<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Israel+Bryski</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Israel+Bryski"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Israel_Bryski"/>
		<updated>2026-04-23T17:50:22Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSec_USA_2013_-_Presentation_Templates.zip&amp;diff=152795</id>
		<title>File:AppSec USA 2013 - Presentation Templates.zip</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSec_USA_2013_-_Presentation_Templates.zip&amp;diff=152795"/>
				<updated>2013-06-04T02:16:03Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: AppSec USA 2013 presentation templates for speakers and trainers.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;AppSec USA 2013 presentation templates for speakers and trainers.&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=146056</id>
		<title>New York City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=146056"/>
				<updated>2013-02-27T17:49:12Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP NYC =&lt;br /&gt;
This local chapter uses a community building website known as MeetUp, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you view it on your smart phone or via your personal computer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;[http://www.meetup.com/OWASPNYCMETRO https://www.owasp.org/images/8/82/Meetup_logo3.jpg] [http://www.meetup.com/OWASPNYCMETRO New York City Chapter] - [http://www.meetup.com/OWASPNYCMETRO Click Here More Info]&amp;lt;/h2&amp;gt;&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=146055</id>
		<title>New York City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=146055"/>
				<updated>2013-02-27T17:49:03Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP NYC =&lt;br /&gt;
This local chapter uses a community building website known as MeetUp, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you view it on your smart phone or via your personal computer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;[http://www.meetup.com/OWASPNYCMETRO https://www.owasp.org/images/8/82/Meetup_logo3.jpg] [http://www.meetup.com/OWASPNYCMETRO New York City Chapter] - [http://www.meetup.com/OWASPNYCMETRO Click Here More Info]&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=146054</id>
		<title>New York City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=146054"/>
				<updated>2013-02-27T17:48:49Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP NYC =&lt;br /&gt;
This local chapter uses a community building website known as MeetUp, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you view it on your smart phone or via your personal computer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;[http://www.meetup.com/OWASPNYCMETRO https://www.owasp.org/images/8/82/Meetup_logo3.jpg] [http://www.meetup.com/OWASPNYCMETRO New York City Chapter] - [http://www.meetup.com/OWASPNYCMETRO Click Here More Info]&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP New York City Chapter Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Additional question?&lt;br /&gt;
&lt;br /&gt;
Contact: &lt;br /&gt;
Jasmine@owasp.org at 862-397-0111&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=146053</id>
		<title>New York City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=146053"/>
				<updated>2013-02-27T17:48:10Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: Undo revision 145735 by Israel Bryski (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP NYC =&lt;br /&gt;
This local chapter uses a community building website known as MeetUp, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you view it on your smart phone or via your personal computer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;[http://www.meetup.com/OWASPNYCMETRO https://www.owasp.org/images/8/82/Meetup_logo3.jpg] [http://www.meetup.com/OWASPNYCMETRO New York City Chapter] - [http://www.meetup.com/OWASPNYCMETRO Click Here More Info]&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP New York City Chapter Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Software Security Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When:&lt;br /&gt;
Wednesday, March 13, 2013 - Thursday, March 14, 2013&lt;br /&gt;
9:00 AM - 5:00 PM&lt;br /&gt;
Eastern Time Zone&lt;br /&gt;
   &lt;br /&gt;
Where:&lt;br /&gt;
Hotel Pennsylvania&lt;br /&gt;
401 7th Avenue&lt;br /&gt;
Between 32nd and 33rd Streets&lt;br /&gt;
New York, New York 10001&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Application Cryptanalysis Made Easy (1 Day Training)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Use of cryptography permeates today's computing infrastructures.  While few programmers attempt to implement sophisticated cryptosystems, many unwittingly develop simple protocols in every day applications without adequate knowledge of how cryptographic primitives should be combined. In this training we explore several techniques for analyzing and breaking the kinds of cryptographic protocols which are commonly found in modern applications.&lt;br /&gt;
&lt;br /&gt;
Attendees will first be presented with a brief review of cryptographic primitives and their uses, followed by an introduction of several techniques to analyze cryptographic systems in a black-box manner.  In each case, the discussion will describe how programmers can avoid making the common mistakes that allow these attacks to succeed.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/images/2/22/VSR_Training_-_Application_Cryptanalysis_Made_Easy.pdf Application Cryptanalysis Made Easy]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Hack Your Own Code: Advanced Training for Developers (2 Day Training Course)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This class provides developers an exciting chance to hone their programming skills while also learning to exploit common web vulnerabilities. Unlike most training, this will not use static demos based on pre-canned source code. Students will program small parts of a larger application during the class’s lab periods. After the component has been written, students will review the code for the vulnerability being focused on in the lab. Vulnerable code will be run on a class-accessible server while the instructor guides students through exploiting the vulnerabilities. After the vulnerability is exploited, students will be shown how their own code can be fixed (if it was vulnerable) and the best way to prevent the flaw in the first place.&lt;br /&gt;
