<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ileliveinsandbox</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ileliveinsandbox"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ileliveinsandbox"/>
		<updated>2026-05-22T01:01:27Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_-_Projects&amp;diff=23503</id>
		<title>OWASP Spring Of Code 2007 - Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_-_Projects&amp;diff=23503"/>
				<updated>2007-11-18T09:57:59Z</updated>
		
		<summary type="html">&lt;p&gt;Ileliveinsandbox: /* All SpoC Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== All SpoC Projects ==&lt;br /&gt;
&lt;br /&gt;
This page contains the latest information about the status of the [[OWASP Spring Of Code 2007]] projects (and links to each project's SpoC page)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; WIDTH=100%&lt;br /&gt;
|-&lt;br /&gt;
! SpoC Project Name&lt;br /&gt;
! Author&lt;br /&gt;
! Confirmed&lt;br /&gt;
! Status&lt;br /&gt;
! Coordinated by &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - The OWASP Web Security Certification Framework|The OWASP Web Security Certification Framework]]&lt;br /&gt;
| Mark Curphey&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
''Agreed project extension''&lt;br /&gt;
| OWASP Board&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - SqlMap|SqlMap]]&lt;br /&gt;
| Bernardo Damele&lt;br /&gt;
| Yes&lt;br /&gt;
| Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
 '''Waiting for final review'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Site Generator|OWASP Site Generator]]&lt;br /&gt;
| Boris Maletic and&lt;br /&gt;
Mike de Libero&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''20%&lt;br /&gt;
''Agreed project extension'' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Attacks Reference Guide|Attacks Reference Guide]]&lt;br /&gt;
| NSRAV Security Research Group&lt;br /&gt;
| Yes&lt;br /&gt;
| Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - The Scholastic Application Security Assessment Project|The Scholastic Application Security Assessment Project]]&lt;br /&gt;
| Eric Sheridan and &lt;br /&gt;
Dr. Goran Trajkovski&lt;br /&gt;
| Yes&lt;br /&gt;
|  Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Inspekt|Inspekt: Input filtering and validation library for PHP]]&lt;br /&gt;
| Ed Finkler&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
''Agreed project extension''&lt;br /&gt;
| Andrew v d Stock &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Code review Project|Code review Project]]&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Yes&lt;br /&gt;
|  Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Certification Project|OWASP Certification Project]]&lt;br /&gt;
| Matteo Meucci&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
Project Cancelled&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Education Project|OWASP Education Project]]&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Yes&lt;br /&gt;
| Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP The Anti-Samy Project|OWASP The Anti-Samy Project]]&lt;br /&gt;
| Arshan Dabirsiaghi&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
Partially completed - waiting final review &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Security throughout the SDLC|Security throughout the SDLC]]&lt;br /&gt;
| Keith Casey&lt;br /&gt;
| &lt;br /&gt;
| '''Project Cancelled''' &lt;br /&gt;
|&lt;br /&gt;
 &lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP WebGoat Solutions Guide|OWASP WebGoat Solutions Guide]]&lt;br /&gt;
| Erwin Geirnaert&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP WeBekci Project|OWASP WeBekci Project]]&lt;br /&gt;
| Bunyamin Demir&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''40%'''&lt;br /&gt;
Partially completed - waiting final review  &lt;br /&gt;
| Ivan Ristic &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Python Tainted Mode|Python Tainted Mode]]&lt;br /&gt;
| Zalivin Denis&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''100%'''&lt;br /&gt;
 '''Waiting for final review''' &lt;br /&gt;
| Dinis Silva&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - WebScarab NG Security Test Automation|WebScarab NG Security Test Automation]]&lt;br /&gt;
| Darren Edmonds&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
Partially completed - waiting final review &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Refresh Attacks list|Refresh Attacks list]]&lt;br /&gt;
| Przemyslaw 'rezos' Skowron&lt;br /&gt;
| Yes&lt;br /&gt;
| Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Best Practices &amp;amp; Countermeasures|Best Practices &amp;amp; Countermeasures]]&lt;br /&gt;
| Jim&lt;br /&gt;
| No&lt;br /&gt;
| '''Project Cancelled''' &lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Brand|OWASP brand]]&lt;br /&gt;
| Paulo Coimbra&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Suspended''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Web Application Security put into practice|Web Application Security put into practice]]&lt;br /&gt;
| Heiko Webers&lt;br /&gt;
| Yes&lt;br /&gt;
| Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP JBroFuzz Project|OWASP JBroFuzz Project]]&lt;br /&gt;
| Subere&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
''Agreed project extension''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Owasp Orizon Project|Owasp Orizon Project]]&lt;br /&gt;
| Paolo Perego&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
Not reviewed progress: '''75-80%''' &lt;br /&gt;
 '''Waiting for final review'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Enigform: Firefox Addon for OpenPGP signing of HTTP requests|Enigform: Firefox Addon for OpenPGP signing of HTTP requests]]&lt;br /&gt;
| Arturo (Buanzo) Busleiman&lt;br /&gt;
| Yes&lt;br /&gt;
| Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP LiveCD Education Project|OWASP LiveCD Education Project]]&lt;br /&gt;
| Josh Sweeney&lt;br /&gt;
| Yes&lt;br /&gt;
| Reviewed progress: '''30%'''&lt;br /&gt;
Partially completed - waiting final review  &lt;br /&gt;
| Eoin Keary&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Java Project|OWASP Java Project]]&lt;br /&gt;
| Erwin Geirnaert&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
Partially completed - waiting final review &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP LiveCD Project|OWASP LiveCD Project]]&lt;br /&gt;
| Joshua Perrymon&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''75%''' &lt;br /&gt;
''Agreed project extension''&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Interim @ Aspect Offices|Interim @ Aspect Offices]]&lt;br /&gt;
| Andy Gocke&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Help with SpoC project management|Help with SpoC project management]]&lt;br /&gt;
| Paulo Coimbra&lt;br /&gt;
| Yes&lt;br /&gt;
| Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Corporate Application Security Rating Guide|OWASP Corporate Application Security Rating Guide]]&lt;br /&gt;
