<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jess+Garrett</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jess+Garrett"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Jess_Garrett"/>
		<updated>2026-04-23T09:37:44Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=153994</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=153994"/>
				<updated>2013-06-17T16:18:23Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
[https://vimeo.com/68058106 Keynote Address: Data Protection for the 21st Century]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://vimeo.com/68058105 Panel Discussion]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Technical Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
DevFu: The inner ninja in every application developer  &lt;br /&gt;
*[[Media:Chrastil.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082818 Video]&lt;br /&gt;
Adventures in Large Scale HTTP Header Abuse&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Wolff.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071431 Video]&lt;br /&gt;
Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Weaver.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071432 Video]&lt;br /&gt;
DevOps and Security: It's Happening. Right Now.&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Bravo.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68335259 Video]&lt;br /&gt;
Real World Cloud Application Security&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Chan.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082826 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Deep-Dive Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
SIP Based Cloud Instances&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Disney-Leugers.odp | Slides]]&lt;br /&gt;
*[https://vimeo.com/68091563 Video]&lt;br /&gt;
How Malware Attacks Web Applications&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Smith.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68107330 Video]&lt;br /&gt;
Top Ten Web Application Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Manico.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68091564 Video]&lt;br /&gt;
A Demo of and Preventing XSS in .NET Applications&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Conklin.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68069847 Video]&lt;br /&gt;
Data Mining a Mountain of Zero-Day Vulnerabilities&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Brady.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68107333 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Management Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
Digital Bounty Hunters - Decoding Bug Bounty Programs&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Rose.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68107340 Video]&lt;br /&gt;
Linking Security to Business Value in the Customer Service Industry&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Rojas.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68111318 Video]&lt;br /&gt;
Using SaaS and the Cloud to Secure the SDLC&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Earle.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68111315 Video]&lt;br /&gt;
Measuring Security Best Practices With Open SAMM&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Jex.ppt | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082823 Video]&lt;br /&gt;
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:McCoy.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071440 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Legal Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
Electronic Discovery for System Administrators&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Shumway.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68142345 Video]&lt;br /&gt;
Legal Issues of Forensics in the Cloud&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Willson.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082821 Video]&lt;br /&gt;
CISPA: Why Privacy Advocates Hate This Legislation&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Feinroth.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071433 Video]&lt;br /&gt;
Crafting a Plan for When Security Fails&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Lelewski.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071439 Video]&lt;br /&gt;
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Glanville.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082819 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=153992</id>
		<title>Front Range OWASP Conference 2013/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=153992"/>
				<updated>2013-06-17T15:53:52Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
====SnowFROC 2013 schedule====&lt;br /&gt;
This schedule is subject to frequent changes as the conference draws nearer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==CFP Schedule==&lt;br /&gt;
&lt;br /&gt;
Abstract collection will begin January 14th and continue until all speaking slots are filled. Rolling evaluations will occur and selected papers will be announced each Monday beginning on February 11th.&lt;br /&gt;
&lt;br /&gt;
Final presentations of accepted abstracts must be submitted for review by March 17th. Presentations will be delivered during the conference on March 28th.&lt;br /&gt;
&lt;br /&gt;
(See the [[Front_Range_OWASP_Conference_2013#CFP|CFP]] section for additional dates and details.)&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==SnowFROC 2013 Schedule==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:95%; border-collapse:collapse;&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;right&amp;quot;&lt;br /&gt;
 ! style=&amp;quot;width:10%; border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Thu, Mar 28'''&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Technical Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Deep-Dive Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Management Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Legal Track&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-top: 1px solid white;&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 07:00-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Registration and Morning Snacks''' &amp;lt;br&amp;gt; ''Sponsored by [http://www.hpenterprisesecurity.com '''HP''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:00-08:15&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Welcome and Kick-off'''&amp;lt;br&amp;gt; ''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:15-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''State of OWASP'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:30-09:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Keynote Address: Data Protection for the 21st Century'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]], Technical Director for the National Security Agency’s Information Assurance Directorate (IAD)''&amp;lt;br&amp;gt;[https://vimeo.com/68058106 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:30-10:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Kick-off'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech1|'''DevFu: The inner ninja in every application developer''' &amp;lt;br&amp;gt; ''Danny Chrastil'']]&amp;lt;br&amp;gt;[[Media: Chrastil.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082818 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech2|'''SIP Based Cloud Instances''' &amp;lt;br&amp;gt; ''Gregory Disney-Leugers]]''&amp;lt;br&amp;gt;[[Media: Disney-Leugers.odp| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68091563 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt1|'''Digital Bounty Hunters - Decoding Bug Bounty Programs''' &amp;lt;br&amp;gt; ''Jon Rose]]''&amp;lt;br&amp;gt;[[Media: Rose.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68107340 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt2|'''Electronic Discovery for System Administrators''' &amp;lt;br&amp;gt; ''Russell Shumway]]''&amp;lt;br&amp;gt;[[Media: Shumway.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68142345 Video]&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;9&amp;quot; | [[Front_Range_OWASP_Conference_2013/CTF|'''CTF''']] &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:55-11:40&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech1|'''Adventures in Large Scale HTTP Header Abuse''' &amp;lt;br&amp;gt; ''Zachary Wolff]]''&amp;lt;br&amp;gt;[[Media: Wolff.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071431 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech2|'''How Malware Attacks Web Applications''' &amp;lt;br&amp;gt; ''Casey Smith]]''&amp;lt;br&amp;gt;[[Media: Smith.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68107330 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt1|'''Linking Security to Business Value in the Customer Service Industry''' &amp;lt;br&amp;gt; ''Dan Rojas]]''&amp;lt;br&amp;gt;[[Media: Rojas.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68111318 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt2|'''Legal Issues of Forensics in the Cloud''' &amp;lt;br&amp;gt; ''David Willson]]''&amp;lt;br&amp;gt;[[Media: Willson.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082821 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:40-12:40&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:40-13:25&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech1|'''Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;''' &amp;lt;br&amp;gt; ''Aaron Weaver]]''&amp;lt;br&amp;gt;[[Media: Weaver.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68071432 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech2|'''Top Ten Web Application Defenses''' &amp;lt;br&amp;gt; ''Jim Manico]]''&amp;lt;br&amp;gt;[[Media: Manico.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68091564 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt1|'''Using SaaS and the Cloud to Secure the SDLC''' &amp;lt;br&amp;gt; ''Andrew Earle]]''&amp;lt;br&amp;gt;[[Media: Earle.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68111315 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt2|'''CISPA: Why Privacy Advocates Hate This Legislation''' &amp;lt;br&amp;gt; ''Maureen Donohue Feinroth]]''&amp;lt;br&amp;gt;[[Media: Feinroth.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071433 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 13:35-14:20&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech1|'''DevOps and Security: It's Happening. Right Now.''' &amp;lt;br&amp;gt; ''Helen Bravo]]''&amp;lt;br&amp;gt;[[Media: Bravo.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68335259 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech2|'''A Demo of and Preventing XSS in .NET Applications''' &amp;lt;br&amp;gt; ''Larry Conklin]]''&amp;lt;br&amp;gt;[[Media: Conklin.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68069847 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt1|'''Measuring Security Best Practices With OpenSAMM''' &amp;lt;br&amp;gt; ''Alan Jex]]''&amp;lt;br&amp;gt;[[Media: Jex.ppt| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082823 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt2|'''Crafting a Plan for When Security Fails''' &amp;lt;br&amp;gt; ''Robert Lelewski]]''&amp;lt;br&amp;gt;[[Media: Lelewski.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071439 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 14:30-15:15&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech1|'''Real World Cloud Application Security''' &amp;lt;br&amp;gt; ''Jason Chan]]''&amp;lt;br&amp;gt;[[Media: Chan.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082826 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech2|'''Data Mining a Mountain of Zero Day Vulnerabilities''' &amp;lt;br&amp;gt; ''Joe Brady]]''&amp;lt;br&amp;gt;[[Media: Brady.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68107333 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt1|'''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)''' &amp;lt;br&amp;gt; ''Jon McCoy]]''&amp;lt;br&amp;gt;[[Media:McCoy.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071440 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt2|'''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem''' &amp;lt;br&amp;gt; ''Tom Glanville]]''&amp;lt;br&amp;gt;[[Media: Glanville.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082819 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:15-15:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:45-16:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Moderated Panel Discussion''' ''&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Weaver|Aaron Weaver]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Willson|David Willson]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Wilson|Dan Wilson]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]]&lt;br /&gt;
    Moderator: [[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
    [https://vimeo.com/68058105 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 16:45-17:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Closing Statements'''&amp;lt;br&amp;gt;''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 17:00-&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Sponsor Raffles, Drawings, and Contests'''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Wrap-Up'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 19:00-22:00+&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''After-party at [http://denverpoolhall.com/ Tarantula Billiards]''' &amp;lt;br&amp;gt; ''Sponsored by [https://www.appliedtrust.com '''AppliedTrust''']'' &amp;lt;br&amp;gt; ''Tarantula is located 3 blocks from the Marriott at the corner of 15th and Stout (1520 Stout Street, Denver)''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''Awards Ceremony''' ''at [http://denverpoolhall.com/ Tarantula]'' (20:00)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white; border-top: 1px solid black;&amp;quot; | &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white;&amp;quot; colspan=&amp;quot;4&amp;quot; |&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 ! style=&amp;quot;border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Fri, Mar 29'''&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Training&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: A&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: B&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Capture the Flag&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-bottom: 1px solid white;&amp;quot; rowspan=&amp;quot;6&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-9:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Training | '''Training: Secure Coding''' &amp;lt;br&amp;gt; ''Aaron Weaver'']]&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1a}} ''([[Front_Range_OWASP_Conference_2013/boaf1a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1b}} ''([[Front_Range_OWASP_Conference_2013/boaf1b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF VM&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2a}} ''([[Front_Range_OWASP_Conference_2013/boaf2a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2b}} ''([[Front_Range_OWASP_Conference_2013/boaf2b|edit]])''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:45-11:15&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Coffee Break''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:15-12:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3a}} ''([[Front_Range_OWASP_Conference_2013/boaf3a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3b}} ''([[Front_Range_OWASP_Conference_2013/boaf3b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF Scoreboard&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:15-13:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4a}} ''([[Front_Range_OWASP_Conference_2013/boaf4a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4b}} ''([[Front_Range_OWASP_Conference_2013/boaf4b|edit]])''&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=153991</id>
		<title>Front Range OWASP Conference 2013/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=153991"/>
				<updated>2013-06-17T15:52:23Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
====SnowFROC 2013 schedule====&lt;br /&gt;
This schedule is subject to frequent changes as the conference draws nearer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==CFP Schedule==&lt;br /&gt;
&lt;br /&gt;
Abstract collection will begin January 14th and continue until all speaking slots are filled. Rolling evaluations will occur and selected papers will be announced each Monday beginning on February 11th.&lt;br /&gt;
&lt;br /&gt;
Final presentations of accepted abstracts must be submitted for review by March 17th. Presentations will be delivered during the conference on March 28th.&lt;br /&gt;
&lt;br /&gt;
(See the [[Front_Range_OWASP_Conference_2013#CFP|CFP]] section for additional dates and details.)&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==SnowFROC 2013 Schedule==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:95%; border-collapse:collapse;&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;right&amp;quot;&lt;br /&gt;
