking for the successor of the buffer overflow attack, next big exploit.”&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2011 Agenda ==&lt;br /&gt;
&lt;br /&gt;
=== [[Ireland/Training/OWASP projects and resources you can use TODAY]] ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp logo Ireland Training 11 March 2010.gif]]&lt;br /&gt;
&lt;br /&gt;
*'''Overview &amp;amp; Goal'''&lt;br /&gt;
**Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle. &lt;br /&gt;
**This course aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them. &lt;br /&gt;
**The course will be very practical where demonstration and hands-on exercises will be provided for the tools covered. &lt;br /&gt;
**If you are interested in participating in the hands on portion of the course, please bring a laptop. &lt;br /&gt;
*'''Dates'''&lt;br /&gt;
**March, 2011, 11&lt;br /&gt;
*'''Course Main Content and Registration'''&lt;br /&gt;
**[[Ireland/Training/OWASP projects and resources you can use TODAY|Click here]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Dublin2010.gif]]&lt;br /&gt;
&lt;br /&gt;
Click [[OWASP IRELAND 2010]] for more information &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland 2010 Agenda  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== AUG 2010  ====&lt;br /&gt;
== OWASP August Event ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 11/8/2010 6:00pm - 8:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' OWASP ESAPI Swingset: Introduction &amp;amp; Demo by Cathal Courtney&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The ESAPI Swingset is a web application which demonstrates common security vulnerabilities and asks users to secure the application against these vulnerabilities using the ESAPI library. The application is intended for Java Developers. The goal of the application is to teach developers about the functionality of the ESAPI library and give users a practical understanding of how it can be used to protect web applications against common security vulnerabilities. During the talk, Cathal will demonstrate how to install and use ESAPI Swingset in your organization. A copy of the latest version will be also provided to the attendees.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Cathal is an experienced developer working at AIB and is currently the ESAPI Swingset project leader. More information about this project could be found here: [http://www.owasp.org/index.php/ESAPI_Swingset Esapi SwingSet]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' Not available&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' Security Implications for Web Applications based on SOA by John Marmelstein&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Abstract:''' The main point of SOA (in this context) is combining systems and applications to make new applications, or a big 'overall' application.This higher inter-operability does (by default) lower security. For a start, a request originating from a web user might end up at several back end systems, which do not know who or what the request came from.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Each back end system might have no access to the customer data, have a different security models, and serve serveral front end. Each of the above systems could be under different ownership, thus the owners have different concerns and priorities. Also, the basic solution at a technical level include single sign on, or security as a service. This can be costly, give limited coverage and have a performance hit. But is pretty much the only way to do it. The other thing to do (probably in tandem) is strict management, and delegation of authority.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John has about 13 years in IT. Most of this in distributed systems and 'Middleware' integration software. Including BEA (now owned by Oracle). Mainly working on Enterprise Java and more recently on Microsoft BizTalk. Various industries, incuding financials, public services, and a fish farm.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Download Presentation:''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== SEP 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND 2010  ==&lt;br /&gt;
&lt;br /&gt;
Due to popular demand we are hosting the 2nd OWASP IRELAND event, '''OWASP Ireland 2010'''. &amp;lt;br&amp;gt;Continuing last years highly successful conference, with more than 150 attendees from across the globe OWASP is happy to repeat this positive experience. &amp;lt;br&amp;gt;Delegates from numerous industry verticals attended the 2009 event; from government to finance to telecoms. Share your thoughts at this open event with some of the most experienced individuals in the information security industry. &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_IRELAND_2010 [[Image:Dublin2010.gif]]]&amp;lt;br&amp;gt;[[OWASP_IRELAND_2010]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' '''September 17th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Trinity College Dublin, The Hamilton Building &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [[Eoin Keary|Eoin Keary]]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Subscribe to the OWASP Ireland [https://lists.owasp.org/mailman/listinfo/owasp-ireland mail list] for the up-to-date information.''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OCT 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== NOV 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== DEC 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== 2010 Chapter Plan  ====&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Educational Outreach&amp;lt;br&amp;gt;Summary: Drive education awareness of OWASP among Irish Universities and Third Level Institutions. &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Fabio Cerullo &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Industry Outreach&amp;lt;br&amp;gt;Summary: Raise awareness of OWASP among Irish industry.&amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert plan&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Participants: Eoin Keary&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Membership Drive &amp;lt;br&amp;gt;Summary: Increase local chapter members individuals and corporate supporters &amp;lt;br&amp;gt;Plan: &amp;amp;lt;insert&amp;amp;gt; &amp;lt;br&amp;gt;Next Milestone: Update the plan&amp;lt;br&amp;gt;Project Participants: Rahim Jina&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Special Project:'''Hands-On Training&amp;lt;br&amp;gt;Summary: Provide 1-day, 3-day and 5-day hands-on classroom / online training classes&amp;lt;br&amp;gt;Next Milestone: Organize Training Offerings&amp;lt;br&amp;gt;Project Participants: Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Call For Presentations for 2010 is now open - please contact fcerullo(@)owasp.org / +353877817468 if you would like to speak or can host a meeting. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;*Note meeting hosts are provided with annual chapter sponsorship and free seats in training classes. The OWASP Foundation, Ireland chapter focuses on implementation of efforts defined by the [http://www.owasp.org/index.php/Global_Committee_Pages Global Committee] as well as new concepts and ideas defined locally. Below are a list of ACTIVE projects assigned to individual active members and teams within the local chapter. If you would like to help out on ANY of these efforts, contact them directly to get involved &lt;br /&gt;
&lt;br /&gt;
==== FEB 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Ireland Event - What is the O2 Platform?  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 19/2/2010 3:00pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP O2 Platform - Open Platform for automating application security knowledge and workflows &amp;lt;br&amp;gt;'''Abstract:''' In this talk Dinis Cruz will show the OWASP O2 Platform which is an open source toolkit specifically designed for developers and security consultants to be able to perform quick, effective and thorough 'source-code-driven' application security reviews. The OWASP O2 Platform (http://www.owasp.org/index.php/OWASP_O2_Platform) consumes results from the scanning engines from Ounce Labs, Microsoft's CAT.NET tool, FindBugs, CodeCrawler and AppScan DE, and also provides limited support for Fortify and OWASP WebScarab dumps. In the past, there has been a very healthy skepticism on the usability of Source Code analysis engines to find commonly found vulnerablities in real world applications. This presentation will show that with some creative and powerful tools, it IS possible to use O2 to discover those issues. This presentation will also show O2's advanced support for Struts and Spring MVC. &lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development. For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences. At OWASP, Dinis is the leader of the [[OWASP O2 Platform]] project, member of the OWASP [[Global Projects Committee]], chair of the [[OWASP Connections Committee]] and member of the [[About The Open Web Application Security Project#Global_Board_Members|OWASP Board]]. &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' http://www.o2-ounceopen.com/files-binaries-source-and-demo/old-documents-and-presentations/OWASP_O2_Platform_-_AppSec_Ireland_Sep_2009.pdf &lt;br /&gt;
&lt;br /&gt;
== IISF/OWASP – February Chapter Meeting  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 25/2/2010 2:00pm - 4:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Georgian Suite, Buswells Hotel, Molesworth St., Dublin 2 &lt;br /&gt;
&lt;br /&gt;
'''Title:''' An overview of Web Application Security threats and technologies. Practical advice and techniques for improving Application Security, presented by OWASP. &lt;br /&gt;
&lt;br /&gt;
2:00 - Introduction by IISF Chairman &lt;br /&gt;
&lt;br /&gt;
2:05 - Presentation&amp;amp;nbsp;: “Practical advice for improving Application Security” - Introduction to OWASP and OWASP Top Ten - Demonstration video of typical web based attacks with high level explanation - Live SQL injection demo using WebGoat &amp;amp;amp; WebScarab - Live Cross Site Scripting demo using WebGoat &amp;amp;amp; WebScarab &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part1.ppt]] &lt;br /&gt;
&lt;br /&gt;
3:00 - Coffee &lt;br /&gt;
&lt;br /&gt;
3:20 – Presentation continues - Application Security: &amp;quot;The problems we are faced with&amp;quot; - The Application Security Verification Standard - SDLC &amp;amp;amp; Security Assurance Maturity Model - Code Review versus traditional Runtime Testing. - Q&amp;amp;amp;A &lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:IISF 250210 part2.pptx]] &lt;br /&gt;
&lt;br /&gt;
4:00 - Close of Meeting &lt;br /&gt;