&lt;br /&gt;
This full process will be performed for all major code vulnerabilities in the OWASP Top Ten. Exploitation and patching labs (but not programming) will be held for other vulnerabilities, including logic flaws that are hard to represent on the Top Ten. Several labs will feature prizes for the students that first find or exploit the targeted vulnerability. Environments and examples will be setup for all major platforms requested by pre-registered students. Students should bring a laptop with them, preferably with VMWare Player already installed. A virtual machine based on the OWASP Live Boot CD will be provided for lab work. The virtual machine will include development tools, but students should feel free to bring their favorite programs too.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/images/a/ac/Training_-_Hack_your_own_code.pdf Hack Your Own Code]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Securing Mobile Devices and Applications (2 Day Training Course)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mobile applications enable new threats and attacks which introduce significant risks to the enterprise, and many custom applications contain significant vulnerabilities that are unknown to the team that developed them. Considering the number of mobile applications available in the Google Play and Apple AppStore is nearing 1.5 million and vulnerabilities are skyrocketing it is imperative to perform typical application security practices. But, how is mobile different?&lt;br /&gt;
&lt;br /&gt;
This two-day, hands-on course enables students to understand how easily mobile devices and applications can be successfully attacked. They will learn how to identify, avoid and remediate common vulnerabilities by walking through a threat analysis and learning critical security areas such as those identified in the OWASP Top Ten Mobile Risks and Controls. Using state-of-the-art testing tools, students will learn how to secure mobile devices across the enterprise. Students will be able to choose from iOS or Android hands-on labs throughout the course, while they learn how easily the bad guy can compromise applications and the data they contain.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/images/8/8e/Aspect_Security_Training_-_Mobile_Security.pdf Securing Mobile Devices and Applications]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Pricing: &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1 Day Course: $750 / 2 Day Course: $1,500&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Additional question?&lt;br /&gt;
&lt;br /&gt;
Contact: &lt;br /&gt;
Jasmine@owasp.org at 862-397-0111&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=146052</id>
		<title>New York City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=146052"/>
				<updated>2013-02-27T17:47:59Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: Undo revision 146051 by Israel Bryski (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=146051</id>
		<title>New York City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=146051"/>
				<updated>2013-02-27T17:44:36Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This local chapter uses a community building website known as Meetup.com, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you view it on your smart phone or via your personal computer.&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=145735</id>
		<title>New York City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=145735"/>
				<updated>2013-02-24T02:13:20Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: Blanked the page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=144260</id>
		<title>New York City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=144260"/>
				<updated>2013-02-13T20:25:41Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP NYC =&lt;br /&gt;
This local chapter uses a community building website known as MeetUp, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you view it on your smart phone or via your personal computer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;[http://www.meetup.com/OWASPNYCMETRO https://www.owasp.org/images/8/82/Meetup_logo3.jpg] [http://www.meetup.com/OWASPNYCMETRO New York City Chapter] - [http://www.meetup.com/OWASPNYCMETRO Click Here More Info]&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP New York City Chapter Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Software Security Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When:&lt;br /&gt;
Wednesday, March 13, 2013 - Thursday, March 14, 2013&lt;br /&gt;
9:00 AM - 5:00 PM&lt;br /&gt;
Eastern Time Zone&lt;br /&gt;
   &lt;br /&gt;
Where:&lt;br /&gt;
Hotel Pennsylvania&lt;br /&gt;
401 7th Avenue&lt;br /&gt;
Between 32nd and 33rd Streets&lt;br /&gt;
New York, New York 10001&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Application Cryptanalysis Made Easy (1 Day Training)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Use of cryptography permeates today's computing infrastructures.  While few programmers attempt to implement sophisticated cryptosystems, many unwittingly develop simple protocols in every day applications without adequate knowledge of how cryptographic primitives should be combined. In this training we explore several techniques for analyzing and breaking the kinds of cryptographic protocols which are commonly found in modern applications.&lt;br /&gt;
&lt;br /&gt;