 ! style=&amp;quot;width:10%; border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Thu, Mar 28'''&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Technical Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Deep-Dive Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Management Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Legal Track&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-top: 1px solid white;&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 07:00-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Registration and Morning Snacks''' &amp;lt;br&amp;gt; ''Sponsored by [http://www.hpenterprisesecurity.com '''HP''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:00-08:15&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Welcome and Kick-off'''&amp;lt;br&amp;gt; ''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:15-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''State of OWASP'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:30-09:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Keynote Address: Data Protection for the 21st Century'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]], Technical Director for the National Security Agency’s Information Assurance Directorate (IAD)''&amp;lt;br&amp;gt;[https://vimeo.com/68058105 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:30-10:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Kick-off'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech1|'''DevFu: The inner ninja in every application developer''' &amp;lt;br&amp;gt; ''Danny Chrastil'']]&amp;lt;br&amp;gt;[[Media: Chrastil.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082818 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech2|'''SIP Based Cloud Instances''' &amp;lt;br&amp;gt; ''Gregory Disney-Leugers]]''&amp;lt;br&amp;gt;[[Media: Disney-Leugers.odp| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68091563 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt1|'''Digital Bounty Hunters - Decoding Bug Bounty Programs''' &amp;lt;br&amp;gt; ''Jon Rose]]''&amp;lt;br&amp;gt;[[Media: Rose.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68107340 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt2|'''Electronic Discovery for System Administrators''' &amp;lt;br&amp;gt; ''Russell Shumway]]''&amp;lt;br&amp;gt;[[Media: Shumway.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68142345 Video]&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;9&amp;quot; | [[Front_Range_OWASP_Conference_2013/CTF|'''CTF''']] &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:55-11:40&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech1|'''Adventures in Large Scale HTTP Header Abuse''' &amp;lt;br&amp;gt; ''Zachary Wolff]]''&amp;lt;br&amp;gt;[[Media: Wolff.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071431 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech2|'''How Malware Attacks Web Applications''' &amp;lt;br&amp;gt; ''Casey Smith]]''&amp;lt;br&amp;gt;[[Media: Smith.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68107330 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt1|'''Linking Security to Business Value in the Customer Service Industry''' &amp;lt;br&amp;gt; ''Dan Rojas]]''&amp;lt;br&amp;gt;[[Media: Rojas.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68111318 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt2|'''Legal Issues of Forensics in the Cloud''' &amp;lt;br&amp;gt; ''David Willson]]''&amp;lt;br&amp;gt;[[Media: Willson.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082821 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:40-12:40&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:40-13:25&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech1|'''Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;''' &amp;lt;br&amp;gt; ''Aaron Weaver]]''&amp;lt;br&amp;gt;[[Media: Weaver.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68071432 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech2|'''Top Ten Web Application Defenses''' &amp;lt;br&amp;gt; ''Jim Manico]]''&amp;lt;br&amp;gt;[[Media: Manico.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68091564 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt1|'''Using SaaS and the Cloud to Secure the SDLC''' &amp;lt;br&amp;gt; ''Andrew Earle]]''&amp;lt;br&amp;gt;[[Media: Earle.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68111315 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt2|'''CISPA: Why Privacy Advocates Hate This Legislation''' &amp;lt;br&amp;gt; ''Maureen Donohue Feinroth]]''&amp;lt;br&amp;gt;[[Media: Feinroth.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071433 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 13:35-14:20&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech1|'''DevOps and Security: It's Happening. Right Now.''' &amp;lt;br&amp;gt; ''Helen Bravo]]''&amp;lt;br&amp;gt;[[Media: Bravo.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68335259 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech2|'''A Demo of and Preventing XSS in .NET Applications''' &amp;lt;br&amp;gt; ''Larry Conklin]]''&amp;lt;br&amp;gt;[[Media: Conklin.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68069847 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt1|'''Measuring Security Best Practices With OpenSAMM''' &amp;lt;br&amp;gt; ''Alan Jex]]''&amp;lt;br&amp;gt;[[Media: Jex.ppt| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082823 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt2|'''Crafting a Plan for When Security Fails''' &amp;lt;br&amp;gt; ''Robert Lelewski]]''&amp;lt;br&amp;gt;[[Media: Lelewski.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071439 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 14:30-15:15&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech1|'''Real World Cloud Application Security''' &amp;lt;br&amp;gt; ''Jason Chan]]''&amp;lt;br&amp;gt;[[Media: Chan.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082826 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech2|'''Data Mining a Mountain of Zero Day Vulnerabilities''' &amp;lt;br&amp;gt; ''Joe Brady]]''&amp;lt;br&amp;gt;[[Media: Brady.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68107333 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt1|'''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)''' &amp;lt;br&amp;gt; ''Jon McCoy]]''&amp;lt;br&amp;gt;[[Media:McCoy.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071440 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt2|'''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem''' &amp;lt;br&amp;gt; ''Tom Glanville]]''&amp;lt;br&amp;gt;[[Media: Glanville.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082819 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:15-15:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:45-16:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Moderated Panel Discussion''' ''&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Weaver|Aaron Weaver]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Willson|David Willson]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Wilson|Dan Wilson]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]]&lt;br /&gt;
    Moderator: [[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
    [https://vimeo.com/68058105 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 16:45-17:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Closing Statements'''&amp;lt;br&amp;gt;''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 17:00-&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Sponsor Raffles, Drawings, and Contests'''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Wrap-Up'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 19:00-22:00+&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''After-party at [http://denverpoolhall.com/ Tarantula Billiards]''' &amp;lt;br&amp;gt; ''Sponsored by [https://www.appliedtrust.com '''AppliedTrust''']'' &amp;lt;br&amp;gt; ''Tarantula is located 3 blocks from the Marriott at the corner of 15th and Stout (1520 Stout Street, Denver)''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''Awards Ceremony''' ''at [http://denverpoolhall.com/ Tarantula]'' (20:00)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white; border-top: 1px solid black;&amp;quot; | &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white;&amp;quot; colspan=&amp;quot;4&amp;quot; |&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 ! style=&amp;quot;border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Fri, Mar 29'''&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Training&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: A&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: B&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Capture the Flag&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-bottom: 1px solid white;&amp;quot; rowspan=&amp;quot;6&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-9:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Training | '''Training: Secure Coding''' &amp;lt;br&amp;gt; ''Aaron Weaver'']]&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1a}} ''([[Front_Range_OWASP_Conference_2013/boaf1a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1b}} ''([[Front_Range_OWASP_Conference_2013/boaf1b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF VM&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2a}} ''([[Front_Range_OWASP_Conference_2013/boaf2a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2b}} ''([[Front_Range_OWASP_Conference_2013/boaf2b|edit]])''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:45-11:15&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Coffee Break''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:15-12:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3a}} ''([[Front_Range_OWASP_Conference_2013/boaf3a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3b}} ''([[Front_Range_OWASP_Conference_2013/boaf3b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF Scoreboard&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:15-13:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4a}} ''([[Front_Range_OWASP_Conference_2013/boaf4a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4b}} ''([[Front_Range_OWASP_Conference_2013/boaf4b|edit]])''&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/DevOps&amp;diff=153990</id>
		<title>Front Range OWASP Conference 2013/Presentations/DevOps</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/DevOps&amp;diff=153990"/>
				<updated>2013-06-17T15:51:04Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===DevOps and Security: It's Happening. Right Now.===&lt;br /&gt;
&lt;br /&gt;
How do you integrate security within a Continuous Deployment (CD) environment - where every 5 minutes a feature, an enhancement, or a bug fix needs to be released? Traditional application security tools which require lengthy periods of configuration, tuning and application learning have become irrelevant in these fast-pace environments. Yet, falling back only on the secure coding practices of the developer cannot be tolerated.&lt;br /&gt;
&lt;br /&gt;
Secure coding requires a new approach where security tools become part of the development environment – and eliminate any unnecessary code analysis overhead. By collaborating with development teams, understanding their needs and requirements, you can pave the way to a secure deployment in minutes. Steps include:&lt;br /&gt;
&lt;br /&gt;
* Re-evaluate existing security tools and consider their integration within a CD environment&lt;br /&gt;
* Deliver a secured development framework and enforce its usage&lt;br /&gt;
* Pinpoint precise security code flaws and provide optimal fix recommendations&lt;br /&gt;
&lt;br /&gt;
[[Media:Bravo.pptx | Slides]]&lt;br /&gt;
[https://vimeo.com/68335259 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=153430</id>
		<title>Front Range OWASP Conference 2013/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=153430"/>
				<updated>2013-06-11T17:54:28Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
====SnowFROC 2013 schedule====&lt;br /&gt;
This schedule is subject to frequent changes as the conference draws nearer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==CFP Schedule==&lt;br /&gt;
&lt;br /&gt;
Abstract collection will begin January 14th and continue until all speaking slots are filled. Rolling evaluations will occur and selected papers will be announced each Monday beginning on February 11th.&lt;br /&gt;
&lt;br /&gt;
Final presentations of accepted abstracts must be submitted for review by March 17th. Presentations will be delivered during the conference on March 28th.&lt;br /&gt;
&lt;br /&gt;
(See the [[Front_Range_OWASP_Conference_2013#CFP|CFP]] section for additional dates and details.)&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==SnowFROC 2013 Schedule==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:95%; border-collapse:collapse;&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;right&amp;quot;&lt;br /&gt;
 ! style=&amp;quot;width:10%; border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Thu, Mar 28'''&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Technical Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Deep-Dive Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Management Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Legal Track&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-top: 1px solid white;&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 07:00-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Registration and Morning Snacks''' &amp;lt;br&amp;gt; ''Sponsored by [http://www.hpenterprisesecurity.com '''HP''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:00-08:15&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Welcome and Kick-off'''&amp;lt;br&amp;gt; ''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:15-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''State of OWASP'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:30-09:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Keynote Address: Data Protection for the 21st Century'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]], Technical Director for the National Security Agency’s Information Assurance Directorate (IAD)''&amp;lt;br&amp;gt;[https://vimeo.com/68058105 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:30-10:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Kick-off'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech1|'''DevFu: The inner ninja in every application developer''' &amp;lt;br&amp;gt; ''Danny Chrastil'']]&amp;lt;br&amp;gt;[[Media: Chrastil.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082818 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech2|'''SIP Based Cloud Instances''' &amp;lt;br&amp;gt; ''Gregory Disney-Leugers]]''&amp;lt;br&amp;gt;[[Media: Disney-Leugers.odp| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68091563 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt1|'''Digital Bounty Hunters - Decoding Bug Bounty Programs''' &amp;lt;br&amp;gt; ''Jon Rose]]''&amp;lt;br&amp;gt;[[Media: Rose.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68107340 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt2|'''Electronic Discovery for System Administrators''' &amp;lt;br&amp;gt; ''Russell Shumway]]''&amp;lt;br&amp;gt;[[Media: Shumway.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68142345 Video]&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;9&amp;quot; | [[Front_Range_OWASP_Conference_2013/CTF|'''CTF''']] &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:55-11:40&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech1|'''Adventures in Large Scale HTTP Header Abuse''' &amp;lt;br&amp;gt; ''Zachary Wolff]]''&amp;lt;br&amp;gt;[[Media: Wolff.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071431 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech2|'''How Malware Attacks Web Applications''' &amp;lt;br&amp;gt; ''Casey Smith]]''&amp;lt;br&amp;gt;[[Media: Smith.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68107330 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt1|'''Linking Security to Business Value in the Customer Service Industry''' &amp;lt;br&amp;gt; ''Dan Rojas]]''&amp;lt;br&amp;gt;[[Media: Rojas.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68111318 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt2|'''Legal Issues of Forensics in the Cloud''' &amp;lt;br&amp;gt; ''David Willson]]''&amp;lt;br&amp;gt;[[Media: Willson.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082821 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:40-12:40&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:40-13:25&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech1|'''Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;''' &amp;lt;br&amp;gt; ''Aaron Weaver]]''&amp;lt;br&amp;gt;[[Media: Weaver.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68071432 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech2|'''Top Ten Web Application Defenses''' &amp;lt;br&amp;gt; ''Jim Manico]]''&amp;lt;br&amp;gt;[[Media: Manico.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68091564 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt1|'''Using SaaS and the Cloud to Secure the SDLC''' &amp;lt;br&amp;gt; ''Andrew Earle]]''&amp;lt;br&amp;gt;[[Media: Earle.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68111315 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt2|'''CISPA: Why Privacy Advocates Hate This Legislation''' &amp;lt;br&amp;gt; ''Maureen Donohue Feinroth]]''&amp;lt;br&amp;gt;[[Media: Feinroth.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071433 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 13:35-14:20&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech1|'''DevOps and Security: It's Happening. Right Now.''' &amp;lt;br&amp;gt; ''Helen Bravo]]''&amp;lt;br&amp;gt;[[Media: Bravo.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech2|'''A Demo of and Preventing XSS in .NET Applications''' &amp;lt;br&amp;gt; ''Larry Conklin]]''&amp;lt;br&amp;gt;[[Media: Conklin.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68069847 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt1|'''Measuring Security Best Practices With OpenSAMM''' &amp;lt;br&amp;gt; ''Alan Jex]]''&amp;lt;br&amp;gt;[[Media: Jex.ppt| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082823 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt2|'''Crafting a Plan for When Security Fails''' &amp;lt;br&amp;gt; ''Robert Lelewski]]''&amp;lt;br&amp;gt;[[Media: Lelewski.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071439 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 14:30-15:15&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech1|'''Real World Cloud Application Security''' &amp;lt;br&amp;gt; ''Jason Chan]]''&amp;lt;br&amp;gt;[[Media: Chan.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082826 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech2|'''Data Mining a Mountain of Zero Day Vulnerabilities''' &amp;lt;br&amp;gt; ''Joe Brady]]''&amp;lt;br&amp;gt;[[Media: Brady.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68107333 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt1|'''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)''' &amp;lt;br&amp;gt; ''Jon McCoy]]''&amp;lt;br&amp;gt;[[Media:McCoy.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071440 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt2|'''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem''' &amp;lt;br&amp;gt; ''Tom Glanville]]''&amp;lt;br&amp;gt;[[Media: Glanville.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082819 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:15-15:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:45-16:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Moderated Panel Discussion''' ''&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Weaver|Aaron Weaver]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Willson|David Willson]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Wilson|Dan Wilson]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]]&lt;br /&gt;