&lt;br /&gt;
4:05 - Traditional networking in Buswells Bar &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP - 26/3/2010  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== APR 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Live CD - An open environment for Web Application Security  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 16/4/2010 2:30pm - 5:00pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' OWASP Live CD - An open environment for Web Application Security &amp;lt;br&amp;gt;'''Abstract:''' This CD collects some of the best open source security projects in a single environment. Web developers, testers and security professionals can boot from this Live CD and have access to a full security testing suite. This presentation aims to provide a showcase for the great OWASP tools and documentation materials available in the CD, tips and tricks, and also some introductory stuff regarding code review and penetration testing. &amp;lt;br&amp;gt;Training is aimed at introductory /intermediate level in terms of pen testing, code review and tools. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Rahim Jina''' &amp;lt;br&amp;gt;Rahim Jina currently works as a senior consultant for Ernst &amp;amp;amp; Young's Risk Advisory Services in Dublin. He has worked there for nearly four years primarily delivering penetration testing services to clients globally, focusing on web applications and secure code review. He has been involved with OWASP for the past two years, being involved in the Summer of Code 2008 as lead reviewer for the Code Review Guide 2009. He has also made contributions to the SAMM project (OpenSAMM). He holds an MSC in Security and Forensic Computing from DCU and a degree in computer science from Trinity college. &amp;lt;br&amp;gt;'''Eoin Keary''' &amp;lt;br&amp;gt;Eoin is a long time member of OWASP and have contributed year on year to OWASP projects and the OWASP mission of fighting the causes of software insecurity. He is based in Dublin, Ireland and run the Ernst &amp;amp;amp; Young application security team across Europe. His OWASP contributions to date include the OWASP Code Review Guide, OWASP Testing Guide, OWASP SAMM, and OWASP ASVS. He is a member of the OWASP Global Industry Committee, chair of the OWASP Conferences Committee and member of the OWASP Global Board. Eoin founded the OWASP Ireland chapter back in 2004 and currently serves as Vice President of the OWASP Ireland Board. &lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/d/db/P1040923_1024.JPG [[Image:|P1040923_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/d/db/P1040923_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/f/f3/P1040927_1024.JPG [[Image:|P1040927_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/f/f3/P1040927_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[http://www.owasp.org/images/6/64/P1040929_1024.JPG [[Image:|P1040929_small.jpg]]]&amp;lt;br&amp;gt;[http://www.owasp.org/images/6/64/P1040929_1024.JPG zoom]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
'''Download Presentation:''' [http://www.owasp.org/images/e/ee/OWASP_Live_CD.pptx [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After OWASP Live CD training &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MAY 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Trials &amp;amp;amp; Tribulations of WAF Implementation  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Trials &amp;amp;amp; Tribulations of WAF Implementation&amp;lt;br&amp;gt;'''Abstract:''' A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as Cross-site Scripting (XSS) and SQL Injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.&amp;lt;br&amp;gt;Mark will be presenting on his experience in implementing a Web Application Firewall solution through all phases from research to implementation. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Mark Hillick - Application Networking Team, Citrix Systems''' &amp;lt;br&amp;gt;Mark Hillick has 10 years experience in relation to Internet, networking, systems administration and security engineering. &lt;br /&gt;
&lt;br /&gt;
Mark graduated from Queen's University, where he studied Mathematics. &lt;br /&gt;
&lt;br /&gt;
Mark joined AIB from Queen's where he joined the Internet Infrastructure team, where he was responsible for designing, building and securing the Internet service in and out of AIB. He is a prominent member of the IT Security community in Ireland and has presented at several local security forums such as IISF and Owasp. Mark is one of the founding members of IRISS CERT, where he is also a Volunteer Incident Handler. He helped organise IRISSCon 2009, where he also designed and built HackEire 2009, the first Ethical Hacking 'Capture The Flag' contest in Ireland.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[Image:20052010017.jpg|thumb|A caption from Mark's talk]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [http://docs.google.com/fileview?id=0B3vrVYEosFeEZDMyZjIzYTktMzNkZC00ZjBlLWFiYTgtNThjZGE4YTE1NmFj [[Image:|Download.png]]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After WAF presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUN 2010  ====&lt;br /&gt;
&lt;br /&gt;
== OWASP Event: Define Security Requirements - A practical approach  ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' 20/5/2010 6:30pm - 7:30pm &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Ernst &amp;amp;amp; Young, Harcourt Street, Dublin 2, Opposite the Odeon Pub, Dublin, Ireland &lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' [[Image:Ey logo.gif]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Define Security Requirements - A practical approach&amp;lt;br&amp;gt;'''Abstract:''' The Data Protection Act states that &amp;quot;appropriate security measures&amp;quot; must be taken to protect personal data. How do you specify the appropriate security measures for a website which processes personal data? It is an important step in a development project, but is often neglected. In this talk, Alexis will descibe his own experiences of assessing web application, and will also look in more detail at what the Data Protection Commissioner says. He will then take a fictional website and look at a practical approach to specifying the security requirements that the fictional application should meet. This will use the kind of risk-based techniques outlined by OWASP or the Microsoft Secure Development Lifecycle (SDL). Issues discussed will include encryption, authentication, access control, audit, etc. The result will be a list of security requirements that can be carried into the design and development phases. Attendees should be able to apply the ideas to their own development projects. &lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' &lt;br /&gt;
&lt;br /&gt;
'''Alexis Fitzgerald - Rits Information Security Group''' &amp;lt;br&amp;gt;For the last six years Alexis has worked for Rits Information Security Group, where he performs application penetration testing assignments as well as advising clients on application security issues. Before that, he spent many years as a developer (mainly in the financial sector), and he continues to be involved in development. Alexis holds an MSc in Information Security from the University of London, Royal Holloway.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Pictures from the event:''' &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Download Presentation:''' [[Image:OWASP Ireland June10.pdf]] &lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' After Alexis presentation &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Odeon Pub &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== JUL 2010  ====&lt;br /&gt;
&lt;br /&gt;
== APPSEC IRELAND INFORMAL MEET-UP  ==&lt;br /&gt;
&lt;br /&gt;
This is a informal gathering to meet others in information security and have a pint&amp;amp;nbsp;;) all are welcome &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:''' In case you want to sponsor this event, please contact [mailto:fcerullo(at)owasp.org Fabio Cerullo]. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Ireland]]&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=154419</id>
		<title>EUTour2013 Dublin Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=154419"/>
				<updated>2013-06-25T18:13:41Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training. [https://www.owasp.org/index.php/EUTour2013#Training Info about the training session])'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference)''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP MEMBERSHIP'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | During the OWASP Europe Tour you could become a member and support our mission.&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.cvent.com/Events/ContactPortal/Login.aspx?cwstub=15bbcfd1-f49b-4636-ba4e-c9ce70a265e5 Become an OWASP member by clicking here] &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''Training (Wednesday 25th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Tuesday 25th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; colspan=&amp;quot;2&amp;quot;| '''DEFENSIVE PROGRAMMING – JAVASCRIPT AND HTML5'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTML5 is the fifth revision of the HTML standard. HTML5, and its integration with JavaScript, introduces new &lt;br /&gt;
security risks that we need to carefully consider when writing web front-end code. Modern web-based software, including &lt;br /&gt;
mobile web front-end applications, makes heavy use of innovative JavaScript and HTML5 browser support to deliver &lt;br /&gt;
advanced user experiences. Front-end developers focus their efforts on creating this experience and are generally not aware &lt;br /&gt;
of the security implications of the technologies they use. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Defensive Programming – JavaScript/HTML5 course helps web front-end developers understand the risks involved with &lt;br /&gt;
manipulating the HTML Document Object Model (DOM) and using the advanced features of JavaScript and HTML 5 such as &lt;br /&gt;
cross-domain requests and local storage. The course reinforces some important security aspects of modern browser &lt;br /&gt;