| Erwin Geirnaert &lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
''Agreed project extension''&lt;br /&gt;
| Mandeep Khera &lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ileliveinsandbox</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_-_Projects&amp;diff=23502</id>
		<title>OWASP Spring Of Code 2007 - Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_-_Projects&amp;diff=23502"/>
				<updated>2007-11-18T09:56:41Z</updated>
		
		<summary type="html">&lt;p&gt;Ileliveinsandbox: /* All SpoC Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== All SpoC Projects ==&lt;br /&gt;
&lt;br /&gt;
This page contains the latest information about the status of the [[OWASP Spring Of Code 2007]] projects (and links to each project's SpoC page)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; WIDTH=100%&lt;br /&gt;
|-&lt;br /&gt;
! SpoC Project Name&lt;br /&gt;
! Author&lt;br /&gt;
! Confirmed&lt;br /&gt;
! Status&lt;br /&gt;
! Coordinated by &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - The OWASP Web Security Certification Framework|The OWASP Web Security Certification Framework]]&lt;br /&gt;
| Mark Curphey&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
''Agreed project extension''&lt;br /&gt;
| OWASP Board&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - SqlMap|SqlMap]]&lt;br /&gt;
| Bernardo Damele&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
Not reviewed progress: '''100%''' &lt;br /&gt;
 '''Waiting for final review'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Site Generator|OWASP Site Generator]]&lt;br /&gt;
| Boris Maletic and&lt;br /&gt;
Mike de Libero&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''20%&lt;br /&gt;
''Agreed project extension'' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Attacks Reference Guide|Attacks Reference Guide]]&lt;br /&gt;
| NSRAV Security Research Group&lt;br /&gt;
| Yes&lt;br /&gt;
| Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - The Scholastic Application Security Assessment Project|The Scholastic Application Security Assessment Project]]&lt;br /&gt;
| Eric Sheridan and &lt;br /&gt;
Dr. Goran Trajkovski&lt;br /&gt;
| Yes&lt;br /&gt;
|  Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Inspekt|Inspekt: Input filtering and validation library for PHP]]&lt;br /&gt;
| Ed Finkler&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
''Agreed project extension''&lt;br /&gt;
| Andrew v d Stock &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Code review Project|Code review Project]]&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| Yes&lt;br /&gt;
|  Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Certification Project|OWASP Certification Project]]&lt;br /&gt;
| Matteo Meucci&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
Project Cancelled&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Education Project|OWASP Education Project]]&lt;br /&gt;
| Sebastien Deleersnyder&lt;br /&gt;
| Yes&lt;br /&gt;
| Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP The Anti-Samy Project|OWASP The Anti-Samy Project]]&lt;br /&gt;
| Arshan Dabirsiaghi&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
Partially completed - waiting final review &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Security throughout the SDLC|Security throughout the SDLC]]&lt;br /&gt;
| Keith Casey&lt;br /&gt;
| &lt;br /&gt;
| '''Project Cancelled''' &lt;br /&gt;
|&lt;br /&gt;
 &lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP WebGoat Solutions Guide|OWASP WebGoat Solutions Guide]]&lt;br /&gt;
| Erwin Geirnaert&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP WeBekci Project|OWASP WeBekci Project]]&lt;br /&gt;
| Bunyamin Demir&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''40%'''&lt;br /&gt;
Partially completed - waiting final review  &lt;br /&gt;
| Ivan Ristic &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Python Tainted Mode|Python Tainted Mode]]&lt;br /&gt;
| Zalivin Denis&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''100%'''&lt;br /&gt;
 '''Waiting for final review''' &lt;br /&gt;
| Dinis Silva&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - WebScarab NG Security Test Automation|WebScarab NG Security Test Automation]]&lt;br /&gt;
| Darren Edmonds&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
Partially completed - waiting final review &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Refresh Attacks list|Refresh Attacks list]]&lt;br /&gt;
| Przemyslaw 'rezos' Skowron&lt;br /&gt;
| Yes&lt;br /&gt;
| Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Best Practices &amp;amp; Countermeasures|Best Practices &amp;amp; Countermeasures]]&lt;br /&gt;
| Jim&lt;br /&gt;
| No&lt;br /&gt;
| '''Project Cancelled''' &lt;br /&gt;
| &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Brand|OWASP brand]]&lt;br /&gt;
| Paulo Coimbra&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Suspended''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Web Application Security put into practice|Web Application Security put into practice]]&lt;br /&gt;
| Heiko Webers&lt;br /&gt;
| Yes&lt;br /&gt;
| Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP JBroFuzz Project|OWASP JBroFuzz Project]]&lt;br /&gt;
| Subere&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
''Agreed project extension''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Owasp Orizon Project|Owasp Orizon Project]]&lt;br /&gt;
| Paolo Perego&lt;br /&gt;
| Yes&lt;br /&gt;
| Half term review: '''done'''&lt;br /&gt;
Not reviewed progress: '''75-80%''' &lt;br /&gt;
 '''Waiting for final review'''&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Enigform: Firefox Addon for OpenPGP signing of HTTP requests|Enigform: Firefox Addon for OpenPGP signing of HTTP requests]]&lt;br /&gt;
| Arturo (Buanzo) Busleiman&lt;br /&gt;
| Yes&lt;br /&gt;
| Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP LiveCD Education Project|OWASP LiveCD Education Project]]&lt;br /&gt;
| Josh Sweeney&lt;br /&gt;
| Yes&lt;br /&gt;
| Reviewed progress: '''30%'''&lt;br /&gt;
Partially completed - waiting final review  &lt;br /&gt;
| Eoin Keary&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Java Project|OWASP Java Project]]&lt;br /&gt;
| Erwin Geirnaert&lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
Partially completed - waiting final review &lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP LiveCD Project|OWASP LiveCD Project]]&lt;br /&gt;
| Joshua Perrymon&lt;br /&gt;
| Yes&lt;br /&gt;
| Not reviewed progress: '''75%''' &lt;br /&gt;
''Agreed project extension''&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Interim @ Aspect Offices|Interim @ Aspect Offices]]&lt;br /&gt;
| Andy Gocke&lt;br /&gt;
| Yes&lt;br /&gt;
| '''Project Finished'''&lt;br /&gt;
| Jeff Williams&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - Help with SpoC project management|Help with SpoC project management]]&lt;br /&gt;
| Paulo Coimbra&lt;br /&gt;
| Yes&lt;br /&gt;
| Full term review: '''done'''&lt;br /&gt;