    Moderator: [[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
    [https://vimeo.com/68058105 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 16:45-17:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Closing Statements'''&amp;lt;br&amp;gt;''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 17:00-&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Sponsor Raffles, Drawings, and Contests'''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Wrap-Up'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 19:00-22:00+&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''After-party at [http://denverpoolhall.com/ Tarantula Billiards]''' &amp;lt;br&amp;gt; ''Sponsored by [https://www.appliedtrust.com '''AppliedTrust''']'' &amp;lt;br&amp;gt; ''Tarantula is located 3 blocks from the Marriott at the corner of 15th and Stout (1520 Stout Street, Denver)''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''Awards Ceremony''' ''at [http://denverpoolhall.com/ Tarantula]'' (20:00)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white; border-top: 1px solid black;&amp;quot; | &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white;&amp;quot; colspan=&amp;quot;4&amp;quot; |&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 ! style=&amp;quot;border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Fri, Mar 29'''&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Training&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: A&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: B&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Capture the Flag&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-bottom: 1px solid white;&amp;quot; rowspan=&amp;quot;6&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-9:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Training | '''Training: Secure Coding''' &amp;lt;br&amp;gt; ''Aaron Weaver'']]&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1a}} ''([[Front_Range_OWASP_Conference_2013/boaf1a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1b}} ''([[Front_Range_OWASP_Conference_2013/boaf1b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF VM&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2a}} ''([[Front_Range_OWASP_Conference_2013/boaf2a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2b}} ''([[Front_Range_OWASP_Conference_2013/boaf2b|edit]])''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:45-11:15&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Coffee Break''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:15-12:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3a}} ''([[Front_Range_OWASP_Conference_2013/boaf3a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3b}} ''([[Front_Range_OWASP_Conference_2013/boaf3b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF Scoreboard&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:15-13:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4a}} ''([[Front_Range_OWASP_Conference_2013/boaf4a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4b}} ''([[Front_Range_OWASP_Conference_2013/boaf4b|edit]])''&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=153429</id>
		<title>Front Range OWASP Conference 2013/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=153429"/>
				<updated>2013-06-11T17:54:03Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
====SnowFROC 2013 schedule====&lt;br /&gt;
This schedule is subject to frequent changes as the conference draws nearer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==CFP Schedule==&lt;br /&gt;
&lt;br /&gt;
Abstract collection will begin January 14th and continue until all speaking slots are filled. Rolling evaluations will occur and selected papers will be announced each Monday beginning on February 11th.&lt;br /&gt;
&lt;br /&gt;
Final presentations of accepted abstracts must be submitted for review by March 17th. Presentations will be delivered during the conference on March 28th.&lt;br /&gt;
&lt;br /&gt;
(See the [[Front_Range_OWASP_Conference_2013#CFP|CFP]] section for additional dates and details.)&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==SnowFROC 2013 Schedule==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:95%; border-collapse:collapse;&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;right&amp;quot;&lt;br /&gt;
 ! style=&amp;quot;width:10%; border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Thu, Mar 28'''&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Technical Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Deep-Dive Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Management Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Legal Track&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-top: 1px solid white;&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 07:00-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Registration and Morning Snacks''' &amp;lt;br&amp;gt; ''Sponsored by [http://www.hpenterprisesecurity.com '''HP''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:00-08:15&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Welcome and Kick-off'''&amp;lt;br&amp;gt; ''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:15-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''State of OWASP'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:30-09:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Keynote Address: Data Protection for the 21st Century'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]], Technical Director for the National Security Agency’s Information Assurance Directorate (IAD)''&amp;lt;br&amp;gt;[https://vimeo.com/68058105 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:30-10:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Kick-off'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech1|'''DevFu: The inner ninja in every application developer''' &amp;lt;br&amp;gt; ''Danny Chrastil'']]&amp;lt;br&amp;gt;[[Media: Chrastil.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082818 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech2|'''SIP Based Cloud Instances''' &amp;lt;br&amp;gt; ''Gregory Disney-Leugers]]''&amp;lt;br&amp;gt;[[Media: Disney-Leugers.odp| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68091563 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt1|'''Digital Bounty Hunters - Decoding Bug Bounty Programs''' &amp;lt;br&amp;gt; ''Jon Rose]]''&amp;lt;br&amp;gt;[[Media: Rose.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68107340 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt2|'''Electronic Discovery for System Administrators''' &amp;lt;br&amp;gt; ''Russell Shumway]]''&amp;lt;br&amp;gt;[[Media: Shumway.pptx| Slides ]]&amp;lt;&amp;gt;[https://vimeo.com/68142345 Video]&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;9&amp;quot; | [[Front_Range_OWASP_Conference_2013/CTF|'''CTF''']] &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:55-11:40&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech1|'''Adventures in Large Scale HTTP Header Abuse''' &amp;lt;br&amp;gt; ''Zachary Wolff]]''&amp;lt;br&amp;gt;[[Media: Wolff.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071431 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech2|'''How Malware Attacks Web Applications''' &amp;lt;br&amp;gt; ''Casey Smith]]''&amp;lt;br&amp;gt;[[Media: Smith.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68107330 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt1|'''Linking Security to Business Value in the Customer Service Industry''' &amp;lt;br&amp;gt; ''Dan Rojas]]''&amp;lt;br&amp;gt;[[Media: Rojas.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68111318 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt2|'''Legal Issues of Forensics in the Cloud''' &amp;lt;br&amp;gt; ''David Willson]]''&amp;lt;br&amp;gt;[[Media: Willson.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082821 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:40-12:40&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:40-13:25&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech1|'''Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;''' &amp;lt;br&amp;gt; ''Aaron Weaver]]''&amp;lt;br&amp;gt;[[Media: Weaver.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68071432 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech2|'''Top Ten Web Application Defenses''' &amp;lt;br&amp;gt; ''Jim Manico]]''&amp;lt;br&amp;gt;[[Media: Manico.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68091564 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt1|'''Using SaaS and the Cloud to Secure the SDLC''' &amp;lt;br&amp;gt; ''Andrew Earle]]''&amp;lt;br&amp;gt;[[Media: Earle.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68111315 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt2|'''CISPA: Why Privacy Advocates Hate This Legislation''' &amp;lt;br&amp;gt; ''Maureen Donohue Feinroth]]''&amp;lt;br&amp;gt;[[Media: Feinroth.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071433 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 13:35-14:20&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech1|'''DevOps and Security: It's Happening. Right Now.''' &amp;lt;br&amp;gt; ''Helen Bravo]]''&amp;lt;br&amp;gt;[[Media: Bravo.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech2|'''A Demo of and Preventing XSS in .NET Applications''' &amp;lt;br&amp;gt; ''Larry Conklin]]''&amp;lt;br&amp;gt;[[Media: Conklin.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68069847 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt1|'''Measuring Security Best Practices With OpenSAMM''' &amp;lt;br&amp;gt; ''Alan Jex]]''&amp;lt;br&amp;gt;[[Media: Jex.ppt| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082823 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt2|'''Crafting a Plan for When Security Fails''' &amp;lt;br&amp;gt; ''Robert Lelewski]]''&amp;lt;br&amp;gt;[[Media: Lelewski.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071439 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 14:30-15:15&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech1|'''Real World Cloud Application Security''' &amp;lt;br&amp;gt; ''Jason Chan]]''&amp;lt;br&amp;gt;[[Media: Chan.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082826 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech2|'''Data Mining a Mountain of Zero Day Vulnerabilities''' &amp;lt;br&amp;gt; ''Joe Brady]]''&amp;lt;br&amp;gt;[[Media: Brady.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68107333 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt1|'''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)''' &amp;lt;br&amp;gt; ''Jon McCoy]]''&amp;lt;br&amp;gt;[[Media:McCoy.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071440 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt2|'''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem''' &amp;lt;br&amp;gt; ''Tom Glanville]]''&amp;lt;br&amp;gt;[[Media: Glanville.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082819 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:15-15:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:45-16:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Moderated Panel Discussion''' ''&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Weaver|Aaron Weaver]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Willson|David Willson]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Wilson|Dan Wilson]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]]&lt;br /&gt;
    Moderator: [[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
    [https://vimeo.com/68058105 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 16:45-17:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Closing Statements'''&amp;lt;br&amp;gt;''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 17:00-&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Sponsor Raffles, Drawings, and Contests'''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Wrap-Up'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 19:00-22:00+&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''After-party at [http://denverpoolhall.com/ Tarantula Billiards]''' &amp;lt;br&amp;gt; ''Sponsored by [https://www.appliedtrust.com '''AppliedTrust''']'' &amp;lt;br&amp;gt; ''Tarantula is located 3 blocks from the Marriott at the corner of 15th and Stout (1520 Stout Street, Denver)''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''Awards Ceremony''' ''at [http://denverpoolhall.com/ Tarantula]'' (20:00)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white; border-top: 1px solid black;&amp;quot; | &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white;&amp;quot; colspan=&amp;quot;4&amp;quot; |&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 ! style=&amp;quot;border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Fri, Mar 29'''&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Training&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: A&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: B&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Capture the Flag&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-bottom: 1px solid white;&amp;quot; rowspan=&amp;quot;6&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-9:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Training | '''Training: Secure Coding''' &amp;lt;br&amp;gt; ''Aaron Weaver'']]&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1a}} ''([[Front_Range_OWASP_Conference_2013/boaf1a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1b}} ''([[Front_Range_OWASP_Conference_2013/boaf1b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF VM&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2a}} ''([[Front_Range_OWASP_Conference_2013/boaf2a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2b}} ''([[Front_Range_OWASP_Conference_2013/boaf2b|edit]])''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:45-11:15&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Coffee Break''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:15-12:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3a}} ''([[Front_Range_OWASP_Conference_2013/boaf3a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3b}} ''([[Front_Range_OWASP_Conference_2013/boaf3b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF Scoreboard&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:15-13:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4a}} ''([[Front_Range_OWASP_Conference_2013/boaf4a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4b}} ''([[Front_Range_OWASP_Conference_2013/boaf4b|edit]])''&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=153428</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=153428"/>
				<updated>2013-06-11T17:53:43Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
[https://vimeo.com/68058106 Keynote Address: Data Protection for the 21st Century]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://vimeo.com/68058105 Panel Discussion]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Technical Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
DevFu: The inner ninja in every application developer  &lt;br /&gt;
*[[Media:Chrastil.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082818 Video]&lt;br /&gt;
Adventures in Large Scale HTTP Header Abuse&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Wolff.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071431 Video]&lt;br /&gt;
Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Weaver.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071432 Video]&lt;br /&gt;
DevOps and Security: It's Happening. Right Now.&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Bravo.pptx | Slides]]&lt;br /&gt;
Real World Cloud Application Security&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Chan.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082826 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Deep-Dive Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