architecture and presents the student with defensive programming techniques that can be immediately applied to prevent common vulnerabilities from being introduced. Additionally, the course provides a detailed description of typical JavaScript sources and sinks and explains how they can be used to detect problems in code.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''For more information about the training please see''' [https://www.owasp.org/index.php/EUTour2013#Training Further training information]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price:''' 350€ Non members / 300€ OWASP members.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duration:''' 8 hours (09:00h - 18:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour training''': [http://regonline.com/owaspeutourdublindefensiveprogramming Register Here]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''CONFERENCE (Wednesday 26th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Wednesday 26th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | This event is '''FREE''' &amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour''': [http://www.regonline.com/owaspeutourdublin Register Here]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Conference Details - Times are subject to change '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 09:30 &amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Registration&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:00 &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:15 &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Interactive Workshop - Ultimate Fighting Championship: Bugs vs Flaws&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Paco Hope&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | Abstract&lt;br /&gt;
&lt;br /&gt;
We see a lot of defects in software and they fall broadly into two categories: bugs or flaws. How well we understand the defects and our correct categorisation influences how successful we will be fixing them. If we mistake a flaw for a bug and offer a point solution, we'll be back in the same situation as before, only with more broken code. If we mistake a bug for a flaw, we condemn ourselves to reengineering hunks of our system when a localised patch would do. Spend time with Paco Hope analysing defects from real systems. Create rules that distinguish bugs from flaws and cast your vote. Argue about what to do with them. Climb into the ring with that defect and pin it to the mat!&lt;br /&gt;
&lt;br /&gt;
Learning Objectives&lt;br /&gt;
&lt;br /&gt;
* Identify a small set of rules that will help distinguish flaws from bugs&lt;br /&gt;
* Classify defects clearly into one class or the other&lt;br /&gt;
* Articulate why something belongs in one class or another&lt;br /&gt;
* Articulate the difference between flaws and bugs&lt;br /&gt;
&lt;br /&gt;
Pre-Requisites&lt;br /&gt;
&lt;br /&gt;
All security and software developers should be prepared for this. Prior experience in mixed martial arts is not necessary. :)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:15 &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Coffee Break&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Using the browser as a platform for security tools &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Mark Goodwin&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lunch&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lesson learned from the trenches of targeted attack &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Robert McArdle&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | Targeted attacks are now a major worry for organisations. In this talk we will describe real life case studies of some of the largest and more sophisticated targeted attacks, including how we infiltrated and mapped criminal networks, and live demos of some such mapping in action.&lt;br /&gt;
&lt;br /&gt;
In this talk we will discuss some of the major ongoing and previous targeted attack campaigns that have been uncovered by Trend Micro in the last year or so, such as Luckycat, Tinba and others. We will discuss in-depth the modus operandi of the criminals in these so called APT attacks, show how we mapped and infiltrated their infrastructure, and demo some of the tools and techniques that we use when carrying out these type of investigations. All of this presentation will focus on real technical details from real cases studies, and this presentation will also include live demos.&lt;br /&gt;
&lt;br /&gt;
KEY QUESTIONS&lt;br /&gt;
1) What is the reality (not the hype) of a modern targeted attack&amp;lt;br&amp;gt;&lt;br /&gt;
2) You will understand the Modus Operandi of a two main types of Cybercriminals&amp;lt;br&amp;gt;&lt;br /&gt;
3) You will understand how investigators and security companies investigate these high profile attacks&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:30 &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Coffee Break&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:45 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Building Security In Maturity Model (BSIMM)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Paco Hope&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | How do you know what security activities belong in your software lifecycle? How do you measure what you're doing? Begun in 2009, the BSIMM, is an observation-based scientific model directly describing the collective software security activities of more than sixty software security initiatives. Used as a measuring tool, BSIMM helps an organisation understand and plan their software security initiative. It covers the full framework of software development from requirements, architecture, code and test, to release management, governance, and training. This talk will introduce the measurements, explain what is measured, how it is measured, and how the measurement can be used to create or improve a software security initiative.&lt;br /&gt;
&lt;br /&gt;
Paco Hope is a Principal Consultant at Cigital, helping Fortune 500 companies secure their software for over 10 years in a variety of industries like online gaming, financial services, retail, and embedded systems. He is the author of two books on security, the most recent being the Web Security Testing Cookbook and a frequent conference speaker. As and a member of (ISC)²'s Application Security Advisory Board, he helps create and advise on the direction of the CSSLP certification. His passion is empowering everyone in the software lifecycle—developers, testers, analysts—to make meaningful contributions to the securing of software.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:45 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Needles in haystacks, why we are not solving the appsec problem &amp;amp; html hacking the&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Eoin Keary&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | We continue to rely on a “pentest” to secure our applications. Why do we think it is acceptable to perform a time-limited test of an application to help ensure security when a determined attacker may spend 10-100 times longer attempting to find a suitable vulnerability? &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Our testing methodologies are non-consistent and rely on the individual and the tools they use. Currently we treat vulnerabilities like XSS and SQLI as different issues but the root causes it the same. – it’s all code injection theory!!&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Why do we do this and make security bugs over complex?&amp;lt;br&amp;gt;&lt;br /&gt;
Why are we still happy with “Testing security out” rather than the more superior “building security in”? &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We shall also look at mark up attacks which break CSP controls.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:45 &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Close&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=154198</id>
		<title>EUTour2013 Dublin Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=154198"/>
				<updated>2013-06-20T20:14:20Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training. [https://www.owasp.org/index.php/EUTour2013#Training Info about the training session])'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference)''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP MEMBERSHIP'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | During the OWASP Europe Tour you could become a member and support our mission.&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.cvent.com/Events/ContactPortal/Login.aspx?cwstub=15bbcfd1-f49b-4636-ba4e-c9ce70a265e5 Become an OWASP member by clicking here] &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''Training (Wednesday 25th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Tuesday 25th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; colspan=&amp;quot;2&amp;quot;| '''DEFENSIVE PROGRAMMING – JAVASCRIPT AND HTML5'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTML5 is the fifth revision of the HTML standard. HTML5, and its integration with JavaScript, introduces new &lt;br /&gt;
security risks that we need to carefully consider when writing web front-end code. Modern web-based software, including &lt;br /&gt;
mobile web front-end applications, makes heavy use of innovative JavaScript and HTML5 browser support to deliver &lt;br /&gt;
advanced user experiences. Front-end developers focus their efforts on creating this experience and are generally not aware &lt;br /&gt;
of the security implications of the technologies they use. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Defensive Programming – JavaScript/HTML5 course helps web front-end developers understand the risks involved with &lt;br /&gt;
manipulating the HTML Document Object Model (DOM) and using the advanced features of JavaScript and HTML 5 such as &lt;br /&gt;
cross-domain requests and local storage. The course reinforces some important security aspects of modern browser &lt;br /&gt;