Attendees will first be presented with a brief review of cryptographic primitives and their uses, followed by an introduction of several techniques to analyze cryptographic systems in a black-box manner.  In each case, the discussion will describe how programmers can avoid making the common mistakes that allow these attacks to succeed.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/images/2/22/VSR_Training_-_Application_Cryptanalysis_Made_Easy.pdf Application Cryptanalysis Made Easy]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Hack Your Own Code: Advanced Training for Developers (2 Day Training Course)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This class provides developers an exciting chance to hone their programming skills while also learning to exploit common web vulnerabilities. Unlike most training, this will not use static demos based on pre-canned source code. Students will program small parts of a larger application during the class’s lab periods. After the component has been written, students will review the code for the vulnerability being focused on in the lab. Vulnerable code will be run on a class-accessible server while the instructor guides students through exploiting the vulnerabilities. After the vulnerability is exploited, students will be shown how their own code can be fixed (if it was vulnerable) and the best way to prevent the flaw in the first place.&lt;br /&gt;
&lt;br /&gt;
This full process will be performed for all major code vulnerabilities in the OWASP Top Ten. Exploitation and patching labs (but not programming) will be held for other vulnerabilities, including logic flaws that are hard to represent on the Top Ten. Several labs will feature prizes for the students that first find or exploit the targeted vulnerability. Environments and examples will be setup for all major platforms requested by pre-registered students. Students should bring a laptop with them, preferably with VMWare Player already installed. A virtual machine based on the OWASP Live Boot CD will be provided for lab work. The virtual machine will include development tools, but students should feel free to bring their favorite programs too.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/images/a/ac/Training_-_Hack_your_own_code.pdf Hack Your Own Code]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Securing Mobile Devices and Applications (2 Day Training Course)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mobile applications enable new threats and attacks which introduce significant risks to the enterprise, and many custom applications contain significant vulnerabilities that are unknown to the team that developed them. Considering the number of mobile applications available in the Google Play and Apple AppStore is nearing 1.5 million and vulnerabilities are skyrocketing it is imperative to perform typical application security practices. But, how is mobile different?&lt;br /&gt;
&lt;br /&gt;
This two-day, hands-on course enables students to understand how easily mobile devices and applications can be successfully attacked. They will learn how to identify, avoid and remediate common vulnerabilities by walking through a threat analysis and learning critical security areas such as those identified in the OWASP Top Ten Mobile Risks and Controls. Using state-of-the-art testing tools, students will learn how to secure mobile devices across the enterprise. Students will be able to choose from iOS or Android hands-on labs throughout the course, while they learn how easily the bad guy can compromise applications and the data they contain.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/images/8/8e/Aspect_Security_Training_-_Mobile_Security.pdf Securing Mobile Devices and Applications]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Pricing: &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1 Day Course: $750 / 2 Day Course: $1,500&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Additional question?&lt;br /&gt;
&lt;br /&gt;
Contact: &lt;br /&gt;
Jasmine@owasp.org at 862-397-0111&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=144255</id>
		<title>New York City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=144255"/>
				<updated>2013-02-13T16:40:57Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP NYC =&lt;br /&gt;
This local chapter uses a community building website known as MeetUp, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you view it on your smart phone or via your personal computer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;[http://www.meetup.com/OWASPNYCMETRO https://www.owasp.org/images/8/82/Meetup_logo3.jpg] [http://www.meetup.com/OWASPNYCMETRO New York City Chapter] - [http://www.meetup.com/OWASPNYCMETRO Click Here More Info]&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP New York City Chapter Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Software Security Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When:&lt;br /&gt;
Wednesday, March 13, 2013 - Thursday, March 14, 2013&lt;br /&gt;
9:00 AM - 5:00 PM&lt;br /&gt;
Eastern Time Zone&lt;br /&gt;
   &lt;br /&gt;
Where:&lt;br /&gt;
Hotel Pennsylvania&lt;br /&gt;
401 7th Avenue&lt;br /&gt;
Between 32nd and 33rd Streets&lt;br /&gt;
New York, New York 10001&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Application Cryptanalysis Made Easy (1 Day Training)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Use of cryptography permeates today's computing infrastructures.  While few programmers attempt to implement sophisticated cryptosystems, many unwittingly develop simple protocols in every day applications without adequate knowledge of how cryptographic primitives should be combined. In this training we explore several techniques for analyzing and breaking the kinds of cryptographic protocols which are commonly found in modern applications.&lt;br /&gt;
&lt;br /&gt;
Attendees will first be presented with a brief review of cryptographic primitives and their uses, followed by an introduction of several techniques to analyze cryptographic systems in a black-box manner.  In each case, the discussion will describe how programmers can avoid making the common mistakes that allow these attacks to succeed.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/images/2/22/VSR_Training_-_Application_Cryptanalysis_Made_Easy.pdf Application Cryptanalysis Made Easy]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Hack Your Own Code: Advanced Training for Developers (2 Day Training Course)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This class provides developers an exciting chance to hone their programming skills while also learning to exploit common web vulnerabilities. Unlike most training, this will not use static demos based on pre-canned source code. Students will program small parts of a larger application during the class’s lab periods. After the component has been written, students will review the code for the vulnerability being focused on in the lab. Vulnerable code will be run on a class-accessible server while the instructor guides students through exploiting the vulnerabilities. After the vulnerability is exploited, students will be shown how their own code can be fixed (if it was vulnerable) and the best way to prevent the flaw in the first place.&lt;br /&gt;