SIP Based Cloud Instances&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Disney-Leugers.odp | Slides]]&lt;br /&gt;
*[https://vimeo.com/68091563 Video]&lt;br /&gt;
How Malware Attacks Web Applications&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Smith.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68107330 Video]&lt;br /&gt;
Top Ten Web Application Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Manico.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68091564 Video]&lt;br /&gt;
A Demo of and Preventing XSS in .NET Applications&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Conklin.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68069847 Video]&lt;br /&gt;
Data Mining a Mountain of Zero-Day Vulnerabilities&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Brady.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68107333 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Management Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
Digital Bounty Hunters - Decoding Bug Bounty Programs&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Rose.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68107340 Video]&lt;br /&gt;
Linking Security to Business Value in the Customer Service Industry&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Rojas.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68111318 Video]&lt;br /&gt;
Using SaaS and the Cloud to Secure the SDLC&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Earle.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68111315 Video]&lt;br /&gt;
Measuring Security Best Practices With Open SAMM&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Jex.ppt | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082823 Video]&lt;br /&gt;
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:McCoy.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071440 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Legal Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
Electronic Discovery for System Administrators&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Shumway.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68142345 Video]&lt;br /&gt;
Legal Issues of Forensics in the Cloud&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Willson.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082821 Video]&lt;br /&gt;
CISPA: Why Privacy Advocates Hate This Legislation&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Feinroth.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071433 Video]&lt;br /&gt;
Crafting a Plan for When Security Fails&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Lelewski.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071439 Video]&lt;br /&gt;
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Glanville.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082819 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/eDiscovery&amp;diff=153427</id>
		<title>Front Range OWASP Conference 2013/Presentations/eDiscovery</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/eDiscovery&amp;diff=153427"/>
				<updated>2013-06-11T17:50:57Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Electronic Discovery for System Administrators===&lt;br /&gt;
&lt;br /&gt;
As the Federal Rules of Evidence have evolved over the last several years, and as the volume of information in digital format has overtaken traditional printed media, electronic discovery had become more important than traditional paper-based discovery in litigation. While vendors can help with production, system administrators play a key role in the acquisition and production of Electronically Stored Information (ESI).&lt;br /&gt;
&lt;br /&gt;
This presentation is designed to present an overview of the discovery process, explain how it differs from traditional computer forensics, and offer tips for administrators and managers to better assist in the production of ESI in the event of litigation (and hopefully to reduce the costs associated with production).&lt;br /&gt;
&lt;br /&gt;
[[Media:Shumway.pptx | Slides]]&lt;br /&gt;
[https://vimeo.com/68142345 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/ZeroDays&amp;diff=153426</id>
		<title>Front Range OWASP Conference 2013/Presentations/ZeroDays</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/ZeroDays&amp;diff=153426"/>
				<updated>2013-06-11T17:50:26Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Data Mining a Mountain of Zero Day Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. This presentation evaluates an anonymized vulnerability data set derived from static binary analysis on thousands of applications belonging to large enterprises, commercial software vendors, open source projects, and software outsourcers.&lt;br /&gt;
&lt;br /&gt;
By mining this data we can answer some interesting questions. What types of mistakes do developers make most often? Are we making any progress at eradicating XSS and SQL injection? How long does it really take to remediate software vulnerabilities? How secure are third party software components?&lt;br /&gt;
&lt;br /&gt;
The discussion will answer these questions and many others, giving you a deep dive into metrics not found anywhere else.&lt;br /&gt;
&lt;br /&gt;
[[Media:Brady.pdf | Slides]]&lt;br /&gt;
[https://vimeo.com/68107333 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/XSSdotNET&amp;diff=153425</id>
		<title>Front Range OWASP Conference 2013/Presentations/XSSdotNET</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/XSSdotNET&amp;diff=153425"/>
				<updated>2013-06-11T17:50:07Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===A Demo of and Preventing XSS in .NET Applications===&lt;br /&gt;
&lt;br /&gt;
This presentation will cover a variety of approaches toward discovering XSS vulnerabilities in .NET applications, including:&lt;br /&gt;
* Microsoft's Web Protection Library/AntiXSS&lt;br /&gt;
* OWASP's AntiSamy.NET project&lt;br /&gt;
* CAT.Net&lt;br /&gt;
&lt;br /&gt;
[[Media:Conklin.pptx | Slides]]&lt;br /&gt;
[https://vimeo.com/68069847 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/TopTen&amp;diff=153424</id>
		<title>Front Range OWASP Conference 2013/Presentations/TopTen</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/TopTen&amp;diff=153424"/>
				<updated>2013-06-11T17:49:47Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Top Ten Web Application Defenses===&lt;br /&gt;
&lt;br /&gt;
We cannot 'firewall' or 'patch' our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day.&lt;br /&gt;
&lt;br /&gt;
Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently.&lt;br /&gt;
&lt;br /&gt;
This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
[[Media:Manico.pdf | Slides]]&lt;br /&gt;
[https://vimeo.com/68091564 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/SaaS&amp;diff=153423</id>
		<title>Front Range OWASP Conference 2013/Presentations/SaaS</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/SaaS&amp;diff=153423"/>
				<updated>2013-06-11T17:49:22Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Using SaaS and the Cloud to Secure the SDLC===&lt;br /&gt;
&lt;br /&gt;
This session will cover Software as a Service (SaaS) offerings and how they can be effectively utilized in web security development efforts. Over the last few years, cloud services (i.e. SaaS) have been increasingly used as both a starting point for application security efforts and as a full outsourcing of the appsec program. However, by the very nature of cloud outsourcing and delivery, it is difficult to evolve this approach into a mature secure development lifecycle. Developer involvement is a necessity, and the solution has been to bring vulnerability assessment technologies in house. But recently, organizations have started to deploy a mixture of on-premise and cloud appsec solutions as an alternative to the all or nothing paradigm of on-premise or SaaS.&lt;br /&gt;
&lt;br /&gt;
Topics covered include:&lt;br /&gt;
* Overview of vulnerability assessment using SaaS&lt;br /&gt;
* Overview of on-premise vulnerability scanning in the SDLC&lt;br /&gt;
* Challenges of on-premise and SaaS implementations&lt;br /&gt;
* Private cloud variations of on-premise and SaaS offerings&lt;br /&gt;
* Hybrid on-premise/cloud implementations in the SDLC&lt;br /&gt;
* Use of automation and integration with development infrastructure to ease developer adoption of on-premise/cloud appsec implementations&lt;br /&gt;
* How organizations can use SaaS to get started with application security and mature into a robust software security assurance program featuring on-premise and cloud deployments.&lt;br /&gt;
&lt;br /&gt;
[[Media:Earle.pptx | Slides]]&lt;br /&gt;
[https://vimeo.com/68111315 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/SIP&amp;diff=153422</id>
		<title>Front Range OWASP Conference 2013/Presentations/SIP</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/SIP&amp;diff=153422"/>
				<updated>2013-06-11T17:48:57Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===SIP-Based Cloud Instances===&lt;br /&gt;
&lt;br /&gt;
This presentation will demonstrate the practical applications of SIP protocol for local cloud instances and how to create secure connections the cloud using SIP forwarding. Further it will present methods of securing cloud and data by using a Linux firmware router to host local based cloud domains, as well as showing secure methods of deploying these systems. In addition, the talk will show secure methods of using PHP and databases using Sqlite and MongoDB while using distributing computing between a Linux server and a Linux based firmware network appliance.&lt;br /&gt;
&lt;br /&gt;
Several practical applications presented will include:&lt;br /&gt;
* Using Cloud-based SIP as replacement for Samba for file sharing in a corporate environment with S3 and WebDAV&lt;br /&gt;
* Creating a local domain such https://cloud.router.sip.com&lt;br /&gt;
* Connecting to the cloud from a mobile phone using SIP forwarding with SSL tunneling&lt;br /&gt;
* Using SIP based domains on VPNs to create a private clouds with a single point of access&lt;br /&gt;
&lt;br /&gt;
There will be a demonstration on how to properly setup a Linux server to host local based domains for secure deployment, including proper deployment of Cherokee and Apache web servers for hosting SIP domains. Finally, the presentation will demonstrate properly configuration of SIP domains to the Linux based firmware network appliance.&lt;br /&gt;
&lt;br /&gt;
At the end of the presentation a viewer will know how to properly deploy Linux server for SIP domain hosting and how to create secure cloud instances with SIP.&lt;br /&gt;
&lt;br /&gt;
[[Media:Disney-Leugers.odp | Slides]]&lt;br /&gt;
[https://vimeo.com/68091563 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/OpenSAMM&amp;diff=153421</id>
		<title>Front Range OWASP Conference 2013/Presentations/OpenSAMM</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/OpenSAMM&amp;diff=153421"/>
				<updated>2013-06-11T17:47:40Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Measuring Security Best Practices With OpenSAMM===&lt;br /&gt;
&lt;br /&gt;
Security is becoming a competitive advantage in the marketplace. How do we ensure that security is built into products for our customers?&lt;br /&gt;
&lt;br /&gt;
Security vulnerabilities can be introduced at any phase of the software development life cycle (SDLC). The [http://www.opensamm.org/ Open Software Assurance Maturity Model (OpenSAMM)] is lightweight, flexible framework that helps prevent vulnerabilities and improve security during software development.&lt;br /&gt;
&lt;br /&gt;
This talk advocates adopting OpenSAMM to measure security best practices and improve our security processes, tools, and knowledge.&lt;br /&gt;
&lt;br /&gt;
[[Media:Jex.ppt | Slides]]&lt;br /&gt;
[https://vimeo.com/68082823 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/Malware&amp;diff=153420</id>
		<title>Front Range OWASP Conference 2013/Presentations/Malware</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/Malware&amp;diff=153420"/>
				<updated>2013-06-11T17:47:06Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===How Malware Attacks Web Applications===&lt;br /&gt;
&lt;br /&gt;
Modern malware has outpaced the ability for traditional defenses to detect and contain the threats. The core of the presentation will address several techniques used by malware to attack web applications, including:&lt;br /&gt;
&lt;br /&gt;
* WebInjects (aka Man-in-the-Browser)&amp;lt;br&amp;gt;Files that contain JavaScript and HTML in order to alter the user experience in the application.&lt;br /&gt;
* Form-Grabbing&amp;lt;br&amp;gt;The technique for capturing web form data within browsers.&lt;br /&gt;
* Session Hijacking&amp;lt;br&amp;gt;The ability to redirect control of a session to an attacker.&lt;br /&gt;
* Persistence and Stealth&amp;lt;br&amp;gt;How does the malware go undetected, for so long?&lt;br /&gt;
* Countermeasures&amp;lt;br&amp;gt;How to detect malware interacting with your web applications.&lt;br /&gt;
&lt;br /&gt;
[[Media:Smith.pdf | Slides]]&lt;br /&gt;
[https://vimeo.com/68107330 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/InfoEcosystem&amp;diff=153419</id>
		<title>Front Range OWASP Conference 2013/Presentations/InfoEcosystem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/InfoEcosystem&amp;diff=153419"/>
				<updated>2013-06-11T17:46:32Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem===&lt;br /&gt;
&lt;br /&gt;
Given an overview of Identity Theft, fraud and information exposure participants will discover that the liability of these issues is much broader than they are prepared to manage.&lt;br /&gt;
&lt;br /&gt;
Given case studies and stories from field experience, participants will identify gaps in information compliance policies and practices that place every organization at risk beyond areas of commerce, compliance, and technology.&lt;br /&gt;
&lt;br /&gt;
Upon completion of the session participants will recognize critical gaps in their information ecosystem that need to be addressed in order to create a defensible position in the case of a breach.&lt;br /&gt;
&lt;br /&gt;
[[Media:Glanville.pptx | Slides]]&lt;br /&gt;
[https://vimeo.com/68082819 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/Headers&amp;diff=153418</id>
		<title>Front Range OWASP Conference 2013/Presentations/Headers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/Headers&amp;diff=153418"/>
				<updated>2013-06-11T17:46:06Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Adventures in Large Scale HTTP Header Abuse===&lt;br /&gt;
&lt;br /&gt;
While the technique of sending malicious data through HTTP Header fields is not new, there is a conspicuous lack of information on the topic.&lt;br /&gt;
&lt;br /&gt;
This presentation explores research and testing results of random auditing of 1.6 million websites. The speaker will address the history of HTTP Header attacks, the logic that went into the creation of an HTTP Header Audit tool, and the most interestingly the findings of the test run.&lt;br /&gt;
&lt;br /&gt;
How many vulnerable websites were discovered? What attacks were they most susceptible to? Which Header fields are most likely to be vulnerable?&lt;br /&gt;
&lt;br /&gt;
Finally, the presentation will discuss defensive techniques around HTTP header abuse and how to efficiently audit a sites HTTP Header fields for vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[Media:Wolff.pptx | Slides]]&lt;br /&gt;
[https://vimeo.com/68071431 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/DevOps&amp;diff=153417</id>
		<title>Front Range OWASP Conference 2013/Presentations/DevOps</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/DevOps&amp;diff=153417"/>
				<updated>2013-06-11T17:45:44Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===DevOps and Security: It's Happening. Right Now.===&lt;br /&gt;
&lt;br /&gt;
How do you integrate security within a Continuous Deployment (CD) environment - where every 5 minutes a feature, an enhancement, or a bug fix needs to be released? Traditional application security tools which require lengthy periods of configuration, tuning and application learning have become irrelevant in these fast-pace environments. Yet, falling back only on the secure coding practices of the developer cannot be tolerated.&lt;br /&gt;
&lt;br /&gt;
Secure coding requires a new approach where security tools become part of the development environment – and eliminate any unnecessary code analysis overhead. By collaborating with development teams, understanding their needs and requirements, you can pave the way to a secure deployment in minutes. Steps include:&lt;br /&gt;
&lt;br /&gt;
* Re-evaluate existing security tools and consider their integration within a CD environment&lt;br /&gt;
* Deliver a secured development framework and enforce its usage&lt;br /&gt;
* Pinpoint precise security code flaws and provide optimal fix recommendations&lt;br /&gt;
&lt;br /&gt;
[[Media:Bravo.pptx | Slides]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/DevFu&amp;diff=153416</id>
		<title>Front Range OWASP Conference 2013/Presentations/DevFu</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/DevFu&amp;diff=153416"/>
				<updated>2013-06-11T17:43:54Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===DevFu: The inner ninja in every application developer===&lt;br /&gt;
&lt;br /&gt;
Many times we try to draw a distinct line between developers and penetration testers. This creates a barrier that developers often feel intimidated to cross. The truth is that developers have an innate ability and perspective to become great penetration testers themselves.&lt;br /&gt;