architecture and presents the student with defensive programming techniques that can be immediately applied to prevent common vulnerabilities from being introduced. Additionally, the course provides a detailed description of typical JavaScript sources and sinks and explains how they can be used to detect problems in code.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''For more information about the training please see''' [https://www.owasp.org/index.php/EUTour2013#Training Further training information]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price:''' 350€ Non members / 300€ OWASP members.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duration:''' 8 hours (09:00h - 18:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour training''': [http://regonline.com/owaspeutourdublindefensiveprogramming Register Here]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''CONFERENCE (Wednesday 26th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Wednesday 26th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | This event is '''FREE''' &amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour''': [http://www.regonline.com/owaspeutourdublin Register Here]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Conference Details - Times are subject to change '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 09:30 &amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Registration&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:00 &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:15 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Needles in haystacks, why we are not solving the appsec problem &amp;amp; html hacking the&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Eoin Keary&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | We continue to rely on a “pentest” to secure our applications. Why do we think it is acceptable to perform a time-limited test of an application to help ensure security when a determined attacker may spend 10-100 times longer attempting to find a suitable vulnerability? &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Our testing methodologies are non-consistent and rely on the individual and the tools they use. Currently we treat vulnerabilities like XSS and SQLI as different issues but the root causes it the same. – it’s all code injection theory!!&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Why do we do this and make security bugs over complex?&amp;lt;br&amp;gt;&lt;br /&gt;
Why are we still happy with “Testing security out” rather than the more superior “building security in”? &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We shall also look at mark up attacks which break CSP controls.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:15 &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Coffee Break&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:30 &amp;lt;br&amp;gt;(60 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Realex Payments Application Security story&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | David Rook&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; |  As the old British Telecom adverts used to say it's good to talk so I thought now was a good time to talk about how we do application security at Realex Payments. Rather than just talk about where we are today this talk will focus on the lessons learned over the past five years and what I'd do differently if I could it all again. I will tell the story of how application security has worked and evolved in a fast growing technology company from the day we created our first application security role in the business to our current application security approach.&lt;br /&gt;
&lt;br /&gt;
The story will include how we scaled application security to keep up with the changes in a fast growing business, how playing card games with developers was one of the best things we've ever done and how following the KISS principle in the early days of an application security program is vital. You will see how we have progressed from having no dedicated application security resources to our current staffing levels and how our goals have evolved from simply security reviewing our applications to more grand goals such as wanting to provide free application security training for anyone in Ireland.&lt;br /&gt;
&lt;br /&gt;
This isn't an application security talk focusing on the theory and approaches that seem good on paper. You will have the opportunity to learn the lessons from five years of real world application security from the person who was at the centre of application security in Realex Payments.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lunch&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lesson learned from the trenches of targeted attack &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Robert McArdle&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | Targeted attacks are now a major worry for organisations. In this talk we will describe real life case studies of some of the largest and more sophisticated targeted attacks, including how we infiltrated and mapped criminal networks, and live demos of some such mapping in action.&lt;br /&gt;
&lt;br /&gt;
In this talk we will discuss some of the major ongoing and previous targeted attack campaigns that have been uncovered by Trend Micro in the last year or so, such as Luckycat, Tinba and others. We will discuss in-depth the modus operandi of the criminals in these so called APT attacks, show how we mapped and infiltrated their infrastructure, and demo some of the tools and techniques that we use when carrying out these type of investigations. All of this presentation will focus on real technical details from real cases studies, and this presentation will also include live demos.&lt;br /&gt;
&lt;br /&gt;
KEY QUESTIONS&lt;br /&gt;
1) What is the reality (not the hype) of a modern targeted attack&amp;lt;br&amp;gt;&lt;br /&gt;
2) You will understand the Modus Operandi of a two main types of Cybercriminals&amp;lt;br&amp;gt;&lt;br /&gt;
3) You will understand how investigators and security companies investigate these high profile attacks&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:30 &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Coffee Break&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:45 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Using the browser as a platform for security tools &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Mark Goodwin&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:45 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Building Security In Maturity Model (BSIMM)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Paco Hope&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | How do you know what security activities belong in your software lifecycle? How do you measure what you're doing? Begun in 2009, the BSIMM, is an observation-based scientific model directly describing the collective software security activities of more than sixty software security initiatives. Used as a measuring tool, BSIMM helps an organisation understand and plan their software security initiative. It covers the full framework of software development from requirements, architecture, code and test, to release management, governance, and training. This talk will introduce the measurements, explain what is measured, how it is measured, and how the measurement can be used to create or improve a software security initiative.&lt;br /&gt;
&lt;br /&gt;
Paco Hope is a Principal Consultant at Cigital, helping Fortune 500 companies secure their software for over 10 years in a variety of industries like online gaming, financial services, retail, and embedded systems. He is the author of two books on security, the most recent being the Web Security Testing Cookbook and a frequent conference speaker. As and a member of (ISC)²'s Application Security Advisory Board, he helps create and advise on the direction of the CSSLP certification. His passion is empowering everyone in the software lifecycle—developers, testers, analysts—to make meaningful contributions to the securing of software.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:45 &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Close&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=154197</id>
		<title>EUTour2013 Dublin Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=154197"/>
				<updated>2013-06-20T20:13:17Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training. [https://www.owasp.org/index.php/EUTour2013#Training Info about the training session])'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference)''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP MEMBERSHIP'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | During the OWASP Europe Tour you could become a member and support our mission.&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.cvent.com/Events/ContactPortal/Login.aspx?cwstub=15bbcfd1-f49b-4636-ba4e-c9ce70a265e5 Become an OWASP member by clicking here] &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''Training (Wednesday 25th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Tuesday 25th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; colspan=&amp;quot;2&amp;quot;| '''DEFENSIVE PROGRAMMING – JAVASCRIPT AND HTML5'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTML5 is the fifth revision of the HTML standard. HTML5, and its integration with JavaScript, introduces new &lt;br /&gt;
security risks that we need to carefully consider when writing web front-end code. Modern web-based software, including &lt;br /&gt;
mobile web front-end applications, makes heavy use of innovative JavaScript and HTML5 browser support to deliver &lt;br /&gt;
advanced user experiences. Front-end developers focus their efforts on creating this experience and are generally not aware &lt;br /&gt;
of the security implications of the technologies they use. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Defensive Programming – JavaScript/HTML5 course helps web front-end developers understand the risks involved with &lt;br /&gt;
manipulating the HTML Document Object Model (DOM) and using the advanced features of JavaScript and HTML 5 such as &lt;br /&gt;
cross-domain requests and local storage. The course reinforces some important security aspects of modern browser &lt;br /&gt;
architecture and presents the student with defensive programming techniques that can be immediately applied to prevent common vulnerabilities from being introduced. Additionally, the course provides a detailed description of typical JavaScript sources and sinks and explains how they can be used to detect problems in code.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''For more information about the training please see''' [https://www.owasp.org/index.php/EUTour2013#Training Further training information]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price:''' 350€ Non members / 300€ OWASP members.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duration:''' 8 hours (09:00h - 18:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour training''': [http://regonline.com/owaspeutourdublindefensiveprogramming Register Here]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''CONFERENCE (Wednesday 26th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Wednesday 26th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | This event is '''FREE''' &amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour''': [http://www.regonline.com/owaspeutourdublin Register Here]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Conference Details - Times are subject to change '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 09:30 &amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Registration&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:00 &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Introduction&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:15 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Needles in haystacks, why we are not solving the appsec problem &amp;amp; html hacking the&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Eoin Keary&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | We continue to rely on a “pentest” to secure our applications. Why do we think it is acceptable to perform a time-limited test of an application to help ensure security when a determined attacker may spend 10-100 times longer attempting to find a suitable vulnerability? &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Our testing methodologies are non-consistent and rely on the individual and the tools they use. Currently we treat vulnerabilities like XSS and SQLI as different issues but the root causes it the same. – it’s all code injection theory!!&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Why do we do this and make security bugs over complex?&amp;lt;br&amp;gt;&lt;br /&gt;