progress: '''100%''' &lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
! [[SpoC 007 - OWASP Corporate Application Security Rating Guide|OWASP Corporate Application Security Rating Guide]]&lt;br /&gt;
| Erwin Geirnaert &lt;br /&gt;
| Yes&lt;br /&gt;
| 0% &lt;br /&gt;
''Agreed project extension''&lt;br /&gt;
| Mandeep Khera &lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ileliveinsandbox</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda&amp;diff=23432</id>
		<title>7th OWASP AppSec Conference - San Jose 2007/Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda&amp;diff=23432"/>
				<updated>2007-11-15T18:20:29Z</updated>
		
		<summary type="html">&lt;p&gt;Ileliveinsandbox: Undo revision 23431 by Ileliveinsandbox (Talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The agenda for the conference is still under development and is subject to change.&lt;br /&gt;
&lt;br /&gt;
The [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda#Nov 14: Track 3: Web Services Security | Web Services Security Track]], which is the 3rd track on Day 1, is at the bottom of this page.&lt;br /&gt;
&lt;br /&gt;
== OWASP &amp;amp; WASC AppSec 2007 Training Courses - Nov 12th-13th 2007 ==&lt;br /&gt;
&lt;br /&gt;
The tutorials and the conference itself will be held at eBay in San Jose.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Building and Testing Secure Web Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This powerful two-day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how easily application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code. [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This Java focused course covers the most common Java EE web application security problems, including the OWASP Top Ten. It teaches Java EE best practices, so developers can really understand how to avoid introducing such vulnerabilities into their Java EE applications. '''This course includes hands on coding exercises that allows the students to fix real flaws in a Java EE application using the best practices recommended in class!!''' [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Secure Coding .NET Web Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This .NET focused course covers the most common .NET web application security problems, including the OWASP Top Ten. It teaches .NET best practices, so developers can really understand how to avoid introducing such vulnerabilities into their .NET web applications. '''This course includes hands on coding exercises that allows the students to fix real flaws in a .NET application using the best practices recommended in class!!''' [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Secure_Coding_.NET_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Web Services and XML Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system! [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leveraging OWASP Tools and Documents to Secure Your Enterprise&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Apart from OWASP's Top 10, most OWASP projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of these Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Lifecycle (WADL). This course aims to change that by providing detailed presentations of the most mature and enterprise ready OWASP projects together with practical examples of how to use them. [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T5._Leveraging_OWASP_Tools_and_Documents_to_Secure_Your_Enterprise_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Open Source ModSecurity Training &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | ModSecurity is currently the most widely deployed web application firewall (WAF) product. This two-day class is for those people who want to learn how to build, deploy, and use ModSecurity in the most effective manner. The course will cover the open source ModSecurity Console, which helps manage alerts on suspicious web activity targeting your web servers. The course also provides an in-depth look at the extremely powerful ModSecurity Rules Language. [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T6._Open_Source_ModSecurity_Training_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
November 12th - Cenzic is sponsoring a cocktail party at the eBay facility after the first day of training.&lt;br /&gt;
&lt;br /&gt;
== Tech Expo - Nov 13th-14th ==&lt;br /&gt;
&lt;br /&gt;
Product vendors will be demonstrating their application security products to conference attendees for the first time at this OWASP Conference. The intended focus of this expo is on the technical details of the technologies they are offering in the market to help organizations deal with their application security issues.&lt;br /&gt;
 &lt;br /&gt;
The technology expo will be held:&lt;br /&gt;
* November 13th: From 12-2, with lunch included for all the OWASP tutorial attendees who will be invited to attend the expo.&lt;br /&gt;
* November 14th: From 11-6 during the first day of the OWASP conference. &lt;br /&gt;
&lt;br /&gt;
'''Breach Cocktail Party - Nov 13'''&lt;br /&gt;
&lt;br /&gt;
To close out the training event and the first day of the tech expo, Breach has kindly agreed to arrange a cocktail party on Tuesday evening. They sponsored a similar event at Black Hat for a joint OWASP / WASC get together and it was a roaring success with over 300 attendees. These have always been great events at previous conferences. Hope to see you there. This event is limited to ~100 people so please RSVP. For more details and RSVP go to: http://www.breach.com/breach_security_party_owaspwasc_san_jose.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Sandbox party''' Nov 15th&lt;br /&gt;
........&lt;br /&gt;
&lt;br /&gt;
== OWASP &amp;amp; WASC AppSec 2007 Conference Schedule - Nov 14-15 (San Jose 2007) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 - Nov 14, 2007&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Coffee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:10 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Welcome to OWASP &amp;amp; WASC AppSec 2007 Conference: Dave Wichers, OWASP Conferences Chair and COO Aspect Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:10-10:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Keynote: eBay Application Security Program – Dave Cullinane, CISO - eBay and Michael Barrett, CISO - PayPal&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | An Introduction to WASC and its projects – Jeremiah Grossman, CTO, WhiteHat Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Using OWASP, Jeff Williams, OWASP Chair and CEO - Aspect Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:20 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:20-12:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | For my next trick... hacking Web 2.0 – Petko D. Petkov (AKA PDP Architect), Senior Security Researcher&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Backdoors and other Developer