&lt;br /&gt;
Developers in the security industry carry a unique toolset as ethical hackers / security consultants that sets them apart from traditional penetration testers. By incorporating these skills as developers and combining them with the understanding and experience of building applications, developers can take web application penetration testing a step further than the rest.&lt;br /&gt;
&lt;br /&gt;
This presentation will go over the various aspects to the developer DevFu toolbox including: deep programming knowledge, ability to write scripts on the fly, common shortcuts and their pitfalls, speaking the language, and secure coding practices. We will go over specific examples of scripts that increase productivity and extend functionality of existing pen testing programs.&lt;br /&gt;
&lt;br /&gt;
[[Media:Chrastil.pptx | Slides]]&lt;br /&gt;
[https://vimeo.com/68082818 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/DesktopAppSec&amp;diff=153415</id>
		<title>Front Range OWASP Conference 2013/Presentations/DesktopAppSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/DesktopAppSec&amp;diff=153415"/>
				<updated>2013-06-11T17:43:27Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)===&lt;br /&gt;
&lt;br /&gt;
This presentation is on the case study(s) of desktop applications undergoing a cracking/hacking/attacking life cycle. This is the summation of multiple software projects undergoing attacks from a detected and focused attacker. This presentation follows a Product Owner(s) and Coder(s) going from a self directed response.&lt;br /&gt;
&lt;br /&gt;
Your software project has been going for years, your client base is growing, your making deadlines then one day some e-mail shows up and your world starts to crumble. Crack after Crack keeps coming out every version; Your new Upgrades/Code keep showing up in a competing product; Malware keeps hitting your clients. See the steps taken by day-to-day product Owner(s) and Coder(s) as they respond to security events that never crossed their minds as potential threats.&lt;br /&gt;
&lt;br /&gt;
[[Media:McCoy.pdf | Slides]]&lt;br /&gt;
[https://vimeo.com/68071440 Video]&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/CustomerService&amp;diff=153414</id>
		<title>Front Range OWASP Conference 2013/Presentations/CustomerService</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/CustomerService&amp;diff=153414"/>
				<updated>2013-06-11T17:43:10Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Linking Security to Business Value in the Customer Service Industry===&lt;br /&gt;
&lt;br /&gt;
The value of trust cannot be understated when discussing Superior Customer Service.&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;The main benefit of trust is customer loyalty, which in turn leads to a longer term relationship, greater share of wallet, and higher advocacy or word of mouth. Results from our consumer survey show that emotional and rational trust drive between 22% and 44% of customer loyalty.&amp;quot;'' - Study by ESCP Europe Business School &lt;br /&gt;
&lt;br /&gt;
Privacy protection is a pillar of trust. Studies show PRIVACY is of paramount importance to consumers and is growing in importance. A 2012 Ponemon Institute study on the “Most trusted companies on privacy” found that while the importance of privacy has grown over the last seven years, the loss of control over privacy has also grown as well.&lt;br /&gt;
&lt;br /&gt;
The Call Center industry is at the confluence of these competing social and business priorities. On the one hand, the customer service representative (CSR) must engender competence and trustworthiness and on the other hand CSR must ask the caller for a credit card number or social security number, the most private and personal valuable pieces of information a consumer possesses.&lt;br /&gt;
&lt;br /&gt;
Where there is a gap in expectations between consumers and businesses, there is an opportunity for business to differentiate themselves and fill the gap and win market share. This opportunity is being realized by emerging technology designed to satisfy Compliance standards as well as real consumer demand for privacy protections.&lt;br /&gt;
&lt;br /&gt;
Call Centers as well as other types of businesses that can address consumers demand for privacy protections can improve their long term bottom line through TRUST and customer loyalty.&lt;br /&gt;
&lt;br /&gt;
[[Media:Rojas.pdf | Slides]]&lt;br /&gt;
[https://vimeo.com/68111318 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/CloudSec&amp;diff=153413</id>
		<title>Front Range OWASP Conference 2013/Presentations/CloudSec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/CloudSec&amp;diff=153413"/>
				<updated>2013-06-11T17:42:38Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Real World Cloud Application Security===&lt;br /&gt;
&lt;br /&gt;
This presentation will provide the audience with a case study of how real world organizations using the public cloud are approaching application security. Netflix, one of the largest AWS and public cloud users in the world, will serve as the subject of the case study.&lt;br /&gt;
&lt;br /&gt;
The discussion will cover a variety of topics of interest to application security personnel, including:&lt;br /&gt;
&lt;br /&gt;
* Automating and integrating security into CI/CD environments&lt;br /&gt;
* Large scale vulnerability management&lt;br /&gt;
* Continuous security testing and monitoring, including Netflix's Security Monkey and Exploit Monkey frameworks&lt;br /&gt;
* Cultural integration of security in DevOps/agile organizations&lt;br /&gt;
&lt;br /&gt;
[[Media:Chan.pptx | Slides]]&lt;br /&gt;
[https://vimeo.com/68082826 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/CloudForensics&amp;diff=153412</id>
		<title>Front Range OWASP Conference 2013/Presentations/CloudForensics</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/CloudForensics&amp;diff=153412"/>
				<updated>2013-06-11T17:42:03Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Legal Issues of Forensics in the Cloud===&lt;br /&gt;
&lt;br /&gt;
Have you ever thought about how you would conduct a forensic investigation on your data if it was all in the Cloud; or, if your company suffers a data breach and all your data is in the Cloud how you would get the information you need to determine what happened and the extent of the damage? The Cloud presents many issues and new challenges. The best thing you can do is be prepared, but how?&lt;br /&gt;
&lt;br /&gt;
This lecture will discuss the issues associated with attempting to deal with a data breach in the Cloud as well as conducting a forensic investigation in the Cloud. How do you prepare? What needs to be included in your contract or service level agreement? Finally, if you were not able to prepare, is all lost? What can you do, legally?&lt;br /&gt;
&lt;br /&gt;
[[Media:Willson.pdf | Slides]]&lt;br /&gt;
[https://vimeo.com/68082821 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/CSIRP&amp;diff=153411</id>
		<title>Front Range OWASP Conference 2013/Presentations/CSIRP</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/CSIRP&amp;diff=153411"/>
				<updated>2013-06-11T17:41:26Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Crafting a Plan for When Security Fails===&lt;br /&gt;
&lt;br /&gt;
A computer security incident, whether an exposed system with protected data or a hacked application, requires a planned response to quickly address and contain the threat. We exist in a world where having a plan is a necessity. Companies in various industries possess vast amounts of regulated and confidential data; this arrangement places a great amount of responsibility on the custodian. Unfortunately, in today's world, it is almost inevitable that you will be the target of an attack or mishandle data that may cause a potential exposure. Do you have a codified plan that helps guide your response?&lt;br /&gt;
&lt;br /&gt;
CSIRPs are robust documents that are difficult to create. Developing a CSIRP that takes into account organizational culture and existing structure, creates buy-in from various departments, and is applicable in a wide array of emerging and existing threats while balancing substance and brevity may be a herculean task.&lt;br /&gt;
&lt;br /&gt;
This presentation will provide the basis for the need for a CSIRP, discuss pitfalls and strategies when crafting CSIRPs, explore common ways they fail, and offer tips to create a healthy, viable, and useful process to use when confronting a computer security incident.&lt;br /&gt;
&lt;br /&gt;
This presentation is geared towards those wishing to learn more about creating a viable computer security incident response plan (CSIRP).&lt;br /&gt;
&lt;br /&gt;
[[Media:Lelewski.pdf | Slides]]&lt;br /&gt;
[https://vimeo.com/68071439 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/CISPA&amp;diff=153410</id>
		<title>Front Range OWASP Conference 2013/Presentations/CISPA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/CISPA&amp;diff=153410"/>
				<updated>2013-06-11T17:41:05Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===CISPA Why Privacy Advocates Hate This Legislation===&lt;br /&gt;
&lt;br /&gt;
Reintroduced in the House of Representatives on February 13, 2013, the Cyber Intelligence Sharing and Protection Act (CISPA) is a proposed US law which would allow for the sharing of Internet traffic information between the U.S. government and certain technology and manufacturing companies. The stated aim of the bill is to help the U.S government investigate cyber threats and ensure the security of networks against cyberattack.&lt;br /&gt;
&lt;br /&gt;
CISPA has been criticized by advocates of Internet privacy and civil liberties, such as the Electronic Frontier Foundation, the American Civil Liberties Union, and Avaaz.org. Those groups argue CISPA contains too few limits on how and when the government may monitor a private individual’s Internet browsing information. Additionally, they fear that such new powers could be used to spy on the general public rather than to pursue malicious hackers. CISPA has garnered favor from corporations and lobbying groups such as Microsoft, Facebook and the United States Chamber of Commerce, which look on it as a simple and effective means of sharing important cyber threat information with the government.&lt;br /&gt;
&lt;br /&gt;
Some critics saw CISPA as a second attempt at strengthening digital piracy laws after the anti-piracy Stop Online Piracy Act became deeply unpopular. Intellectual property theft was initially listed in the bill as a possible cause for sharing Web traffic information with the government, though it was removed in subsequent drafts.&lt;br /&gt;
&lt;br /&gt;
[[Media:Feinroth.pptx | Slides]]&lt;br /&gt;
[https://vimeo.com/68071433 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/BountyHunters&amp;diff=153409</id>
		<title>Front Range OWASP Conference 2013/Presentations/BountyHunters</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/BountyHunters&amp;diff=153409"/>
				<updated>2013-06-11T17:40:22Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Digital Bounty Hunters - Decoding Bug Bounty Programs===&lt;br /&gt;
&lt;br /&gt;
Amid the growing trend to &amp;quot;crowd source&amp;quot; services, a few progressive enterprises are taking a new approach to information security. A potential game-changer, these companies are shifting the traditional model of IT risk assessment by opening their doors -- and their wallets -- to freelance hackers who break in without fear of legal repercussions. Bug Bounty Programs pay cash money to hackers for responsibly disclosing security vulnerabilities on production applications and networks.&lt;br /&gt;
&lt;br /&gt;
This presentation will examine who these freelance digital bounty hunters are, their motivations, and their perspective on the value of bug bounty programs. It is equally as important to understand the perspective of the individuals that run these programs, how the programs fit into a comprehensive, information security framework, as well as key successes and failures to date of this new crowd-sourced model. As part of this, the discussion will review metrics from an existing program and highlight some of the more interesting bugs discovered.&lt;br /&gt;
&lt;br /&gt;
Ultimately, what is the future for these bug bounty programs? Will they disrupt the existing marketplace for professional security consultant services by offering a cheaper, more effective crowd-sourced approach? Or are these programs simply a tool for the most advanced, most daring companies to take their security programs to the next level?&lt;br /&gt;
&lt;br /&gt;
[[Media:Rose.pdf | Slides]]&lt;br /&gt;
[https://vimeo.com/68107340 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/AngryCars&amp;diff=153408</id>
		<title>Front Range OWASP Conference 2013/Presentations/AngryCars</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/AngryCars&amp;diff=153408"/>
				<updated>2013-06-11T17:39:39Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;===&lt;br /&gt;
&lt;br /&gt;
Renault announced &amp;quot;what it describes as a 'tablet,' an integrated Android device built into its next range of cars, effectively opening the way to the car-as-a-platform. The car is becoming a new platform. We need developers to work on apps.&amp;quot; Not to be left behind Ford has introduced the OpenXC platform, which it sees as a channel for collaboration between Ford and 3rd party application developers.&lt;br /&gt;
&lt;br /&gt;
What role will security play in shaping this newly emerging technology, when your car can tweet it needs an oil change? Cars rely heavily on small embedded microprocessors running on a network that was never designed to be secure. This talk will look at the current technologies used CAN bus, OBDII, and tire pressure monitoring systems and demonstrate their inherent weaknesses. What should be considered in the future when most cars will be connected to the Internet?&lt;br /&gt;
&lt;br /&gt;
[[Media:Weaver.pdf | Slides]]&lt;br /&gt;
[https://vimeo.com/68071432 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/AngryCars&amp;diff=153407</id>
		<title>Front Range OWASP Conference 2013/Presentations/AngryCars</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Presentations/AngryCars&amp;diff=153407"/>
				<updated>2013-06-11T17:38:53Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;===&lt;br /&gt;
&lt;br /&gt;
Renault announced &amp;quot;what it describes as a 'tablet,' an integrated Android device built into its next range of cars, effectively opening the way to the car-as-a-platform. The car is becoming a new platform. We need developers to work on apps.&amp;quot; Not to be left behind Ford has introduced the OpenXC platform, which it sees as a channel for collaboration between Ford and 3rd party application developers.&lt;br /&gt;
&lt;br /&gt;
What role will security play in shaping this newly emerging technology, when your car can tweet it needs an oil change? Cars rely heavily on small embedded microprocessors running on a network that was never designed to be secure. This talk will look at the current technologies used CAN bus, OBDII, and tire pressure monitoring systems and demonstrate their inherent weaknesses. What should be considered in the future when most cars will be connected to the Internet?&lt;br /&gt;
&lt;br /&gt;
[[Media:Weaver.pdf | Slides]]&lt;br /&gt;
[https://vimeo.com/68071432 Video]&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=153405</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=153405"/>
				<updated>2013-06-11T16:55:52Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
[https://vimeo.com/68058106 Keynote Address: Data Protection for the 21st Century]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://vimeo.com/68058105 Panel Discussion]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Technical Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
DevFu: The inner ninja in every application developer  &lt;br /&gt;
*[[Media:Chrastil.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082818 Video]&lt;br /&gt;
Adventures in Large Scale HTTP Header Abuse&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Wolff.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071431 Video]&lt;br /&gt;
Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Weaver.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071432 Video]&lt;br /&gt;
DevOps and Security: It's Happening. Right Now.&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Bravo.pptx | Slides]]&lt;br /&gt;
Real World Cloud Application Security&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Chan.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082826 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Deep-Dive Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
SIP Based Cloud Instances&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Disney-Leugers.odp | Slides]]&lt;br /&gt;
*[https://vimeo.com/68091563 Video]&lt;br /&gt;
How Malware Attacks Web Applications&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Smith.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68107330 Video]&lt;br /&gt;
Top Ten Web Application Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Manico.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68091564 Video]&lt;br /&gt;
A Demo of and Preventing XSS in .NET Applications&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Conklin.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68069847 Video]&lt;br /&gt;