Why are we still happy with “Testing security out” rather than the more superior “building security in”? &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We shall also look at mark up attacks which break CSP controls.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:15 &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Coffee Break&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:30 &amp;lt;br&amp;gt;(60 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Realex Payments Application Security story&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | David Rook&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; |  As the old British Telecom adverts used to say it's good to talk so I thought now was a good time to talk about how we do application security at Realex Payments. Rather than just talk about where we are today this talk will focus on the lessons learned over the past five years and what I'd do differently if I could it all again. I will tell the story of how application security has worked and evolved in a fast growing technology company from the day we created our first application security role in the business to our current application security approach.&lt;br /&gt;
&lt;br /&gt;
The story will include how we scaled application security to keep up with the changes in a fast growing business, how playing card games with developers was one of the best things we've ever done and how following the KISS principle in the early days of an application security program is vital. You will see how we have progressed from having no dedicated application security resources to our current staffing levels and how our goals have evolved from simply security reviewing our applications to more grand goals such as wanting to provide free application security training for anyone in Ireland.&lt;br /&gt;
&lt;br /&gt;
This isn't an application security talk focusing on the theory and approaches that seem good on paper. You will have the opportunity to learn the lessons from five years of real world application security from the person who was at the centre of application security in Realex Payments.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lunch&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lesson learned from the trenches of targeted attack &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Robert McArdle&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | Targeted attacks are now a major worry for organisations. In this talk we will describe real life case studies of some of the largest and more sophisticated targeted attacks, including how we infiltrated and mapped criminal networks, and live demos of some such mapping in action.&lt;br /&gt;
&lt;br /&gt;
In this talk we will discuss some of the major ongoing and previous targeted attack campaigns that have been uncovered by Trend Micro in the last year or so, such as Luckycat, Tinba and others. We will discuss in-depth the modus operandi of the criminals in these so called APT attacks, show how we mapped and infiltrated their infrastructure, and demo some of the tools and techniques that we use when carrying out these type of investigations. All of this presentation will focus on real technical details from real cases studies, and this presentation will also include live demos.&lt;br /&gt;
&lt;br /&gt;
KEY QUESTIONS&lt;br /&gt;
1) What is the reality (not the hype) of a modern targeted attack&amp;lt;br&amp;gt;&lt;br /&gt;
2) You will understand the Modus Operandi of a two main types of Cybercriminals&amp;lt;br&amp;gt;&lt;br /&gt;
3) You will understand how investigators and security companies investigate these high profile attacks&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:30 &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Coffee Break&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:45 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Using the browser as a platform for security tools &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Mark Goodwin&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:45 &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Building Security In Maturity Model (BSIMM)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Paco Hope&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | How do you know what security activities belong in your software lifecycle? How do you measure what you're doing? Begun in 2009, the BSIMM, is an observation-based scientific model directly describing the collective software security activities of more than sixty software security initiatives. Used as a measuring tool, BSIMM helps an organisation understand and plan their software security initiative. It covers the full framework of software development from requirements, architecture, code and test, to release management, governance, and training. This talk will introduce the measurements, explain what is measured, how it is measured, and how the measurement can be used to create or improve a software security initiative.&lt;br /&gt;
&lt;br /&gt;
Paco Hope is a Principal Consultant at Cigital, helping Fortune 500 companies secure their software for over 10 years in a variety of industries like online gaming, financial services, retail, and embedded systems. He is the author of two books on security, the most recent being the Web Security Testing Cookbook and a frequent conference speaker. As and a member of (ISC)²'s Application Security Advisory Board, he helps create and advise on the direction of the CSSLP certification. His passion is empowering everyone in the software lifecycle—developers, testers, analysts—to make meaningful contributions to the securing of software.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 16:45 &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Close&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=152183</id>
		<title>EUTour2013 Dublin Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=152183"/>
				<updated>2013-05-23T22:58:37Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training)'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference)''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP MEMBERSHIP'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | During the OWASP Europe Tour you could become a member and support our mission.&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.cvent.com/Events/ContactPortal/Login.aspx?cwstub=15bbcfd1-f49b-4636-ba4e-c9ce70a265e5 Become an OWASP member by clicking here] &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''CONFERENCE (Wednesday 26th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Wednesday 26th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | This event is '''FREE''' &amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour''': [TBD REGISTER HERE!]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Conference Details - Times are subject to change '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 09:30 am&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Registration&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:00 am&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Realex Payments Application Security story&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | David Rook&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; |  As the old British Telecom adverts used to say it's good to talk so I thought now was a good time to talk about how we do application security at Realex Payments. Rather than just talk about where we are today this talk will focus on the lessons learned over the past five years and what I'd do differently if I could it all again. I will tell the story of how application security has worked and evolved in a fast growing technology company from the day we created our first application security role in the business to our current application security approach.&lt;br /&gt;
&lt;br /&gt;
The story will include how we scaled application security to keep up with the changes in a fast growing business, how playing card games with developers was one of the best things we've ever done and how following the KISS principle in the early days of an application security program is vital. You will see how we have progressed from having no dedicated application security resources to our current staffing levels and how our goals have evolved from simply security reviewing our applications to more grand goals such as wanting to provide free application security training for anyone in Ireland.&lt;br /&gt;
&lt;br /&gt;
This isn't an application security talk focusing on the theory and approaches that seem good on paper. You will have the opportunity to learn the lessons from five years of real world application security from the person who was at the centre of application security in Realex Payments.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Building Security In Maturity Model (BSIMM) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Paco Hope&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | How do you know what security activities belong in your software lifecycle? How do you measure what you're doing? Begun in 2009, the BSIMM, is an observation-based scientific model directly describing the collective software security activities of more than sixty software security initiatives. Used as a measuring tool, BSIMM helps an organisation understand and plan their software security initiative. It covers the full framework of software development from requirements, architecture, code and test, to release management, governance, and training. This talk will introduce the measurements, explain what is measured, how it is measured, and how the measurement can be used to create or improve a software security initiative.&lt;br /&gt;
&lt;br /&gt;