Introduced 'Features', Chris Wysopal, CTO Veracode&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:20-13:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | CSRF: Danger, Detection, and Defenses – Introducing two new OWASP CSRF Tools, Eric Sheridan, Application Security Consultant, Aspect Security and OWASP CSRF Guard Project Lead&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WASC Distributed Open Proxy Honeypot Project, Ryan Barnett, WASC Open Proxy Honeypot Project Lead, Breach Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:10 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Defeating Web 2.0 Attacks without Recoding Applications, Amichai Shulman, CTO, Imperva&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Dangers of Third Party Content, Tom Stripling, Senior Security Consultant - Security PS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:10-15:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:40 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Projects Overview, Dinis Cruz, Chief OWASP Evangelist&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Web Browser (In)-Security - &amp;quot;Past, Present, and Future&amp;quot;, Robert &amp;quot;RSnake&amp;quot; Hansen, CEO SecTheory&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:40-17:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-18:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: “Building an Effective Application Security Assurance Program”&lt;br /&gt;
Moderator: Brian Bertacini, Sr. Manager, AppSec Consulting&lt;br /&gt;
&lt;br /&gt;
Panelists: Jeff Williams - CEO Aspect Security, Andy Steingruebl - Principal Security Engineer PayPal, Gary Terrell, Adobe Systems, Scott Stender, iSEC Partners, Neil Daswani, Google&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-19:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Leader Meeting [[7th_OWASP_AppSec_Conference_-_San_Jose_2007_/_OWASP_Leaders_Meeting_-_Nov_14_6pm|(see meeting agenda here)]] - Organized by Dinis Cruz&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:00-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks at Holiday Inn. (1740 N. 1st St. San Jose)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | ~01:00-??:?? || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Band ???&lt;br /&gt;
 |-&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 - Nov 15, 2007&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Coffee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-9:50 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Keynote:  DTCC Application Security Program, Jim Routh, CISO for the Depository Trust and Clearing Corporation (DTCC)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:50-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP State of the Union, Dinis Cruz, Chief OWASP Evangelist&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-10:50 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:50-11:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Finding Vulnerabilities in Flash Applications, Stefano Di Paola, CTO Minded Security&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Start Rolling with Rails Security, Corey Benninger, Principal Consultant, Intrepidus Group, Inc.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30-12:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API (ESAPI) – Jeff Williams, CEO Aspect Security and OWASP Chair&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Securing Java Server Faces against the OWASP Top 10, David Chandler, Web Architect, Digital Insight&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | The MySpace Worm, by its author: Samy Kamkar&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | .Net Web Services Hacking - Scan, Attacks and Defense, Sheeraj Shah, Blueinfy&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP SpoC Project: Anti Samy - Picking a Fight with XSS, Arshan Dabirsiaghi, Application Security Engineer, Aspect Security&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Website Vulnerability Statistics, Arian Evans (Director of Operations, WhiteHat Security)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:20-15:40 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:40-16:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | The PKI Lie – Attacking Certificate-Based Authentication, Ofer Maor, CTO Hacktics&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Session Management Security and Assessment Techniques, Tom Stracener, Sr. Security Analyst, Cenzic&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Responsible &amp;quot;Website&amp;quot; Vulnerability Disclosure&lt;br /&gt;
Moderator: Anurag Agarwal&lt;br /&gt;
&lt;br /&gt;
Panelists: Robert &amp;quot;RSnake&amp;quot; Hansen, CEO SecTheory; Bruce Lowenthal, Director of Oracle Security Alerts Group, Oracle; Zulfikar Ramzan, Advanced Threat Team, Symantec; Christopher Ernst, US Secret Service; and Katie Moussouris, Security Strategist, Microsoft&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Outsourcing: Financial Dream or Security Nightmare?&lt;br /&gt;
Moderator: Rohyt Belani, Managing Partner, Intrepidus Group&lt;br /&gt;
&lt;br /&gt;
Panelists: Claire McDonough - Security Program Manager at Google, Renato Delatorre – Director of Network Security &amp;amp; Risk Management for Verizon Wireless, Jaswinder Hayre - Application Security Manager for HBO&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-17:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up - Dave Wichers, OWASP Conferences Chair&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-20:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Microsoft and Aspect Security Cosponsored Cocktail Party: Drinks at Holiday Inn. (1740 N. 1st St. San Jose)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Nov 14: Track 3: Web Services Security ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 - Nov 14, 2007&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:80%; background:#BC857A&amp;quot; | Track 3:  Web Services Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:10-11:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30-12:30 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | The Top 10 Web Services Security Issues, Gunnar Peterson, Principle, Arctec Group&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:30 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Centralized, Dynamic Web Services Security and Policy Management, Richard Salz, IBM&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:10 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Covert CDATA Channels, XML Bombs, and Unexpected Attachments: Case Notes from a real-life XML Web Services Vulnerability Assessment, Mark O'Neill, CTO Vordel&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:10-15:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:40 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Attacking XML Security, Brad Hill, Principal Security Consultant, iSEC Partners&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ileliveinsandbox</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda&amp;diff=23431</id>