&lt;br /&gt;
This full process will be performed for all major code vulnerabilities in the OWASP Top Ten. Exploitation and patching labs (but not programming) will be held for other vulnerabilities, including logic flaws that are hard to represent on the Top Ten. Several labs will feature prizes for the students that first find or exploit the targeted vulnerability. Environments and examples will be setup for all major platforms requested by pre-registered students. Students should bring a laptop with them, preferably with VMWare Player already installed. A virtual machine based on the OWASP Live Boot CD will be provided for lab work. The virtual machine will include development tools, but students should feel free to bring their favorite programs too.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/index.php/File:Training_-_Hack_your_own_code.pdf Hack Your Own Code]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Securing Mobile Devices and Applications (2 Day Training Course)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mobile applications enable new threats and attacks which introduce significant risks to the enterprise, and many custom applications contain significant vulnerabilities that are unknown to the team that developed them. Considering the number of mobile applications available in the Google Play and Apple AppStore is nearing 1.5 million and vulnerabilities are skyrocketing it is imperative to perform typical application security practices. But, how is mobile different?&lt;br /&gt;
&lt;br /&gt;
This two-day, hands-on course enables students to understand how easily mobile devices and applications can be successfully attacked. They will learn how to identify, avoid and remediate common vulnerabilities by walking through a threat analysis and learning critical security areas such as those identified in the OWASP Top Ten Mobile Risks and Controls. Using state-of-the-art testing tools, students will learn how to secure mobile devices across the enterprise. Students will be able to choose from iOS or Android hands-on labs throughout the course, while they learn how easily the bad guy can compromise applications and the data they contain.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/images/8/8e/Aspect_Security_Training_-_Mobile_Security.pdf Securing Mobile Devices and Applications]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Pricing: &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1 Day Course: $750 / 2 Day Course: $1,500&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Additional question?&lt;br /&gt;
&lt;br /&gt;
Contact: &lt;br /&gt;
Jasmine@owasp.org at 862-397-0111&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:VSR_Training_-_Application_Cryptanalysis_Made_Easy.pdf&amp;diff=144254</id>
		<title>File:VSR Training - Application Cryptanalysis Made Easy.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:VSR_Training_-_Application_Cryptanalysis_Made_Easy.pdf&amp;diff=144254"/>
				<updated>2013-02-13T16:40:18Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: NYC OWASP: March Training Event&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NYC OWASP: March Training Event&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=144253</id>
		<title>New York City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=144253"/>
				<updated>2013-02-13T16:39:58Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP NYC =&lt;br /&gt;
This local chapter uses a community building website known as MeetUp, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you view it on your smart phone or via your personal computer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;[http://www.meetup.com/OWASPNYCMETRO https://www.owasp.org/images/8/82/Meetup_logo3.jpg] [http://www.meetup.com/OWASPNYCMETRO New York City Chapter] - [http://www.meetup.com/OWASPNYCMETRO Click Here More Info]&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP New York City Chapter Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Software Security Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When:&lt;br /&gt;
Wednesday, March 13, 2013 - Thursday, March 14, 2013&lt;br /&gt;
9:00 AM - 5:00 PM&lt;br /&gt;
Eastern Time Zone&lt;br /&gt;
   &lt;br /&gt;
Where:&lt;br /&gt;
Hotel Pennsylvania&lt;br /&gt;
401 7th Avenue&lt;br /&gt;
Between 32nd and 33rd Streets&lt;br /&gt;
New York, New York 10001&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Application Cryptanalysis Made Easy (1 Day Training)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Use of cryptography permeates today's computing infrastructures.  While few programmers attempt to implement sophisticated cryptosystems, many unwittingly develop simple protocols in every day applications without adequate knowledge of how cryptographic primitives should be combined. In this training we explore several techniques for analyzing and breaking the kinds of cryptographic protocols which are commonly found in modern applications.&lt;br /&gt;
&lt;br /&gt;
Attendees will first be presented with a brief review of cryptographic primitives and their uses, followed by an introduction of several techniques to analyze cryptographic systems in a black-box manner.  In each case, the discussion will describe how programmers can avoid making the common mistakes that allow these attacks to succeed.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: https://docs.google.com/folder/d/0B-IjCXl19haHSFR6NXJTdk5uTE0/edit&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Hack Your Own Code: Advanced Training for Developers (2 Day Training Course)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This class provides developers an exciting chance to hone their programming skills while also learning to exploit common web vulnerabilities. Unlike most training, this will not use static demos based on pre-canned source code. Students will program small parts of a larger application during the class’s lab periods. After the component has been written, students will review the code for the vulnerability being focused on in the lab. Vulnerable code will be run on a class-accessible server while the instructor guides students through exploiting the vulnerabilities. After the vulnerability is exploited, students will be shown how their own code can be fixed (if it was vulnerable) and the best way to prevent the flaw in the first place.&lt;br /&gt;