Paco Hope is a Principal Consultant at Cigital, helping Fortune 500 companies secure their software for over 10 years in a variety of industries like online gaming, financial services, retail, and embedded systems. He is the author of two books on security, the most recent being the Web Security Testing Cookbook and a frequent conference speaker. As and a member of (ISC)²'s Application Security Advisory Board, he helps create and advise on the direction of the CSSLP certification. His passion is empowering everyone in the software lifecycle—developers, testers, analysts—to make meaningful contributions to the securing of software.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:30AM &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Coffee Break&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Using the browser as a platform for security tools &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Mark Goodwin&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30AM &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lunch&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lesson learned from the trenches of targeted attack&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Robert McArdle&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | Targeted attacks are now a major worry for organisations. In this talk we will describe real life case studies of some of the largest and more sophisticated targeted attacks, including how we infiltrated and mapped criminal networks, and live demos of some such mapping in action.&lt;br /&gt;
&lt;br /&gt;
In this talk we will discuss some of the major ongoing and previous targeted attack campaigns that have been uncovered by Trend Micro in the last year or so, such as Luckycat, Tinba and others. We will discuss in-depth the modus operandi of the criminals in these so called APT attacks, show how we mapped and infiltrated their infrastructure, and demo some of the tools and techniques that we use when carrying out these type of investigations. All of this presentation will focus on real technical details from real cases studies, and this presentation will also include live demos.&lt;br /&gt;
&lt;br /&gt;
KEY QUESTIONS&lt;br /&gt;
1) What is the reality (not the hype) of a modern targeted attack&amp;lt;br&amp;gt;&lt;br /&gt;
2) You will understand the Modus Operandi of a two main types of Cybercriminals&amp;lt;br&amp;gt;&lt;br /&gt;
3) You will understand how investigators and security companies investigate these high profile attacks&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:15AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Eoin Keary&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:00AM &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Coffee Break&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=152182</id>
		<title>EUTour2013 Dublin Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=152182"/>
				<updated>2013-05-23T22:55:28Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training)'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference)''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP MEMBERSHIP'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | During the OWASP Europe Tour you could become a member and support our mission.&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.cvent.com/Events/ContactPortal/Login.aspx?cwstub=15bbcfd1-f49b-4636-ba4e-c9ce70a265e5 Become an OWASP member by clicking here] &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''CONFERENCE (Wednesday 26th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Wednesday 26th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | This event is '''FREE''' &amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour''': [TBD REGISTER HERE!]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Conference Details - Times are subject to change '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 09:30 am&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Registration&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:00 am&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Realex Payments Application Security story&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | David Rook&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; |  As the old British Telecom adverts used to say it's good to talk so I thought now was a good time to talk about how we do application security at Realex Payments. Rather than just talk about where we are today this talk will focus on the lessons learned over the past five years and what I'd do differently if I could it all again. I will tell the story of how application security has worked and evolved in a fast growing technology company from the day we created our first application security role in the business to our current application security approach.&lt;br /&gt;
&lt;br /&gt;
The story will include how we scaled application security to keep up with the changes in a fast growing business, how playing card games with developers was one of the best things we've ever done and how following the KISS principle in the early days of an application security program is vital. You will see how we have progressed from having no dedicated application security resources to our current staffing levels and how our goals have evolved from simply security reviewing our applications to more grand goals such as wanting to provide free application security training for anyone in Ireland.&lt;br /&gt;
&lt;br /&gt;
This isn't an application security talk focusing on the theory and approaches that seem good on paper. You will have the opportunity to learn the lessons from five years of real world application security from the person who was at the centre of application security in Realex Payments.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Building Security In Maturity Model (BSIMM) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Paco Hope&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | How do you know what security activities belong in your software lifecycle? How do you measure what you're doing? Begun in 2009, the BSIMM, is an observation-based scientific model directly describing the collective software security activities of more than sixty software security initiatives. Used as a measuring tool, BSIMM helps an organisation understand and plan their software security initiative. It covers the full framework of software development from requirements, architecture, code and test, to release management, governance, and training. This talk will introduce the measurements, explain what is measured, how it is measured, and how the measurement can be used to create or improve a software security initiative.&lt;br /&gt;
&lt;br /&gt;
Paco Hope is a Principal Consultant at Cigital, helping Fortune 500 companies secure their software for over 10 years in a variety of industries like online gaming, financial services, retail, and embedded systems. He is the author of two books on security, the most recent being the Web Security Testing Cookbook and a frequent conference speaker. As and a member of (ISC)²'s Application Security Advisory Board, he helps create and advise on the direction of the CSSLP certification. His passion is empowering everyone in the software lifecycle—developers, testers, analysts—to make meaningful contributions to the securing of software.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:30AM &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Coffee Break&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Mark Goodwin&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30AM &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lunch&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lesson learned from the trenches of targeted attack&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Robert McArdle&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | Targeted attacks are now a major worry for organisations. In this talk we will describe real life case studies of some of the largest and more sophisticated targeted attacks, including how we infiltrated and mapped criminal networks, and live demos of some such mapping in action.&lt;br /&gt;
&lt;br /&gt;
In this talk we will discuss some of the major ongoing and previous targeted attack campaigns that have been uncovered by Trend Micro in the last year or so, such as Luckycat, Tinba and others. We will discuss in-depth the modus operandi of the criminals in these so called APT attacks, show how we mapped and infiltrated their infrastructure, and demo some of the tools and techniques that we use when carrying out these type of investigations. All of this presentation will focus on real technical details from real cases studies, and this presentation will also include live demos.&lt;br /&gt;
&lt;br /&gt;
KEY QUESTIONS&lt;br /&gt;
1) What is the reality (not the hype) of a modern targeted attack&amp;lt;br&amp;gt;&lt;br /&gt;
2) You will understand the Modus Operandi of a two main types of Cybercriminals&amp;lt;br&amp;gt;&lt;br /&gt;
3) You will understand how investigators and security companies investigate these high profile attacks&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 14:15AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Eoin Keary&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 15:00AM &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Coffee Break&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Robert McArdle&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | Targeted attacks are now a major worry for organisations. In this talk we will describe&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=151981</id>
		<title>EUTour2013 Dublin Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=151981"/>
				<updated>2013-05-21T19:04:36Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training)'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference)''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP MEMBERSHIP'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | During the OWASP Europe Tour you could become a member and support our mission.&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.cvent.com/Events/ContactPortal/Login.aspx?cwstub=15bbcfd1-f49b-4636-ba4e-c9ce70a265e5 Become an OWASP member by clicking here] &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''CONFERENCE (Wednesday 26th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Wednesday 26th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | This event is '''FREE''' &amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour''': [TBD REGISTER HERE!]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Conference Details - Times are subject to change '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 09:30 am&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Registration&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:00 am&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Realex Payments Application Security story&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | David Rook&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; |  As the old British Telecom adverts used to say it's good to talk so I thought now was a good time to talk about how we do application security at Realex Payments. Rather than just talk about where we are today this talk will focus on the lessons learned over the past five years and what I'd do differently if I could it all again. I will tell the story of how application security has worked and evolved in a fast growing technology company from the day we created our first application security role in the business to our current application security approach.&lt;br /&gt;