		<title>7th OWASP AppSec Conference - San Jose 2007/Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda&amp;diff=23431"/>
				<updated>2007-11-15T18:18:30Z</updated>
		
		<summary type="html">&lt;p&gt;Ileliveinsandbox: /* OWASP &amp;amp; WASC AppSec 2007 Conference Schedule - Nov 14-15 (San Jose 2007) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The agenda for the conference is still under development and is subject to change.&lt;br /&gt;
&lt;br /&gt;
The [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda#Nov 14: Track 3: Web Services Security | Web Services Security Track]], which is the 3rd track on Day 1, is at the bottom of this page.&lt;br /&gt;
&lt;br /&gt;
== OWASP &amp;amp; WASC AppSec 2007 Training Courses - Nov 12th-13th 2007 ==&lt;br /&gt;
&lt;br /&gt;
The tutorials and the conference itself will be held at eBay in San Jose.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Building and Testing Secure Web Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This powerful two-day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how easily application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code. [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This Java focused course covers the most common Java EE web application security problems, including the OWASP Top Ten. It teaches Java EE best practices, so developers can really understand how to avoid introducing such vulnerabilities into their Java EE applications. '''This course includes hands on coding exercises that allows the students to fix real flaws in a Java EE application using the best practices recommended in class!!''' [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Secure Coding .NET Web Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This .NET focused course covers the most common .NET web application security problems, including the OWASP Top Ten. It teaches .NET best practices, so developers can really understand how to avoid introducing such vulnerabilities into their .NET web applications. '''This course includes hands on coding exercises that allows the students to fix real flaws in a .NET application using the best practices recommended in class!!''' [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Secure_Coding_.NET_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Web Services and XML Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system! [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leveraging OWASP Tools and Documents to Secure Your Enterprise&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Apart from OWASP's Top 10, most OWASP projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of these Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Lifecycle (WADL). This course aims to change that by providing detailed presentations of the most mature and enterprise ready OWASP projects together with practical examples of how to use them. [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T5._Leveraging_OWASP_Tools_and_Documents_to_Secure_Your_Enterprise_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Open Source ModSecurity Training &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | ModSecurity is currently the most widely deployed web application firewall (WAF) product. This two-day class is for those people who want to learn how to build, deploy, and use ModSecurity in the most effective manner. The course will cover the open source ModSecurity Console, which helps manage alerts on suspicious web activity targeting your web servers. The course also provides an in-depth look at the extremely powerful ModSecurity Rules Language. [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T6._Open_Source_ModSecurity_Training_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
November 12th - Cenzic is sponsoring a cocktail party at the eBay facility after the first day of training.&lt;br /&gt;
&lt;br /&gt;
== Tech Expo - Nov 13th-14th ==&lt;br /&gt;
&lt;br /&gt;
Product vendors will be demonstrating their application security products to conference attendees for the first time at this OWASP Conference. The intended focus of this expo is on the technical details of the technologies they are offering in the market to help organizations deal with their application security issues.&lt;br /&gt;
 &lt;br /&gt;
The technology expo will be held:&lt;br /&gt;
* November 13th: From 12-2, with lunch included for all the OWASP tutorial attendees who will be invited to attend the expo.&lt;br /&gt;
* November 14th: From 11-6 during the first day of the OWASP conference. &lt;br /&gt;
&lt;br /&gt;
'''Breach Cocktail Party - Nov 13'''&lt;br /&gt;
&lt;br /&gt;
To close out the training event and the first day of the tech expo, Breach has kindly agreed to arrange a cocktail party on Tuesday evening. They sponsored a similar event at Black Hat for a joint OWASP / WASC get together and it was a roaring success with over 300 attendees. These have always been great events at previous conferences. Hope to see you there. This event is limited to ~100 people so please RSVP. For more details and RSVP go to: http://www.breach.com/breach_security_party_owaspwasc_san_jose.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Sandbox party''' Nov 15th&lt;br /&gt;
........&lt;br /&gt;
&lt;br /&gt;
== OWASP &amp;amp; WASC AppSec 2007 Conference Schedule - Nov 14-15 (San Jose 2007) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 - Nov 14, 2007&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Coffee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:10 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Welcome to OWASP &amp;amp; WASC AppSec 2007 Conference: Dave Wichers, OWASP Conferences Chair and COO Aspect Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:10-10:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Keynote: eBay Application Security Program – Dave Cullinane, CISO - eBay and Michael Barrett, CISO - PayPal&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | An Introduction to WASC and its projects – Jeremiah Grossman, CTO, WhiteHat Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Using OWASP, Jeff Williams, OWASP Chair and CEO - Aspect Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:20 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:20-12:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | For my next trick... hacking Web 2.0 – Petko D. Petkov (AKA PDP Architect), Senior Security Researcher&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Backdoors and other Developer Introduced 'Features', Chris Wysopal, CTO Veracode&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:20-13:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | CSRF: Danger, Detection, and Defenses – Introducing two new OWASP CSRF Tools, Eric Sheridan, Application Security Consultant, Aspect