&lt;br /&gt;
This full process will be performed for all major code vulnerabilities in the OWASP Top Ten. Exploitation and patching labs (but not programming) will be held for other vulnerabilities, including logic flaws that are hard to represent on the Top Ten. Several labs will feature prizes for the students that first find or exploit the targeted vulnerability. Environments and examples will be setup for all major platforms requested by pre-registered students. Students should bring a laptop with them, preferably with VMWare Player already installed. A virtual machine based on the OWASP Live Boot CD will be provided for lab work. The virtual machine will include development tools, but students should feel free to bring their favorite programs too.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/index.php/File:Training_-_Hack_your_own_code.pdf Hack Your Own Code]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Securing Mobile Devices and Applications (2 Day Training Course)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mobile applications enable new threats and attacks which introduce significant risks to the enterprise, and many custom applications contain significant vulnerabilities that are unknown to the team that developed them. Considering the number of mobile applications available in the Google Play and Apple AppStore is nearing 1.5 million and vulnerabilities are skyrocketing it is imperative to perform typical application security practices. But, how is mobile different?&lt;br /&gt;
&lt;br /&gt;
This two-day, hands-on course enables students to understand how easily mobile devices and applications can be successfully attacked. They will learn how to identify, avoid and remediate common vulnerabilities by walking through a threat analysis and learning critical security areas such as those identified in the OWASP Top Ten Mobile Risks and Controls. Using state-of-the-art testing tools, students will learn how to secure mobile devices across the enterprise. Students will be able to choose from iOS or Android hands-on labs throughout the course, while they learn how easily the bad guy can compromise applications and the data they contain.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/images/8/8e/Aspect_Security_Training_-_Mobile_Security.pdf Securing Mobile Devices and Applications]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Pricing: &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1 Day Course: $750 / 2 Day Course: $1,500&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Additional question?&lt;br /&gt;
&lt;br /&gt;
Contact: &lt;br /&gt;
Jasmine@owasp.org at 862-397-0111&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=144252</id>
		<title>New York City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=144252"/>
				<updated>2013-02-13T16:39:39Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP NYC =&lt;br /&gt;
This local chapter uses a community building website known as MeetUp, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you view it on your smart phone or via your personal computer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;[http://www.meetup.com/OWASPNYCMETRO https://www.owasp.org/images/8/82/Meetup_logo3.jpg] [http://www.meetup.com/OWASPNYCMETRO New York City Chapter] - [http://www.meetup.com/OWASPNYCMETRO Click Here More Info]&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP New York City Chapter Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Software Security Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When:&lt;br /&gt;
Wednesday, March 13, 2013 - Thursday, March 14, 2013&lt;br /&gt;
9:00 AM - 5:00 PM&lt;br /&gt;
Eastern Time Zone&lt;br /&gt;
   &lt;br /&gt;
Where:&lt;br /&gt;
Hotel Pennsylvania&lt;br /&gt;
401 7th Avenue&lt;br /&gt;
Between 32nd and 33rd Streets&lt;br /&gt;
New York, New York 10001&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Application Cryptanalysis Made Easy (1 Day Training)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Use of cryptography permeates today's computing infrastructures.  While few programmers attempt to implement sophisticated cryptosystems, many unwittingly develop simple protocols in every day applications without adequate knowledge of how cryptographic primitives should be combined. In this training we explore several techniques for analyzing and breaking the kinds of cryptographic protocols which are commonly found in modern applications.&lt;br /&gt;
&lt;br /&gt;
Attendees will first be presented with a brief review of cryptographic primitives and their uses, followed by an introduction of several techniques to analyze cryptographic systems in a black-box manner.  In each case, the discussion will describe how programmers can avoid making the common mistakes that allow these attacks to succeed.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: https://docs.google.com/folder/d/0B-IjCXl19haHSFR6NXJTdk5uTE0/edit&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Hack Your Own Code: Advanced Training for Developers (2 Day Training Course)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This class provides developers an exciting chance to hone their programming skills while also learning to exploit common web vulnerabilities. Unlike most training, this will not use static demos based on pre-canned source code. Students will program small parts of a larger application during the class’s lab periods. After the component has been written, students will review the code for the vulnerability being focused on in the lab. Vulnerable code will be run on a class-accessible server while the instructor guides students through exploiting the vulnerabilities. After the vulnerability is exploited, students will be shown how their own code can be fixed (if it was vulnerable) and the best way to prevent the flaw in the first place.&lt;br /&gt;