&lt;br /&gt;
The story will include how we scaled application security to keep up with the changes in a fast growing business, how playing card games with developers was one of the best things we've ever done and how following the KISS principle in the early days of an application security program is vital. You will see how we have progressed from having no dedicated application security resources to our current staffing levels and how our goals have evolved from simply security reviewing our applications to more grand goals such as wanting to provide free application security training for anyone in Ireland.&lt;br /&gt;
&lt;br /&gt;
This isn't an application security talk focusing on the theory and approaches that seem good on paper. You will have the opportunity to learn the lessons from five years of real world application security from the person who was at the centre of application security in Realex Payments.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Building Security In Maturity Model (BSIMM) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Paco Hope&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | How do you know what security activities belong in your software lifecycle? How do you measure what you're doing? Begun in 2009, the BSIMM, is an observation-based scientific model directly describing the collective software security activities of more than sixty software security initiatives. Used as a measuring tool, BSIMM helps an organisation understand and plan their software security initiative. It covers the full framework of software development from requirements, architecture, code and test, to release management, governance, and training. This talk will introduce the measurements, explain what is measured, how it is measured, and how the measurement can be used to create or improve a software security initiative.&lt;br /&gt;
&lt;br /&gt;
Paco Hope is a Principal Consultant at Cigital, helping Fortune 500 companies secure their software for over 10 years in a variety of industries like online gaming, financial services, retail, and embedded systems. He is the author of two books on security, the most recent being the Web Security Testing Cookbook and a frequent conference speaker. As and a member of (ISC)²'s Application Security Advisory Board, he helps create and advise on the direction of the CSSLP certification. His passion is empowering everyone in the software lifecycle—developers, testers, analysts—to make meaningful contributions to the securing of software.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:30AM &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Coffee Break&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Mark Goodwin&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30AM &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lunch&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lesson learned from the trenches of targeted attack&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Robert McArdle&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; | Targeted attacks are now a major worry for organisations. In this talk we will describe real life case studies of some of the largest and more sophisticated targeted attacks, including how we infiltrated and mapped criminal networks, and live demos of some such mapping in action.&lt;br /&gt;
&lt;br /&gt;
In this talk we will discuss some of the major ongoing and previous targeted attack campaigns that have been uncovered by Trend Micro in the last year or so, such as Luckycat, Tinba and others. We will discuss in-depth the modus operandi of the criminals in these so called APT attacks, show how we mapped and infiltrated their infrastructure, and demo some of the tools and techniques that we use when carrying out these type of investigations. All of this presentation will focus on real technical details from real cases studies, and this presentation will also include live demos.&lt;br /&gt;
&lt;br /&gt;
KEY QUESTIONS&lt;br /&gt;
1) What is the reality (not the hype) of a modern targeted attack&amp;lt;br&amp;gt;&lt;br /&gt;
2) You will understand the Modus Operandi of a two main types of Cybercriminals&amp;lt;br&amp;gt;&lt;br /&gt;
3) You will understand how investigators and security companies investigate these high profile attacks&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=151978</id>
		<title>EUTour2013 Dublin Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=151978"/>
				<updated>2013-05-21T18:40:55Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training)'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference)''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP MEMBERSHIP'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | During the OWASP Europe Tour you could become a member and support our mission.&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.cvent.com/Events/ContactPortal/Login.aspx?cwstub=15bbcfd1-f49b-4636-ba4e-c9ce70a265e5 Become an OWASP member by clicking here] &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''CONFERENCE (Wednesday 26th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Wednesday 26th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | This event is '''FREE''' &amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour''': [TBD REGISTER HERE!]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Conference Details - Times are subject to change '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 09:30 am&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Registration&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:00 am&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Realex Payments Application Security story&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | David Rook&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  As the old British Telecom adverts used to say it's good to talk so I thought now was a good time to talk about how we do application security at Realex Payments. Rather than just talk about where we are today this talk will focus on the lessons learned over the past five years and what I'd do differently if I could it all again. I will tell the story of how application security has worked and evolved in a fast growing technology company from the day we created our first application security role in the business to our current application security approach.&lt;br /&gt;
&lt;br /&gt;
The story will include how we scaled application security to keep up with the changes in a fast growing business, how playing card games with developers was one of the best things we've ever done and how following the KISS principle in the early days of an application security program is vital. You will see how we have progressed from having no dedicated application security resources to our current staffing levels and how our goals have evolved from simply security reviewing our applications to more grand goals such as wanting to provide free application security training for anyone in Ireland.&lt;br /&gt;
&lt;br /&gt;
This isn't an application security talk focusing on the theory and approaches that seem good on paper. You will have the opportunity to learn the lessons from five years of real world application security from the person who was at the centre of application security in Realex Payments.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Building Security In Maturity Model (BSIMM) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Paco Hope&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | How do you know what security activities belong in your software lifecycle? How do you measure what you're doing? Begun in 2009, the BSIMM, is an observation-based scientific model directly describing the collective software security activities of more than sixty software security initiatives. Used as a measuring tool, BSIMM helps an organisation understand and plan their software security initiative. It covers the full framework of software development from requirements, architecture, code and test, to release management, governance, and training. This talk will introduce the measurements, explain what is measured, how it is measured, and how the measurement can be used to create or improve a software security initiative.&lt;br /&gt;
&lt;br /&gt;
Paco Hope is a Principal Consultant at Cigital, helping Fortune 500 companies secure their software for over 10 years in a variety of industries like online gaming, financial services, retail, and embedded systems. He is the author of two books on security, the most recent being the Web Security Testing Cookbook and a frequent conference speaker. As and a member of (ISC)²'s Application Security Advisory Board, he helps create and advise on the direction of the CSSLP certification. His passion is empowering everyone in the software lifecycle—developers, testers, analysts—to make meaningful contributions to the securing of software.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:30AM &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Coffee Break&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Mark Goodwin&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30AM &amp;lt;br&amp;gt;(60 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lunch&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 13:30AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lesson learned from the trenches of targeted attack&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Robert McArdle&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Targeted attacks are now a major worry for organisations. In this talk we will describe real life case studies of some of the largest and more sophisticated targeted attacks, including how we infiltrated and mapped criminal networks, and live demos of some such mapping in action.&lt;br /&gt;
&lt;br /&gt;