Security and OWASP CSRF Guard Project Lead&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WASC Distributed Open Proxy Honeypot Project, Ryan Barnett, WASC Open Proxy Honeypot Project Lead, Breach Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:10 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Defeating Web 2.0 Attacks without Recoding Applications, Amichai Shulman, CTO, Imperva&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Dangers of Third Party Content, Tom Stripling, Senior Security Consultant - Security PS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:10-15:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:40 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Projects Overview, Dinis Cruz, Chief OWASP Evangelist&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Web Browser (In)-Security - &amp;quot;Past, Present, and Future&amp;quot;, Robert &amp;quot;RSnake&amp;quot; Hansen, CEO SecTheory&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:40-17:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-18:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: “Building an Effective Application Security Assurance Program”&lt;br /&gt;
Moderator: Brian Bertacini, Sr. Manager, AppSec Consulting&lt;br /&gt;
&lt;br /&gt;
Panelists: Jeff Williams - CEO Aspect Security, Andy Steingruebl - Principal Security Engineer PayPal, Gary Terrell, Adobe Systems, Scott Stender, iSEC Partners, Neil Daswani, Google&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-19:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Leader Meeting [[7th_OWASP_AppSec_Conference_-_San_Jose_2007_/_OWASP_Leaders_Meeting_-_Nov_14_6pm|(see meeting agenda here)]] - Organized by Dinis Cruz&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:00-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks at Holiday Inn. (1740 N. 1st St. San Jose)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | ~01:00-??:?? || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Band ???&lt;br /&gt;
 |-&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 - Nov 15, 2007&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Coffee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-9:50 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Keynote:  DTCC Application Security Program, Jim Routh, CISO for the Depository Trust and Clearing Corporation (DTCC)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:50-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | The Blob of Security - in search of the lost sandbox&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-10:50 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:50-11:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Finding Vulnerabilities in Flash Applications, Stefano Di Paola, CTO Minded Security&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Start Rolling with Rails Security, Corey Benninger, Principal Consultant, Intrepidus Group, Inc.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30-12:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API (ESAPI) – Jeff Williams, CEO Aspect Security and OWASP Chair&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Securing Java Server Faces against the OWASP Top 10, David Chandler, Web Architect, Digital Insight&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | The MySpace Worm, by its author: Samy Kamkar&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | .Net Web Services Hacking - Scan, Attacks and Defense, Sheeraj Shah, Blueinfy&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP SpoC Project: Anti Samy - Picking a Fight with XSS, Arshan Dabirsiaghi, Application Security Engineer, Aspect Security&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Website Vulnerability Statistics, Arian Evans (Director of Operations, WhiteHat Security)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:20-15:40 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:40-16:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | The PKI Lie – Attacking Certificate-Based Authentication, Ofer Maor, CTO Hacktics&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Session Management Security and Assessment Techniques, Tom Stracener, Sr. Security Analyst, Cenzic&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Responsible &amp;quot;Website&amp;quot; Vulnerability Disclosure&lt;br /&gt;
Moderator: Anurag Agarwal&lt;br /&gt;
&lt;br /&gt;
Panelists: Robert &amp;quot;RSnake&amp;quot; Hansen, CEO SecTheory; Bruce Lowenthal, Director of Oracle Security Alerts Group, Oracle; Zulfikar Ramzan, Advanced Threat Team, Symantec; Christopher Ernst, US Secret Service; and Katie Moussouris, Security Strategist, Microsoft&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Outsourcing: Financial Dream or Security Nightmare?&lt;br /&gt;
Moderator: Rohyt Belani, Managing Partner, Intrepidus Group&lt;br /&gt;
&lt;br /&gt;
Panelists: Claire McDonough - Security Program Manager at Google, Renato Delatorre – Director of Network Security &amp;amp; Risk Management for Verizon Wireless, Jaswinder Hayre - Application Security Manager for HBO&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-17:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up - Dave Wichers, OWASP Conferences Chair&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-20:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Microsoft and Aspect Security Cosponsored Cocktail Party: Drinks at Holiday Inn. (1740 N. 1st St. San Jose)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Nov 14: Track 3: Web Services Security ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 - Nov 14, 2007&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:80%; background:#BC857A&amp;quot; | Track 3:  Web Services Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:10-11:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30-12:30 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | The Top 10 Web Services Security Issues, Gunnar Peterson, Principle, Arctec Group&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:30 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Centralized, Dynamic Web Services Security and Policy Management, Richard Salz, IBM&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:10 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Covert CDATA Channels, XML Bombs, and Unexpected Attachments: Case Notes from a real-life XML Web Services Vulnerability Assessment, Mark O'Neill, CTO Vordel&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:10-15:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:40 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Attacking XML Security, Brad Hill, Principal Security Consultant, iSEC Partners&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ileliveinsandbox</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda&amp;diff=23430</id>
		<title>7th OWASP AppSec Conference - San Jose 2007/Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda&amp;diff=23430"/>