Data Mining a Mountain of Zero-Day Vulnerabilities&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Brady.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68107333 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Management Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
Digital Bounty Hunters - Decoding Bug Bounty Programs&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Rose.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68107340 Video]&lt;br /&gt;
Linking Security to Business Value in the Customer Service Industry&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Rojas.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68111318 Video]&lt;br /&gt;
Using SaaS and the Cloud to Secure the SDLC&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Earle.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68111315 Video]&lt;br /&gt;
Measuring Security Best Practices With Open SAMM&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Jex.ppt | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082823 Video]&lt;br /&gt;
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:McCoy.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071440 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Legal Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
Electronic Discovery for System Administrators&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Shumway.pptx | Slides]]&lt;br /&gt;
Legal Issues of Forensics in the Cloud&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Willson.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082821 Video]&lt;br /&gt;
CISPA: Why Privacy Advocates Hate This Legislation&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Feinroth.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071433 Video]&lt;br /&gt;
Crafting a Plan for When Security Fails&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Lelewski.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071439 Video]&lt;br /&gt;
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Glanville.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082819 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=153404</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=153404"/>
				<updated>2013-06-11T16:54:05Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
[https://vimeo.com/68058106 Keynote Address: Data Protection for the 21st Century]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://vimeo.com/68058105 Panel Discussion]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Technical Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
DevFu: The inner ninja in every application developer  &lt;br /&gt;
*[[Media:Chrastil.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082818 Video]&lt;br /&gt;
Adventures in Large Scale HTTP Header Abuse&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Wolff.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071431 Video]&lt;br /&gt;
Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Weaver.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071432 Video]&lt;br /&gt;
DevOps and Security: It's Happening. Right Now.&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Bravo.pptx | Slides]]&lt;br /&gt;
Real World Cloud Application Security&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Chan.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082826 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Deep-Dive Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
SIP Based Cloud Instances&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Disney-Leugers.odp | Slides]]&lt;br /&gt;
*[https://vimeo.com/68091563 Video]&lt;br /&gt;
How Malware Attacks Web Applications&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Smith.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68107330 Video]&lt;br /&gt;
Top Ten Web Application Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Manico.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68091564 Video]&lt;br /&gt;
A Demo of and Preventing XSS in .NET Applications&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Conklin.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68069847 Video]&lt;br /&gt;
Data Mining a Mountain of Zero-Day Vulnerabilities&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Brady.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68107333 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Management Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
Digital Bounty Hunters - Decoding Bug Bounty Programs&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Rose.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68107340 Video]&lt;br /&gt;
Linking Security to Business Value in the Customer Service Industry&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Rojas.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68111318 Video]&lt;br /&gt;
Using SaaS and the Cloud to Secure the SDLC&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Earle.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68111315 Video]&lt;br /&gt;
Measuring Security Best Practices With Open SAMM&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Jex.ppt | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082823 Video]&lt;br /&gt;
Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:McCoy.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071440 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Legal Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
Electronic Discovery for System Administrators&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Shumway.pptx | Slides]]&lt;br /&gt;
Legal Issues of Forensics in the Cloud&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Willson.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082821 Video]&lt;br /&gt;
CISPA: Why Privacy Advocates Hate This Legislation&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Feinroth.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071433 Video]&lt;br /&gt;
Crafting a Plan for When Security Fails&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Lelewski.pdf | Slides]]&lt;br /&gt;
*[https://vimeo.com/68071439 Video]&lt;br /&gt;
Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem&amp;lt;br&amp;gt;&lt;br /&gt;
*[[Media:Glanville.pptx | Slides]]&lt;br /&gt;
*[https://vimeo.com/68082819 Video]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=153402</id>
		<title>Front Range OWASP Conference 2013/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=153402"/>
				<updated>2013-06-11T16:03:08Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
====SnowFROC 2013 schedule====&lt;br /&gt;
This schedule is subject to frequent changes as the conference draws nearer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==CFP Schedule==&lt;br /&gt;
&lt;br /&gt;
Abstract collection will begin January 14th and continue until all speaking slots are filled. Rolling evaluations will occur and selected papers will be announced each Monday beginning on February 11th.&lt;br /&gt;
&lt;br /&gt;
Final presentations of accepted abstracts must be submitted for review by March 17th. Presentations will be delivered during the conference on March 28th.&lt;br /&gt;
&lt;br /&gt;
(See the [[Front_Range_OWASP_Conference_2013#CFP|CFP]] section for additional dates and details.)&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==SnowFROC 2013 Schedule==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:95%; border-collapse:collapse;&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;right&amp;quot;&lt;br /&gt;
 ! style=&amp;quot;width:10%; border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Thu, Mar 28'''&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Technical Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Deep-Dive Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Management Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Legal Track&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-top: 1px solid white;&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 07:00-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Registration and Morning Snacks''' &amp;lt;br&amp;gt; ''Sponsored by [http://www.hpenterprisesecurity.com '''HP''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:00-08:15&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Welcome and Kick-off'''&amp;lt;br&amp;gt; ''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:15-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''State of OWASP'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:30-09:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Keynote Address: Data Protection for the 21st Century'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]], Technical Director for the National Security Agency’s Information Assurance Directorate (IAD)''&amp;lt;br&amp;gt;[https://vimeo.com/68058105 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:30-10:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Kick-off'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech1|'''DevFu: The inner ninja in every application developer''' &amp;lt;br&amp;gt; ''Danny Chrastil'']]&amp;lt;br&amp;gt;[[Media: Chrastil.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082818 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech2|'''SIP Based Cloud Instances''' &amp;lt;br&amp;gt; ''Gregory Disney-Leugers]]''&amp;lt;br&amp;gt;[[Media: Disney-Leugers.odp| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68091563 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt1|'''Digital Bounty Hunters - Decoding Bug Bounty Programs''' &amp;lt;br&amp;gt; ''Jon Rose]]''&amp;lt;br&amp;gt;[[Media: Rose.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68107340 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt2|'''Electronic Discovery for System Administrators''' &amp;lt;br&amp;gt; ''Russell Shumway]]''&amp;lt;br&amp;gt;[[Media: Shumway.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;9&amp;quot; | [[Front_Range_OWASP_Conference_2013/CTF|'''CTF''']] &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:55-11:40&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech1|'''Adventures in Large Scale HTTP Header Abuse''' &amp;lt;br&amp;gt; ''Zachary Wolff]]''&amp;lt;br&amp;gt;[[Media: Wolff.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071431 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech2|'''How Malware Attacks Web Applications''' &amp;lt;br&amp;gt; ''Casey Smith]]''&amp;lt;br&amp;gt;[[Media: Smith.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68107330 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt1|'''Linking Security to Business Value in the Customer Service Industry''' &amp;lt;br&amp;gt; ''Dan Rojas]]''&amp;lt;br&amp;gt;[[Media: Rojas.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68111318 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt2|'''Legal Issues of Forensics in the Cloud''' &amp;lt;br&amp;gt; ''David Willson]]''&amp;lt;br&amp;gt;[[Media: Willson.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082821 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:40-12:40&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:40-13:25&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech1|'''Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;''' &amp;lt;br&amp;gt; ''Aaron Weaver]]''&amp;lt;br&amp;gt;[[Media: Weaver.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68071432 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech2|'''Top Ten Web Application Defenses''' &amp;lt;br&amp;gt; ''Jim Manico]]''&amp;lt;br&amp;gt;[[Media: Manico.pdf | Slides]]&amp;lt;br&amp;gt;[https://vimeo.com/68091564 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt1|'''Using SaaS and the Cloud to Secure the SDLC''' &amp;lt;br&amp;gt; ''Andrew Earle]]''&amp;lt;br&amp;gt;[[Media: Earle.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68111315 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt2|'''CISPA: Why Privacy Advocates Hate This Legislation''' &amp;lt;br&amp;gt; ''Maureen Donohue Feinroth]]''&amp;lt;br&amp;gt;[[Media: Feinroth.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071433 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 13:35-14:20&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech1|'''DevOps and Security: It's Happening. Right Now.''' &amp;lt;br&amp;gt; ''Helen Bravo]]''&amp;lt;br&amp;gt;[[Media: Bravo.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech2|'''A Demo of and Preventing XSS in .NET Applications''' &amp;lt;br&amp;gt; ''Larry Conklin]]''&amp;lt;br&amp;gt;[[Media: Conklin.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68069847 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt1|'''Measuring Security Best Practices With OpenSAMM''' &amp;lt;br&amp;gt; ''Alan Jex]]''&amp;lt;br&amp;gt;[[Media: Jex.ppt| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082823 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt2|'''Crafting a Plan for When Security Fails''' &amp;lt;br&amp;gt; ''Robert Lelewski]]''&amp;lt;br&amp;gt;[[Media: Lelewski.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071439 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 14:30-15:15&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech1|'''Real World Cloud Application Security''' &amp;lt;br&amp;gt; ''Jason Chan]]''&amp;lt;br&amp;gt;[[Media: Chan.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082826 Video]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech2|'''Data Mining a Mountain of Zero Day Vulnerabilities''' &amp;lt;br&amp;gt; ''Joe Brady]]''&amp;lt;br&amp;gt;[[Media: Brady.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68107333 Video]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt1|'''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)''' &amp;lt;br&amp;gt; ''Jon McCoy]]''&amp;lt;br&amp;gt;[[Media:McCoy.pdf| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68071440 Video]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt2|'''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem''' &amp;lt;br&amp;gt; ''Tom Glanville]]''&amp;lt;br&amp;gt;[[Media: Glanville.pptx| Slides ]]&amp;lt;br&amp;gt;[https://vimeo.com/68082819 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:15-15:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:45-16:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Moderated Panel Discussion''' ''&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Weaver|Aaron Weaver]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Willson|David Willson]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Wilson|Dan Wilson]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]]&lt;br /&gt;
    Moderator: [[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
    [https://vimeo.com/68058105 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 16:45-17:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Closing Statements'''&amp;lt;br&amp;gt;''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 17:00-&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Sponsor Raffles, Drawings, and Contests'''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Wrap-Up'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 19:00-22:00+&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''After-party at [http://denverpoolhall.com/ Tarantula Billiards]''' &amp;lt;br&amp;gt; ''Sponsored by [https://www.appliedtrust.com '''AppliedTrust''']'' &amp;lt;br&amp;gt; ''Tarantula is located 3 blocks from the Marriott at the corner of 15th and Stout (1520 Stout Street, Denver)''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''Awards Ceremony''' ''at [http://denverpoolhall.com/ Tarantula]'' (20:00)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white; border-top: 1px solid black;&amp;quot; | &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white;&amp;quot; colspan=&amp;quot;4&amp;quot; |&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 ! style=&amp;quot;border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Fri, Mar 29'''&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Training&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: A&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: B&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Capture the Flag&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-bottom: 1px solid white;&amp;quot; rowspan=&amp;quot;6&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-9:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Training | '''Training: Secure Coding''' &amp;lt;br&amp;gt; ''Aaron Weaver'']]&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1a}} ''([[Front_Range_OWASP_Conference_2013/boaf1a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1b}} ''([[Front_Range_OWASP_Conference_2013/boaf1b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF VM&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2a}} ''([[Front_Range_OWASP_Conference_2013/boaf2a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2b}} ''([[Front_Range_OWASP_Conference_2013/boaf2b|edit]])''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:45-11:15&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Coffee Break''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:15-12:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3a}} ''([[Front_Range_OWASP_Conference_2013/boaf3a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3b}} ''([[Front_Range_OWASP_Conference_2013/boaf3b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF Scoreboard&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:15-13:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4a}} ''([[Front_Range_OWASP_Conference_2013/boaf4a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4b}} ''([[Front_Range_OWASP_Conference_2013/boaf4b|edit]])''&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=153333</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=153333"/>