In this talk we will discuss some of the major ongoing and previous targeted attack campaigns that have been uncovered by Trend Micro in the last year or so, such as Luckycat, Tinba and others. We will discuss in-depth the modus operandi of the criminals in these so called APT attacks, show how we mapped and infiltrated their infrastructure, and demo some of the tools and techniques that we use when carrying out these type of investigations. All of this presentation will focus on real technical details from real cases studies, and this presentation will also include live demos.&lt;br /&gt;
&lt;br /&gt;
KEY QUESTIONS&lt;br /&gt;
&lt;br /&gt;
   1) What is the reality (not the hype) of a modern targeted attack&lt;br /&gt;
   2) You will understand the Modus Operandi of a two main types of Cybercriminals&lt;br /&gt;
   3) You will understand how investigators and security companies investigate these high profile attacks&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=151957</id>
		<title>EUTour2013 Dublin Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=151957"/>
				<updated>2013-05-21T07:17:18Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training)'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference)''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP MEMBERSHIP'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | During the OWASP Europe Tour you could become a member and support our mission.&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.cvent.com/Events/ContactPortal/Login.aspx?cwstub=15bbcfd1-f49b-4636-ba4e-c9ce70a265e5 Become an OWASP member by clicking here] &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''CONFERENCE (Wednesday 26th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Wednesday 26th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | This event is '''FREE''' &amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour''': [TBD REGISTER HERE!]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Conference Details - Times are subject to change '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 09:30 am&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Registration&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:00 am&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | The Building Security In Maturity Model (BSIMM) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Paco Hope&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | How do you know what security activities belong in your software lifecycle? How do you measure what you're doing? Begun in 2009, the BSIMM, is an observation-based scientific model directly describing the collective software security activities of more than sixty software security initiatives. Used as a measuring tool, BSIMM helps an organisation understand and plan their software security initiative. It covers the full framework of software development from requirements, architecture, code and test, to release management, governance, and training. This talk will introduce the measurements, explain what is measured, how it is measured, and how the measurement can be used to create or improve a software security initiative.&lt;br /&gt;
&lt;br /&gt;
Paco Hope is a Principal Consultant at Cigital, helping Fortune 500 companies secure their software for over 10 years in a variety of industries like online gaming, financial services, retail, and embedded systems. He is the author of two books on security, the most recent being the Web Security Testing Cookbook and a frequent conference speaker. As and a member of (ISC)²'s Application Security Advisory Board, he helps create and advise on the direction of the CSSLP certification. His passion is empowering everyone in the software lifecycle—developers, testers, analysts—to make meaningful contributions to the securing of software.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:45AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Mark Goodwin&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:30AM &amp;lt;br&amp;gt;(15 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Coffee Break&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 11:45AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 12:30AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Lunch&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=151764</id>
		<title>EUTour2013 Dublin Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=151764"/>
				<updated>2013-05-16T19:04:07Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training)'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference)''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP MEMBERSHIP'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | During the OWASP Europe Tour you could become a member and support our mission.&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.cvent.com/Events/ContactPortal/Login.aspx?cwstub=15bbcfd1-f49b-4636-ba4e-c9ce70a265e5 Become an OWASP member by clicking here] &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''CONFERENCE (Wednesday 26th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Wednesday 26th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | This event is '''FREE''' &amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour''': [TBD REGISTER HERE!]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Conference Details '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 09:00 am&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Registration&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 am&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:15AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=151763</id>
		<title>EUTour2013 Dublin Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=151763"/>
				<updated>2013-05-16T19:03:14Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training)'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference)''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP MEMBERSHIP'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | During the OWASP Europe Tour you could become a member and support our mission.&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.cvent.com/Events/ContactPortal/Login.aspx?cwstub=15bbcfd1-f49b-4636-ba4e-c9ce70a265e5 Become an OWASP member by clicking here] &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''CONFERENCE (Wednesday 26th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''When''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Where'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Wednesday 26th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: TCube&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: , 32 - 34 Castle Street, Dublin 2, Ireland'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps] &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | This event is '''FREE''' &amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour''': [TBD REGISTER HERE!]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Conference Details '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 09:00 am&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Registration&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 am&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:15AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=151095</id>
		<title>EUTour2013 Dublin Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Dublin_Agenda&amp;diff=151095"/>
				<updated>2013-05-06T21:24:06Z</updated>
		
		<summary type="html">&lt;p&gt;Fiona Collins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''CONFERENCE AND TRAINING''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | &lt;br /&gt;
== '''OWASP Europe Tour - Dublin 2013''' == &lt;br /&gt;
'''Tuesday 25th June''' ''(Training)'' &amp;lt;br&amp;gt;'''Wednesday 26th June''' ''(Conference)''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;             | '''DESCRIPTION'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP Europe TOUR,''' is an event across the European region that promotes  awareness about application security, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license.&lt;br /&gt;
&lt;br /&gt;
*Apart from OWASP's Top 10, most OWASP Projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of those Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Life-cycle.&lt;br /&gt;
&lt;br /&gt;
* This event aims to change that by providing a selection of mature and enterprise ready projects together with practical examples of how to use them.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''OWASP MEMBERSHIP'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | During the OWASP Europe Tour you could become a member and support our mission.&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.cvent.com/Events/ContactPortal/Login.aspx?cwstub=15bbcfd1-f49b-4636-ba4e-c9ce70a265e5 Become an OWASP member by clicking here] &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt; &lt;br /&gt;
'''CONFERENCE (Wednesday 26th June)''' &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Fecha''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Lugar'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | ''' Wednesday 26th June '''&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; | '''Venue Location: XXX&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Address: XXX'''&amp;lt;br&amp;gt;&lt;br /&gt;
Venue Map: [http://g.co/maps/ajq42 Google Maps] &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | '''Price and registration'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot; | This event is '''FREE''' &amp;lt;br&amp;gt;&lt;br /&gt;
 '''Registration Link to the Europe Tour''': [TBD REGISTER HERE!]'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;4&amp;quot;&lt;br /&gt;
| style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; | '''Conference Details '''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; |  '''Time''' &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Title'''&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Speaker'''&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Description'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 09:00 am&amp;lt;br&amp;gt;(30 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | Registration&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 9:45 am&amp;lt;br&amp;gt;(45 mins) &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA &lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | 10:15AM &amp;lt;br&amp;gt;(45 mins)&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
| style=&amp;quot;width:25%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
| style=&amp;quot;width:40%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | BLABLABLA&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Fiona Collins</name></author>	</entry>

	</feed>