&lt;br /&gt;
This full process will be performed for all major code vulnerabilities in the OWASP Top Ten. Exploitation and patching labs (but not programming) will be held for other vulnerabilities, including logic flaws that are hard to represent on the Top Ten. Several labs will feature prizes for the students that first find or exploit the targeted vulnerability. Environments and examples will be setup for all major platforms requested by pre-registered students. Students should bring a laptop with them, preferably with VMWare Player already installed. A virtual machine based on the OWASP Live Boot CD will be provided for lab work. The virtual machine will include development tools, but students should feel free to bring their favorite programs too.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/index.php/File:Training_-_Hack_your_own_code.pdf Hack Your own Code]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Securing Mobile Devices and Applications (2 Day Training Course)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mobile applications enable new threats and attacks which introduce significant risks to the enterprise, and many custom applications contain significant vulnerabilities that are unknown to the team that developed them. Considering the number of mobile applications available in the Google Play and Apple AppStore is nearing 1.5 million and vulnerabilities are skyrocketing it is imperative to perform typical application security practices. But, how is mobile different?&lt;br /&gt;
&lt;br /&gt;
This two-day, hands-on course enables students to understand how easily mobile devices and applications can be successfully attacked. They will learn how to identify, avoid and remediate common vulnerabilities by walking through a threat analysis and learning critical security areas such as those identified in the OWASP Top Ten Mobile Risks and Controls. Using state-of-the-art testing tools, students will learn how to secure mobile devices across the enterprise. Students will be able to choose from iOS or Android hands-on labs throughout the course, while they learn how easily the bad guy can compromise applications and the data they contain.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/images/8/8e/Aspect_Security_Training_-_Mobile_Security.pdf Securing Mobile Devices and Applications]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Pricing: &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1 Day Course: $750 / 2 Day Course: $1,500&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Additional question?&lt;br /&gt;
&lt;br /&gt;
Contact: &lt;br /&gt;
Jasmine@owasp.org at 862-397-0111&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=144250</id>
		<title>New York City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=New_York_City&amp;diff=144250"/>
				<updated>2013-02-13T16:37:54Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP NYC =&lt;br /&gt;
This local chapter uses a community building website known as MeetUp, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you view it on your smart phone or via your personal computer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;[http://www.meetup.com/OWASPNYCMETRO https://www.owasp.org/images/8/82/Meetup_logo3.jpg] [http://www.meetup.com/OWASPNYCMETRO New York City Chapter] - [http://www.meetup.com/OWASPNYCMETRO Click Here More Info]&amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;h2&amp;gt;OWASP New York City Chapter Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Software Security Training &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When:&lt;br /&gt;
Wednesday, March 13, 2013 - Thursday, March 14, 2013&lt;br /&gt;
9:00 AM - 5:00 PM&lt;br /&gt;
Eastern Time Zone&lt;br /&gt;
   &lt;br /&gt;
Where:&lt;br /&gt;
Hotel Pennsylvania&lt;br /&gt;
401 7th Avenue&lt;br /&gt;
Between 32nd and 33rd Streets&lt;br /&gt;
New York, New York 10001&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Application Cryptanalysis Made Easy (1 Day Training)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Use of cryptography permeates today's computing infrastructures.  While few programmers attempt to implement sophisticated cryptosystems, many unwittingly develop simple protocols in every day applications without adequate knowledge of how cryptographic primitives should be combined. In this training we explore several techniques for analyzing and breaking the kinds of cryptographic protocols which are commonly found in modern applications.&lt;br /&gt;
&lt;br /&gt;
Attendees will first be presented with a brief review of cryptographic primitives and their uses, followed by an introduction of several techniques to analyze cryptographic systems in a black-box manner.  In each case, the discussion will describe how programmers can avoid making the common mistakes that allow these attacks to succeed.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: https://docs.google.com/folder/d/0B-IjCXl19haHSFR6NXJTdk5uTE0/edit&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Hack Your Own Code: Advanced Training for Developers (2 Day Training Course)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This class provides developers an exciting chance to hone their programming skills while also learning to exploit common web vulnerabilities. Unlike most training, this will not use static demos based on pre-canned source code. Students will program small parts of a larger application during the class’s lab periods. After the component has been written, students will review the code for the vulnerability being focused on in the lab. Vulnerable code will be run on a class-accessible server while the instructor guides students through exploiting the vulnerabilities. After the vulnerability is exploited, students will be shown how their own code can be fixed (if it was vulnerable) and the best way to prevent the flaw in the first place.&lt;br /&gt;
&lt;br /&gt;