				<updated>2013-06-10T18:16:29Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
[https://vimeo.com/68058106 Keynote Address: Data Protection for the 21st Century]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://vimeo.com/68058105 Panel Discussion]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Technical Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Weaver.pdf|Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chan.pptx|Real World Cloud Application Security]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Deep-Dive Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Smith.pdf|How Malware Attacks Web Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Manico.pdf|Top Ten Web Application Defenses]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Management Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Rose.pdf|Digital Bounty Hunters - Decoding Bug Bounty Programs]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Rojas.pdf|Linking Security to Business Value in the Customer Service Industry]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Legal Track''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=153332</id>
		<title>Front Range OWASP Conference 2013/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=153332"/>
				<updated>2013-06-10T18:14:28Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
====SnowFROC 2013 schedule====&lt;br /&gt;
This schedule is subject to frequent changes as the conference draws nearer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==CFP Schedule==&lt;br /&gt;
&lt;br /&gt;
Abstract collection will begin January 14th and continue until all speaking slots are filled. Rolling evaluations will occur and selected papers will be announced each Monday beginning on February 11th.&lt;br /&gt;
&lt;br /&gt;
Final presentations of accepted abstracts must be submitted for review by March 17th. Presentations will be delivered during the conference on March 28th.&lt;br /&gt;
&lt;br /&gt;
(See the [[Front_Range_OWASP_Conference_2013#CFP|CFP]] section for additional dates and details.)&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==SnowFROC 2013 Schedule==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:95%; border-collapse:collapse;&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;right&amp;quot;&lt;br /&gt;
 ! style=&amp;quot;width:10%; border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Thu, Mar 28'''&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Technical Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Deep-Dive Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Management Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Legal Track&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-top: 1px solid white;&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 07:00-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Registration and Morning Snacks''' &amp;lt;br&amp;gt; ''Sponsored by [http://www.hpenterprisesecurity.com '''HP''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:00-08:15&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Welcome and Kick-off'''&amp;lt;br&amp;gt; ''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:15-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''State of OWASP'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:30-09:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Keynote Address: Data Protection for the 21st Century'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]], Technical Director for the National Security Agency’s Information Assurance Directorate (IAD)''&amp;lt;br&amp;gt;[https://vimeo.com/68058105 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:30-10:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Kick-off'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech1|'''DevFu: The inner ninja in every application developer''' &amp;lt;br&amp;gt; ''Danny Chrastil'']]&amp;lt;br&amp;gt;[[Media: Chrastil.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech2|'''SIP Based Cloud Instances''' &amp;lt;br&amp;gt; ''Gregory Disney-Leugers]]''&amp;lt;br&amp;gt;[[Media: Disney-Leugers.odp| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt1|'''Digital Bounty Hunters - Decoding Bug Bounty Programs''' &amp;lt;br&amp;gt; ''Jon Rose]]''&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt2|'''Electronic Discovery for System Administrators''' &amp;lt;br&amp;gt; ''Russell Shumway]]''&amp;lt;br&amp;gt;[[Media: Shumway.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;9&amp;quot; | [[Front_Range_OWASP_Conference_2013/CTF|'''CTF''']] &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:55-11:40&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech1|'''Adventures in Large Scale HTTP Header Abuse''' &amp;lt;br&amp;gt; ''Zachary Wolff]]''&amp;lt;br&amp;gt;[[Media: Wolff.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech2|'''How Malware Attacks Web Applications''' &amp;lt;br&amp;gt; ''Casey Smith]]''&amp;lt;br&amp;gt;[[Media: Smith.pdf| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt1|'''Linking Security to Business Value in the Customer Service Industry''' &amp;lt;br&amp;gt; ''Dan Rojas]]''&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt2|'''Legal Issues of Forensics in the Cloud''' &amp;lt;br&amp;gt; ''David Willson]]''&amp;lt;br&amp;gt;[[Media: Willson.pdf| Slides ]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:40-12:40&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:40-13:25&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech1|'''Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;''' &amp;lt;br&amp;gt; ''Aaron Weaver]]''&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech2|'''Top Ten Web Application Defenses''' &amp;lt;br&amp;gt; ''Jim Manico]]''&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt1|'''Using SaaS and the Cloud to Secure the SDLC''' &amp;lt;br&amp;gt; ''Andrew Earle]]''&amp;lt;br&amp;gt;[[Media: Earle.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt2|'''CISPA: Why Privacy Advocates Hate This Legislation''' &amp;lt;br&amp;gt; ''Maureen Donohue Feinroth]]''&amp;lt;br&amp;gt;[[Media: Feinroth.pptx| Slides ]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 13:35-14:20&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech1|'''DevOps and Security: It's Happening. Right Now.''' &amp;lt;br&amp;gt; ''Helen Bravo]]''&amp;lt;br&amp;gt;[[Media: Bravo.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech2|'''A Demo of and Preventing XSS in .NET Applications''' &amp;lt;br&amp;gt; ''Larry Conklin]]''&amp;lt;br&amp;gt;[[Media: Conklin.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt1|'''Measuring Security Best Practices With OpenSAMM''' &amp;lt;br&amp;gt; ''Alan Jex]]''&amp;lt;br&amp;gt;[[Media: Jex.ppt| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt2|'''Crafting a Plan for When Security Fails''' &amp;lt;br&amp;gt; ''Robert Lelewski]]''&amp;lt;br&amp;gt;[[Media: Lelewski.pdf| Slides ]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 14:30-15:15&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech1|'''Real World Cloud Application Security''' &amp;lt;br&amp;gt; ''Jason Chan]]''&amp;lt;br&amp;gt;[[Media: Chan.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech2|'''Data Mining a Mountain of Zero Day Vulnerabilities''' &amp;lt;br&amp;gt; ''Joe Brady]]''&amp;lt;br&amp;gt;[[Media: Brady.pdf| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt1|'''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)''' &amp;lt;br&amp;gt; ''Jon McCoy]]''&amp;lt;br&amp;gt;[[Media:McCoy.pdf| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt2|'''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem''' &amp;lt;br&amp;gt; ''Tom Glanville]]''&amp;lt;br&amp;gt;[[Media: Glanville.pptx| Slides ]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:15-15:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:45-16:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Moderated Panel Discussion''' ''&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Weaver|Aaron Weaver]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Willson|David Willson]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Wilson|Dan Wilson]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]]&lt;br /&gt;
    Moderator: [[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
    [https://vimeo.com/68058105 Video]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 16:45-17:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Closing Statements'''&amp;lt;br&amp;gt;''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 17:00-&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Sponsor Raffles, Drawings, and Contests'''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Wrap-Up'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 19:00-22:00+&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''After-party at [http://denverpoolhall.com/ Tarantula Billiards]''' &amp;lt;br&amp;gt; ''Sponsored by [https://www.appliedtrust.com '''AppliedTrust''']'' &amp;lt;br&amp;gt; ''Tarantula is located 3 blocks from the Marriott at the corner of 15th and Stout (1520 Stout Street, Denver)''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''Awards Ceremony''' ''at [http://denverpoolhall.com/ Tarantula]'' (20:00)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white; border-top: 1px solid black;&amp;quot; | &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white;&amp;quot; colspan=&amp;quot;4&amp;quot; |&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 ! style=&amp;quot;border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Fri, Mar 29'''&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Training&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: A&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: B&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Capture the Flag&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-bottom: 1px solid white;&amp;quot; rowspan=&amp;quot;6&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-9:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Training | '''Training: Secure Coding''' &amp;lt;br&amp;gt; ''Aaron Weaver'']]&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1a}} ''([[Front_Range_OWASP_Conference_2013/boaf1a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1b}} ''([[Front_Range_OWASP_Conference_2013/boaf1b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF VM&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2a}} ''([[Front_Range_OWASP_Conference_2013/boaf2a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2b}} ''([[Front_Range_OWASP_Conference_2013/boaf2b|edit]])''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:45-11:15&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Coffee Break''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:15-12:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3a}} ''([[Front_Range_OWASP_Conference_2013/boaf3a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3b}} ''([[Front_Range_OWASP_Conference_2013/boaf3b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF Scoreboard&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:15-13:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4a}} ''([[Front_Range_OWASP_Conference_2013/boaf4a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4b}} ''([[Front_Range_OWASP_Conference_2013/boaf4b|edit]])''&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149955</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149955"/>
				<updated>2013-04-16T15:24:51Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
'''Technical''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Weaver.pdf|Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chan.pptx|Real World Cloud Application Security]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Deep-Dive''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Smith.pdf|How Malware Attacks Web Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Manico.pdf|Top Ten Web Application Defenses]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Management''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Rose.pdf|Digital Bounty Hunters - Decoding Bug Bounty Programs]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Rojas.pdf|Linking Security to Business Value in the Customer Service Industry]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Legal''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Rose.pdf&amp;diff=149954</id>
		<title>File:Rose.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Rose.pdf&amp;diff=149954"/>
				<updated>2013-04-16T15:24:35Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149952</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149952"/>
				<updated>2013-04-16T15:21:56Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
'''Technical''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Weaver.pdf|Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chan.pptx|Real World Cloud Application Security]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Deep-Dive''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Smith.pdf|How Malware Attacks Web Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Manico.pdf|Top Ten Web Application Defenses]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Management''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Rojas.pdf|Linking Security to Business Value in the Customer Service Industry]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Legal''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Weaver.pdf&amp;diff=149951</id>
		<title>File:Weaver.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Weaver.pdf&amp;diff=149951"/>
				<updated>2013-04-16T15:21:33Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149950</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149950"/>
				<updated>2013-04-16T15:11:36Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
'''Technical''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Weaver.pptx|Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chan.pptx|Real World Cloud Application Security]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Deep-Dive''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Smith.pdf|How Malware Attacks Web Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Manico.pdf|Top Ten Web Application Defenses]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Management''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Rojas.pdf|Linking Security to Business Value in the Customer Service Industry]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Legal''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Manico.pdf&amp;diff=149949</id>
		<title>File:Manico.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Manico.pdf&amp;diff=149949"/>
				<updated>2013-04-16T15:10:31Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149947</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149947"/>
				<updated>2013-04-16T15:08:03Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
'''Technical''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Weaver.pptx|Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chan.pptx|Real World Cloud Application Security]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Deep-Dive''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Smith.pdf|How Malware Attacks Web Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Manico.ppt|Top Ten Web Application Defenses]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Management''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Rojas.pdf|Linking Security to Business Value in the Customer Service Industry]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Legal''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Rojas.pdf&amp;diff=149946</id>
		<title>File:Rojas.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Rojas.pdf&amp;diff=149946"/>
				<updated>2013-04-16T15:05:26Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=149499</id>
		<title>Front Range OWASP Conference 2013/Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Schedule&amp;diff=149499"/>
				<updated>2013-04-09T17:55:43Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
====SnowFROC 2013 schedule====&lt;br /&gt;
This schedule is subject to frequent changes as the conference draws nearer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==CFP Schedule==&lt;br /&gt;
&lt;br /&gt;
Abstract collection will begin January 14th and continue until all speaking slots are filled. Rolling evaluations will occur and selected papers will be announced each Monday beginning on February 11th.&lt;br /&gt;
&lt;br /&gt;
Final presentations of accepted abstracts must be submitted for review by March 17th. Presentations will be delivered during the conference on March 28th.&lt;br /&gt;
&lt;br /&gt;
(See the [[Front_Range_OWASP_Conference_2013#CFP|CFP]] section for additional dates and details.)&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==SnowFROC 2013 Schedule==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:95%; border-collapse:collapse;&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;right&amp;quot;&lt;br /&gt;
 ! style=&amp;quot;width:10%; border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Thu, Mar 28'''&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Technical Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Deep-Dive Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Management Track&lt;br /&gt;