				<updated>2007-11-15T18:17:33Z</updated>
		
		<summary type="html">&lt;p&gt;Ileliveinsandbox: /* Tech Expo - Nov 13th-14th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The agenda for the conference is still under development and is subject to change.&lt;br /&gt;
&lt;br /&gt;
The [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda#Nov 14: Track 3: Web Services Security | Web Services Security Track]], which is the 3rd track on Day 1, is at the bottom of this page.&lt;br /&gt;
&lt;br /&gt;
== OWASP &amp;amp; WASC AppSec 2007 Training Courses - Nov 12th-13th 2007 ==&lt;br /&gt;
&lt;br /&gt;
The tutorials and the conference itself will be held at eBay in San Jose.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Building and Testing Secure Web Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This powerful two-day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how easily application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code. [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T1._Building_and_Testing_Secure_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This Java focused course covers the most common Java EE web application security problems, including the OWASP Top Ten. It teaches Java EE best practices, so developers can really understand how to avoid introducing such vulnerabilities into their Java EE applications. '''This course includes hands on coding exercises that allows the students to fix real flaws in a Java EE application using the best practices recommended in class!!''' [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T2._Secure_Coding_for_Java_EE_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Secure Coding .NET Web Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This .NET focused course covers the most common .NET web application security problems, including the OWASP Top Ten. It teaches .NET best practices, so developers can really understand how to avoid introducing such vulnerabilities into their .NET web applications. '''This course includes hands on coding exercises that allows the students to fix real flaws in a .NET application using the best practices recommended in class!!''' [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T3._Secure_Coding_.NET_Web_Applications_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Web Services and XML Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system! [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T4._Web_Services_and_XML_Security_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leveraging OWASP Tools and Documents to Secure Your Enterprise&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Apart from OWASP's Top 10, most OWASP projects are not widely used and understood. In most cases this is not due to lack of quality and usefulness of these Document &amp;amp; Tool projects, but due to a lack of understanding of where they fit in an Enterprise's security ecosystem or in the Web Application Development Lifecycle (WADL). This course aims to change that by providing detailed presentations of the most mature and enterprise ready OWASP projects together with practical examples of how to use them. [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T5._Leveraging_OWASP_Tools_and_Documents_to_Secure_Your_Enterprise_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Open Source ModSecurity Training &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | ModSecurity is currently the most widely deployed web application firewall (WAF) product. This two-day class is for those people who want to learn how to build, deploy, and use ModSecurity in the most effective manner. The course will cover the open source ModSecurity Console, which helps manage alerts on suspicious web activity targeting your web servers. The course also provides an in-depth look at the extremely powerful ModSecurity Rules Language. [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training#T6._Open_Source_ModSecurity_Training_-_2-Day_Course_-_Nov_12-13.2C_2007 | Read more here!]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
November 12th - Cenzic is sponsoring a cocktail party at the eBay facility after the first day of training.&lt;br /&gt;
&lt;br /&gt;
== Tech Expo - Nov 13th-14th ==&lt;br /&gt;
&lt;br /&gt;
Product vendors will be demonstrating their application security products to conference attendees for the first time at this OWASP Conference. The intended focus of this expo is on the technical details of the technologies they are offering in the market to help organizations deal with their application security issues.&lt;br /&gt;
 &lt;br /&gt;
The technology expo will be held:&lt;br /&gt;
* November 13th: From 12-2, with lunch included for all the OWASP tutorial attendees who will be invited to attend the expo.&lt;br /&gt;
* November 14th: From 11-6 during the first day of the OWASP conference. &lt;br /&gt;
&lt;br /&gt;
'''Breach Cocktail Party - Nov 13'''&lt;br /&gt;
&lt;br /&gt;
To close out the training event and the first day of the tech expo, Breach has kindly agreed to arrange a cocktail party on Tuesday evening. They sponsored a similar event at Black Hat for a joint OWASP / WASC get together and it was a roaring success with over 300 attendees. These have always been great events at previous conferences. Hope to see you there. This event is limited to ~100 people so please RSVP. For more details and RSVP go to: http://www.breach.com/breach_security_party_owaspwasc_san_jose.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Sandbox party''' Nov 15th&lt;br /&gt;
........&lt;br /&gt;
&lt;br /&gt;
== OWASP &amp;amp; WASC AppSec 2007 Conference Schedule - Nov 14-15 (San Jose 2007) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 - Nov 14, 2007&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Coffee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:10 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Welcome to OWASP &amp;amp; WASC AppSec 2007 Conference: Dave Wichers, OWASP Conferences Chair and COO Aspect Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:10-10:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Keynote: eBay Application Security Program – Dave Cullinane, CISO - eBay and Michael Barrett, CISO - PayPal&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | An Introduction to WASC and its projects – Jeremiah Grossman, CTO, WhiteHat Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Using OWASP, Jeff Williams, OWASP Chair and CEO - Aspect Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:20 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:20-12:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | For my next trick... hacking Web 2.0 – Petko D. Petkov (AKA PDP Architect), Senior Security Researcher&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Backdoors and other Developer Introduced 'Features', Chris Wysopal, CTO Veracode&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:20-13:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | CSRF: Danger, Detection, and Defenses – Introducing two new OWASP CSRF Tools, Eric Sheridan, Application Security Consultant, Aspect Security and OWASP CSRF Guard Project Lead&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WASC Distributed Open Proxy Honeypot Project, Ryan Barnett, WASC Open Proxy Honeypot Project Lead, Breach Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:10 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Defeating Web 2.0 Attacks without Recoding Applications, Amichai Shulman, CTO, Imperva&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Dangers of Third Party Content, Tom Stripling, Senior Security Consultant - Security PS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:10-15:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:40 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Projects Overview, Dinis Cruz, Chief OWASP Evangelist&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Web Browser (In)-Security - &amp;quot;Past, Present, and Future&amp;quot;, Robert &amp;quot;RSnake&amp;quot; Hansen, CEO SecTheory&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:40-17:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-18:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: “Building an Effective Application Security Assurance Program”&lt;br /&gt;
Moderator: Brian Bertacini, Sr. Manager, AppSec Consulting&lt;br /&gt;
&lt;br /&gt;
Panelists: Jeff Williams - CEO Aspect Security, Andy Steingruebl - Principal Security Engineer PayPal, Gary Terrell, Adobe Systems, Scott Stender, iSEC Partners, Neil Daswani, Google&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-19:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Leader Meeting [[7th_OWASP_AppSec_Conference_-_San_Jose_2007_/_OWASP_Leaders_Meeting_-_Nov_14_6pm|(see meeting agenda here)]] - Organized by Dinis Cruz&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:00-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks at Holiday Inn. (1740 N. 1st St. San Jose)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | ~01:00-??:?? || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Band ???&lt;br /&gt;
 |-&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 - Nov 15, 2007&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Coffee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-9:50 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Keynote:  DTCC Application Security Program, Jim Routh, CISO for the Depository Trust and Clearing Corporation (DTCC)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:50-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP State of the Union, Dinis Cruz, Chief OWASP Evangelist&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-10:50 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:50-11:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Finding Vulnerabilities in Flash Applications, Stefano Di Paola, CTO Minded Security&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Start Rolling with Rails Security, Corey Benninger, Principal Consultant, Intrepidus Group, Inc.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30-12:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API (ESAPI) – Jeff Williams, CEO Aspect Security and OWASP Chair&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Securing Java Server Faces against the OWASP Top 10, David Chandler, Web Architect, Digital Insight&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | The MySpace Worm, by its author: Samy Kamkar&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | .Net Web Services Hacking - Scan, Attacks and Defense, Sheeraj Shah, Blueinfy&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP SpoC Project: Anti Samy - Picking a Fight with XSS, Arshan Dabirsiaghi, Application Security Engineer, Aspect Security&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Website Vulnerability Statistics, Arian Evans (Director of Operations, WhiteHat Security)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:20-15:40 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:40-16:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | The PKI Lie – Attacking Certificate-Based Authentication, Ofer Maor, CTO Hacktics&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Session Management Security and Assessment Techniques, Tom Stracener, Sr. Security Analyst, Cenzic&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Responsible &amp;quot;Website&amp;quot; Vulnerability Disclosure&lt;br /&gt;
Moderator: Anurag Agarwal&lt;br /&gt;
&lt;br /&gt;
Panelists: Robert &amp;quot;RSnake&amp;quot; Hansen, CEO SecTheory; Bruce Lowenthal, Director of Oracle Security Alerts Group, Oracle; Zulfikar Ramzan, Advanced Threat Team, Symantec; Christopher Ernst, US Secret Service; and Katie Moussouris, Security Strategist, Microsoft&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Outsourcing: Financial Dream or Security Nightmare?&lt;br /&gt;
Moderator: Rohyt Belani, Managing Partner, Intrepidus Group&lt;br /&gt;
&lt;br /&gt;
Panelists: Claire McDonough - Security Program Manager at Google, Renato Delatorre – Director of Network Security &amp;amp; Risk Management for Verizon Wireless, Jaswinder Hayre - Application Security Manager for HBO&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-17:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up - Dave Wichers, OWASP Conferences Chair&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-20:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Microsoft and Aspect Security Cosponsored Cocktail Party: Drinks at Holiday Inn. (1740 N. 1st St. San Jose)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Nov 14: Track 3: Web Services Security ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 - Nov 14, 2007&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:80%; background:#BC857A&amp;quot; | Track 3:  Web Services Security&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:10-11:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:30-12:30 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | The Top 10 Web Services Security Issues, Gunnar Peterson, Principle, Arctec Group&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:30 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Centralized, Dynamic Web Services Security and Policy Management, Richard Salz, IBM&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:10 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Covert CDATA Channels, XML Bombs, and Unexpected Attachments: Case Notes from a real-life XML Web Services Vulnerability Assessment, Mark O'Neill, CTO Vordel&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:10-15:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:40 || style=&amp;quot;width:80%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Attacking XML Security, Brad Hill, Principal Security Consultant, iSEC Partners&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ileliveinsandbox</name></author>	</entry>

	</feed>