This full process will be performed for all major code vulnerabilities in the OWASP Top Ten. Exploitation and patching labs (but not programming) will be held for other vulnerabilities, including logic flaws that are hard to represent on the Top Ten. Several labs will feature prizes for the students that first find or exploit the targeted vulnerability. Environments and examples will be setup for all major platforms requested by pre-registered students. Students should bring a laptop with them, preferably with VMWare Player already installed. A virtual machine based on the OWASP Live Boot CD will be provided for lab work. The virtual machine will include development tools, but students should feel free to bring their favorite programs too.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: https://docs.google.com/folder/d/0B-IjCXl19haHSFR6NXJTdk5uTE0/edit&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt; Securing Mobile Devices and Applications (2 Day Training Course)&amp;lt;/h3&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mobile applications enable new threats and attacks which introduce significant risks to the enterprise, and many custom applications contain significant vulnerabilities that are unknown to the team that developed them. Considering the number of mobile applications available in the Google Play and Apple AppStore is nearing 1.5 million and vulnerabilities are skyrocketing it is imperative to perform typical application security practices. But, how is mobile different?&lt;br /&gt;
&lt;br /&gt;
This two-day, hands-on course enables students to understand how easily mobile devices and applications can be successfully attacked. They will learn how to identify, avoid and remediate common vulnerabilities by walking through a threat analysis and learning critical security areas such as those identified in the OWASP Top Ten Mobile Risks and Controls. Using state-of-the-art testing tools, students will learn how to secure mobile devices across the enterprise. Students will be able to choose from iOS or Android hands-on labs throughout the course, while they learn how easily the bad guy can compromise applications and the data they contain.&lt;br /&gt;
&lt;br /&gt;
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! &lt;br /&gt;
&lt;br /&gt;
Course syllabus: [https://www.owasp.org/images/8/8e/Aspect_Security_Training_-_Mobile_Security.pdf Securing Mobile Devices and Applications]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Pricing: &amp;lt;/h2&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1 Day Course: $750 / 2 Day Course: $1,500&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Additional question?&lt;br /&gt;
&lt;br /&gt;
Contact: &lt;br /&gt;
Jasmine@owasp.org at 862-397-0111&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Aspect_Security_Training_-_Mobile_Security.pdf&amp;diff=144249</id>
		<title>File:Aspect Security Training - Mobile Security.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Aspect_Security_Training_-_Mobile_Security.pdf&amp;diff=144249"/>
				<updated>2013-02-13T16:35:49Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: NYC OWASP: March Security Training&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NYC OWASP: March Security Training&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_14&amp;diff=126280</id>
		<title>Global Industry Committee - Application 14</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_14&amp;diff=126280"/>
				<updated>2012-03-14T21:19:49Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Israel Bryski&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Chapter Leader - NYC Chapter&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Industry Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Pending&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Pending&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Pending&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Pending&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Pending&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_14&amp;diff=126275</id>
		<title>Global Industry Committee - Application 14</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_14&amp;diff=126275"/>
				<updated>2012-03-14T20:25:59Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Israel Bryski&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Chapter Leader - NYC Chapter&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Industry Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:NYNJMetro&amp;diff=121076</id>
		<title>Talk:NYNJMetro</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:NYNJMetro&amp;diff=121076"/>
				<updated>2011-12-04T12:44:51Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thank you for taking the time to attend the OWASP NYC/New Jersey chapter planning session 22-November 8pm-9pm.  &lt;br /&gt;
&lt;br /&gt;
Making the Business Case for volunteering with OWASP Foundation  &lt;br /&gt;
http://www.linkedin.com/groups/Business-Case-OWASP-Foundation-36874.S.75290595&lt;br /&gt;
&lt;br /&gt;
So that we can ensure that we contact you and better understand how you want to help the community please login to the wiki, &amp;lt;b&amp;gt; edit this page &amp;lt;/b&amp;gt; and provide us with the following information.  &amp;quot;I &amp;lt;insert name&amp;gt; can dedicated 5-10 hours per month to the OWASP local chapter activities. In 2012 I would like to spend my time on the following areas tasks in 2012.&lt;br /&gt;
&lt;br /&gt;
NAME           -          AREA OF FOCUS (Detailed as possible)  -   OWASP email     -    Contact #&lt;br /&gt;
========================================================================&lt;br /&gt;
&lt;br /&gt;
1. [https://www.owasp.org/index.php/User:Brennan Tom Brennan] - 2004-Current, Chapter Coach, Speaker, Venues, Speakers, Sponsors, Membership, Wiki/Social Media, &lt;br /&gt;
tomb@owasp.org 973-202-0122&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Steve Antoniewicz - 2004 - Current Venues, Speakers for NYC Chapter  &lt;br /&gt;
santon@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. Peter Dean - 2009 - Current - Membership, Sponsors&lt;br /&gt;