 ! style=&amp;quot;width:19%; border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Legal Track&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-top: 1px solid white;&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 07:00-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Registration and Morning Snacks''' &amp;lt;br&amp;gt; ''Sponsored by [http://www.hpenterprisesecurity.com '''HP''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:00-08:15&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Welcome and Kick-off'''&amp;lt;br&amp;gt; ''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:15-08:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''State of OWASP'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 08:30-09:30&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Keynote Address: Data Protection for the 21st Century'''&amp;lt;br&amp;gt; ''[[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]], Technical Director for the National Security Agency’s Information Assurance Directorate (IAD)''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:30-10:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Kick-off'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech1|'''DevFu: The inner ninja in every application developer''' &amp;lt;br&amp;gt; ''Danny Chrastil'']]&amp;lt;br&amp;gt;[[Media: Chrastil.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Tech2|'''SIP Based Cloud Instances''' &amp;lt;br&amp;gt; ''Gregory Disney-Leugers]]''&amp;lt;br&amp;gt;[[Media: Disney-Leugers.odp| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt1|'''Digital Bounty Hunters - Decoding Bug Bounty Programs''' &amp;lt;br&amp;gt; ''Jon Rose]]''&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess1_Mgmt2|'''Electronic Discovery for System Administrators''' &amp;lt;br&amp;gt; ''Russell Shumway]]''&amp;lt;br&amp;gt;[[Media: Shumway.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;9&amp;quot; | [[Front_Range_OWASP_Conference_2013/CTF|'''CTF''']] &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:55-11:40&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech1|'''Adventures in Large Scale HTTP Header Abuse''' &amp;lt;br&amp;gt; ''Zachary Wolff]]''&amp;lt;br&amp;gt;[[Media: Wolff.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Tech2|'''How Malware Attacks Web Applications''' &amp;lt;br&amp;gt; ''Casey Smith]]''&amp;lt;br&amp;gt;[[Media: Smith.pdf| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt1|'''Linking Security to Business Value in the Customer Service Industry''' &amp;lt;br&amp;gt; ''Dan Rojas]]''&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess2_Mgmt2|'''Legal Issues of Forensics in the Cloud''' &amp;lt;br&amp;gt; ''David Willson]]''&amp;lt;br&amp;gt;[[Media: Willson.pdf| Slides ]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:40-12:40&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Lunch and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:40-13:25&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech1|'''Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;''' &amp;lt;br&amp;gt; ''Aaron Weaver]]''&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Tech2|'''Top Ten Web Application Defenses''' &amp;lt;br&amp;gt; ''Jim Manico]]''&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt1|'''Using SaaS and the Cloud to Secure the SDLC''' &amp;lt;br&amp;gt; ''Andrew Earle]]''&amp;lt;br&amp;gt;[[Media: Earle.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess3_Mgmt2|'''CISPA: Why Privacy Advocates Hate This Legislation''' &amp;lt;br&amp;gt; ''Maureen Donohue Feinroth]]''&amp;lt;br&amp;gt;[[Media: Feinroth.pptx| Slides ]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 13:35-14:20&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech1|'''DevOps and Security: It's Happening. Right Now.''' &amp;lt;br&amp;gt; ''Helen Bravo]]''&amp;lt;br&amp;gt;[[Media: Bravo.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Tech2|'''A Demo of and Preventing XSS in .NET Applications''' &amp;lt;br&amp;gt; ''Larry Conklin]]''&amp;lt;br&amp;gt;[[Media: Conklin.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt1|'''Measuring Security Best Practices With OpenSAMM''' &amp;lt;br&amp;gt; ''Alan Jex]]''&amp;lt;br&amp;gt;[[Media: Jex.ppt| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess4_Mgmt2|'''Crafting a Plan for When Security Fails''' &amp;lt;br&amp;gt; ''Robert Lelewski]]''&amp;lt;br&amp;gt;[[Media: Lelewski.pdf| Slides ]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 14:30-15:15&lt;br /&gt;
 | style=&amp;quot;background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech1|'''Real World Cloud Application Security''' &amp;lt;br&amp;gt; ''Jason Chan]]''&amp;lt;br&amp;gt;[[Media: Chan.pptx| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Tech2|'''Data Mining a Mountain of Zero Day Vulnerabilities''' &amp;lt;br&amp;gt; ''Joe Brady]]''&amp;lt;br&amp;gt;[[Media: Brady.pdf| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt1|'''Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)''' &amp;lt;br&amp;gt; ''Jon McCoy]]''&amp;lt;br&amp;gt;[[Media:McCoy.pdf| Slides ]]&lt;br /&gt;
 | style=&amp;quot;background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Sess5_Mgmt2|'''Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem''' &amp;lt;br&amp;gt; ''Tom Glanville]]''&amp;lt;br&amp;gt;[[Media: Glanville.pptx| Slides ]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:15-15:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''Coffee Break and Sponsor Expo''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 15:45-16:45&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Moderated Panel Discussion''' ''&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Weaver|Aaron Weaver]]&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Willson|David Willson]]&lt;br /&gt;
    Dan Wilson&lt;br /&gt;
    [[Front_Range_OWASP_Conference_2013/Speakers/Ziring|Neal Ziring]]&lt;br /&gt;
    Moderator: [[Front_Range_OWASP_Conference_2013/Speakers/Manico|Jim Manico]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 16:45-17:00&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Closing Statements'''&amp;lt;br&amp;gt;''[[User:Brad_Carvalho|Brad Carvalho]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 17:00-&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#E0E0E0&amp;quot; align=&amp;quot;center&amp;quot;  | '''Sponsor Raffles, Drawings, and Contests'''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''CTF Wrap-Up'''&amp;lt;br&amp;gt;''[[User:Chris_Rossi|Chris Rossi]], [[User:Mark_Major|Mark Major]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 19:00-22:00+&lt;br /&gt;
 | colspan=&amp;quot;4&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot;  | '''After-party at [http://denverpoolhall.com/ Tarantula Billiards]''' &amp;lt;br&amp;gt; ''Sponsored by [https://www.appliedtrust.com '''AppliedTrust''']'' &amp;lt;br&amp;gt; ''Tarantula is located 3 blocks from the Marriott at the corner of 15th and Stout (1520 Stout Street, Denver)''&lt;br /&gt;
 | style=&amp;quot;background:#C1DAD6&amp;quot; align=&amp;quot;center&amp;quot; | '''Awards Ceremony''' ''at [http://denverpoolhall.com/ Tarantula]'' (20:00)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white; border-top: 1px solid black;&amp;quot; | &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white;&amp;quot; colspan=&amp;quot;4&amp;quot; |&lt;br /&gt;
 | style=&amp;quot;border-left: 1px solid white; border-right: 1px solid white; border-bottom: 1px solid white&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 ! style=&amp;quot;border-left: 1px solid white; border-top: 1px solid white;&amp;quot; | '''Fri, Mar 29'''&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; | Training&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: A&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Birds of a Feather: B&lt;br /&gt;
 ! style=&amp;quot;border-bottom: 1px solid black; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; | Capture the Flag&lt;br /&gt;
 | style=&amp;quot;border-right: 1px solid white; border-bottom: 1px solid white;&amp;quot; rowspan=&amp;quot;6&amp;quot; |&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-9:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#E8D0A9&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Front_Range_OWASP_Conference_2013/Sessions/Training | '''Training: Secure Coding''' &amp;lt;br&amp;gt; ''Aaron Weaver'']]&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1a}} ''([[Front_Range_OWASP_Conference_2013/boaf1a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf1b}} ''([[Front_Range_OWASP_Conference_2013/boaf1b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF VM&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:45&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2a}} ''([[Front_Range_OWASP_Conference_2013/boaf2a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf2b}} ''([[Front_Range_OWASP_Conference_2013/boaf2b|edit]])''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 10:45-11:15&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;background:#AEBEC3; color:#024C68&amp;quot; align=&amp;quot;center&amp;quot; | '''Coffee Break''' &amp;lt;br&amp;gt; ''Sponsored by [https://aerstone.com '''Aerstone''']''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 11:15-12:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3a}} ''([[Front_Range_OWASP_Conference_2013/boaf3a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf3b}} ''([[Front_Range_OWASP_Conference_2013/boaf3b|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#B7AFA3&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | FLOSSHack: CTF Scoreboard&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#024C68; color:white&amp;quot; align=&amp;quot;center&amp;quot; | 12:15-13:00&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#DFC184&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4a}} ''([[Front_Range_OWASP_Conference_2013/boaf4a|edit]])''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | {{:Front_Range_OWASP_Conference_2013/boaf4b}} ''([[Front_Range_OWASP_Conference_2013/boaf4b|edit]])''&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149498</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149498"/>
				<updated>2013-04-09T17:41:36Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
'''Technical''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Weaver.pptx|Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chan.pptx|Real World Cloud Application Security]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Deep-Dive''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Smith.pdf|How Malware Attacks Web Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Manico.ppt|Top Ten Web Application Defenses]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Management''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rojas.something|Linking Security to Business Value in the Customer Service Industry]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Legal''' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149497</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149497"/>
				<updated>2013-04-09T17:41:05Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
''Technical'' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Weaver.pptx|Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chan.pptx|Real World Cloud Application Security]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Deep-Dive'' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Smith.pdf|How Malware Attacks Web Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Manico.ppt|Top Ten Web Application Defenses]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Management'' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rojas.something|Linking Security to Business Value in the Customer Service Industry]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Legal'' &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149496</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149496"/>
				<updated>2013-04-09T17:27:12Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
Technical &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Weaver.pptx|Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chan.pptx|Real World Cloud Application Security]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Deep-Dive &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Smith.pdf|How Malware Attacks Web Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Manico.ppt|Top Ten Web Application Defenses]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Management &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rojas.something|Linking Security to Business Value in the Customer Service Industry]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Legal &amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149495</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149495"/>
				<updated>2013-04-09T17:26:42Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
Technical&lt;br /&gt;
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Weaver.pptx|Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chan.pptx|Real World Cloud Application Security]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Deep-Dive&lt;br /&gt;
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Smith.pdf|How Malware Attacks Web Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Manico.ppt|Top Ten Web Application Defenses]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Management&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rojas.something|Linking Security to Business Value in the Customer Service Industry]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Legal&lt;br /&gt;
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149492</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149492"/>
				<updated>2013-04-09T17:02:48Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Smith.pdf|How Malware Attacks Web Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chan.pptx|Real World Cloud Application Security]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Manico.ppt|Top Ten Web Application Defenses]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Weaver.pptx|Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rojas.something|Linking Security to Business Value in the Customer Service Industry]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149491</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149491"/>
				<updated>2013-04-09T17:02:34Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Smith.pdf|How Malware Attacks Web Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chan.pptx|Real World Cloud Application Security]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Manico.ppt|Top Ten Web Application Defenses]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rose.pptx|Digital Bounty Hunters - Decoding Bug Bounty Programs]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Weaver.pptx|Angry Cars: Hacking the &amp;quot;Car as Platform&amp;quot;]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[Media:Rojas.something|Linking Security to Business Value in the Customer Service Industry]]&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149490</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149490"/>
				<updated>2013-04-09T16:52:22Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Smith.pdf|How Malware Attacks Web Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chan.pptx|Real World Cloud Application Security]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149489</id>
		<title>Front Range OWASP Conference 2013/Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2013/Archive&amp;diff=149489"/>
				<updated>2013-04-09T16:51:58Z</updated>
		
		<summary type="html">&lt;p&gt;Jess Garrett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;====2013 presentations====&lt;br /&gt;
&lt;br /&gt;
Presentation materials will be made available upon the conclusion of SnowFROC2013.&lt;br /&gt;
&lt;br /&gt;
[[Media:Brady.pdf|Data Mining a Mountain of Zero-Day Vulnerabilities]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chrastil.pptx|DevFu: The inner ninja in every application developer]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Earle.pptx|Using SaaS and the Cloud to Secure the SDLC]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Lelewski.pdf|Crafting a Plan for When Security Fails]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Shumway.pptx|Electronic Discovery for System Administrators]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Smith.pdf|How Malware Attacks Web Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Willson.pdf|Legal Issues of Forensics in the Cloud]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Bravo.pptx|DevOps and Security: It's Happening. Right Now.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Chan.pptx|Real World Cloud Application Security]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Conklin.pptx|A Demo of and Preventing XSS in .NET Applications]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Disney-Leugers.odp|SIP Based Cloud Instances]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Feinroth.pptx|CISPA: Why Privacy Advocates Hate This Legislation]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Glanville.pptx|Information Control: The Critical Need for a Defensible Position - Securing the Information Ecosystem]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Jex.ppt|Measuring Security Best Practices With Open SAMM]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:McCoy.pdf|Defending Desktop (.NET/C#) Applications: Mitigating in the Dark (A Case Study Remix)]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Media:Wolff.pptx|Adventures in Large Scale HTTP Header Abuse]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Previous conferences====&lt;br /&gt;
&lt;br /&gt;
'''2012 presentations''' are [[Front_Range_OWASP_Conference_2012#2012_Presentations| available here]].&lt;/div&gt;</summary>
		<author><name>Jess Garrett</name></author>	</entry>

	</feed>