peter.dean@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4.  Levi Gross - 2012 - Current - Developer events and outreach. levi.gross@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.  [http://www.linkedin.com/in/israelbryski Israel Bryski] - 2012-Current - I can dedicate 4-5 hours a week assisting with programs, moderated panels and the CISO survey (as mentioned during Google event). israel.bryski@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6.  Patrick D. Wells - 2012 - Current - I can help with obtaining speakers, community outreach, and anything else needed. patrick.d.wells@wellsnetworking.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
7.  Yang Li - 2012 - Current Technical Projects NJ yang.li@owasp.org 917-667-1972 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8. Dashmesh A. Singh - 2010 - Current - Help with maintaining speaker presentations on the website, inducting new members and participating in OWASP projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
9. David A Gianna, MS, MBA, CISSP: 2010-Current, Speaking, Chapter organization, Event Support, Logistics, hardware workshops, participation in new and current OWASP projects, establishment of Hudson Valley OWASP Chapter - dgianna@yahoo.com 845.831.0101&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:NYNJMetro&amp;diff=120823</id>
		<title>Talk:NYNJMetro</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:NYNJMetro&amp;diff=120823"/>
				<updated>2011-11-28T11:44:06Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thank you for taking the time to attend the OWASP NYC/New Jersey chapter planning session 22-November 8pm-9pm.  &lt;br /&gt;
&lt;br /&gt;
Making the Business Case for volunteering with OWASP Foundation  &lt;br /&gt;
http://www.linkedin.com/groups/Business-Case-OWASP-Foundation-36874.S.75290595&lt;br /&gt;
&lt;br /&gt;
So that we can ensure that we contact you and better understand how you want to help the community please login to the wiki, &amp;lt;b&amp;gt; edit this page &amp;lt;/b&amp;gt; and provide us with the following information.  &amp;quot;I &amp;lt;insert name&amp;gt; can dedicated 5-10 hours per month to the OWASP local chapter activities. In 2012 I would like to spend my time on the following areas tasks in 2012.&lt;br /&gt;
&lt;br /&gt;
NAME           -          AREA OF FOCUS (Detailed as possible)  -   OWASP email     -    Contact #&lt;br /&gt;
========================================================================&lt;br /&gt;
&lt;br /&gt;
0. John Doe            I can help with......                           john.doe@owasp            2125551212&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Tom Brennan - Coach, Venues, Speakers, Sponsors, Membership, Wiki/Social Media, Evangelist/Technical Speaker&lt;br /&gt;
tomb@owasp.org 973-202-0122&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Steve Antoniewicz - Venues, Speakers for NYC Chapter  &lt;br /&gt;
santon@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. Peter Dean - Individual Membership and Corporate Membership&lt;br /&gt;
peter.dean@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4.  Levi Gross - Developer events and outreach. levi.gross@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.  Israel Bryski - I can dedicate 4-5 hours a week assisting with programs, moderated panels and the CISO survey (as mentioned during Google event). israel.bryski@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6.  Patrick D. Wells - I can help with obtaining speakers, community outreach, and anything else needed. patrick.d.wells@wellsnetworking.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
7.  Yang Li - I can assist on OWAPS events in NJ, pet project and technical discussions. yli8@yahoo.com 917-667-1972 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
9.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you have questions you can simply call Tom Brennan at 973-202-0122&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:NYNJMetro&amp;diff=120696</id>
		<title>Talk:NYNJMetro</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:NYNJMetro&amp;diff=120696"/>
				<updated>2011-11-24T16:59:31Z</updated>
		
		<summary type="html">&lt;p&gt;Israel Bryski: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Thank you for taking the time to attend the OWASP NYC/New Jersey chapter planning session 22-November 8pm-9pm.  &lt;br /&gt;
&lt;br /&gt;
Making the Business Case for volunteering with OWASP Foundation  &lt;br /&gt;
http://www.linkedin.com/groups/Business-Case-OWASP-Foundation-36874.S.75290595&lt;br /&gt;
&lt;br /&gt;
So that we can ensure that we contact you and better understand how you want to help the community please login to the wiki, &amp;lt;b&amp;gt; edit this page &amp;lt;/b&amp;gt; and provide us with the following information.  &amp;quot;I &amp;lt;insert name&amp;gt; can dedicated 5-10 hours per month to the OWASP local chapter activities. In 2012 I would like to spend my time on the following areas tasks in 2012.&lt;br /&gt;
&lt;br /&gt;
NAME           -          AREA OF FOCUS (Detailed as possible)  -   OWASP email     -    Contact #&lt;br /&gt;
========================================================================&lt;br /&gt;
&lt;br /&gt;
0. John Doe            I can help with......                           john.doe@owasp            2125551212&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Tom Brennan - Coach, Venues, Speakers, Sponsors, Membership, Wiki/Social Media, Evangelist/Technical Speaker&lt;br /&gt;
tomb@owasp.org 973-202-0122&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Steve Antoniewicz - Venues, Speakers for NYC Chapter  &lt;br /&gt;
santon@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. Peter Dean - Individual Membership and Corporate Membership&lt;br /&gt;
peter.dean@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4.  Levi Gross - Developer events and outreach. levi.gross@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5.  Israel Bryski - I can dedicate 4-5 hours a week assisting with programs, moderated panels and the CISO survey (as mentioned during Google event). ibryski@cmu.edu&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
6. &lt;br /&gt;
&lt;br /&gt;
7.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
9.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you have questions you can simply call Tom Brennan at 973-202-0122&lt;/div&gt;</summary>
		<author><name>Israel Bryski</name></author>	</entry>

	</feed>