<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jocelyn.aubert</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jocelyn.aubert"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Jocelyn.aubert"/>
		<updated>2026-04-22T03:15:19Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=238932</id>
		<title>Luxembourg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=238932"/>
				<updated>2018-03-26T10:31:27Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: add OWASP BeNeLux Day 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Luxembourg|extra=The chapter leader is [mailto:jocelyn.aubert@owasp.org Jocelyn Aubert]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-luxemburg|emailarchives=http://lists.owasp.org/pipermail/owasp-luxemburg/}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Luxembourg&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
Join our [http://www.linkedin.com/groups?gid=1781989&amp;amp;trk=anetsrch_name&amp;amp;goback=.gdr_1238414238580_1 LinkedIn group]! &lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day 2017 ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day! The event will take place on 23 (trainings) and 24 (conference) November 2017, in Tilburg - The Netherlands.&lt;br /&gt;
&lt;br /&gt;
See [[OWASP_BeNeLux-Day_2017]] for more details.&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day 2016 - II  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day! The event will take place on 24 (trainings) and 25 (conference) November 2016, in Leuven - Belgium.&lt;br /&gt;
&lt;br /&gt;
See [[BeNeLux OWASP Day 2016-2]] for more details.&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day, March 17 &amp;amp;amp; 18, 2016 in Esch-sur-Alzette, Luxembourg  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce that like in 2011, the OWASP BeNeLux Day will be held in Belval Campus, Esch-sur-Alzette, Luxembourg.&lt;br /&gt;
More information on [http://www.owaspbenelux.eu www.owaspbenelux.eu]!&lt;br /&gt;
&lt;br /&gt;
=== OWASP AppSecEU 2015, 19-22 May 2015, Amsterdam, The Netherlands ===&lt;br /&gt;
The Luxembourg chapter is co-organizing together with Belgium and Netherlands chapters this amazing conference to be held in Amsterdam this spring!&lt;br /&gt;
More information on the [http://2015.appsec.eu conference website.]&lt;br /&gt;
&lt;br /&gt;
Hope to see you there!&lt;br /&gt;
&lt;br /&gt;
=== French translation of Top Ten ===&lt;br /&gt;
The Luxembourg chapter, in collaboration with other volunteers (French and Swiss) is currently involved in the French translation of the OWASP Top Ten for 2013 (available in release candidate here: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]).&lt;br /&gt;
&lt;br /&gt;
The final version of Top Ten should be available in May, and the French version should be available a few days after the release of the original version.&lt;br /&gt;
The document is usually translated into different languages (German, Spanish, Italian, Chinese, etc.)&lt;br /&gt;
&lt;br /&gt;
People potentially interested to contribute to the German translation, can contact the [[OWASP_German_Language_Project]].&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day 2011, December 1st &amp;amp;amp; 2nd 2011 @ University of Luxembourg  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce that OWASP BeNeLux Day 2011 will take place on December 1st &amp;amp;amp; 2nd 2011 at the University of Luxembourg. &lt;br /&gt;
&lt;br /&gt;
*'''December 1st 2011: Training Day'''&lt;br /&gt;
&lt;br /&gt;
OWASP Training: Secure Application Development, by Eoin Keary This intensive one-day training focuses on the most common web application security problems, including aspects of both the OWASP Top Ten (2010) and the MITRE Top 25. The training will introduce and demonstrate application assessment techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''December 2nd 2011: Conference Day'''&lt;br /&gt;
&lt;br /&gt;
List of confirmed speakers (more to be announced soon): &lt;br /&gt;
&lt;br /&gt;
*Brenno De Winter (Journalist) on the Diginotar story &lt;br /&gt;
*Koen Vanderloock (Lead Security Competence Group at Cegeka) on the new OWASP Simba project &lt;br /&gt;
*Justin Clarke (Director and Co-Founder of Gotham Digital Science Ltd) on practical crypto attacks against web applications &lt;br /&gt;
*Lieven Desmet (Research Manager at University Leuven) on HTML5 security &lt;br /&gt;
*Andrey Belenko (Chief Security Researcher at ElcomSoft Co. Ltd) on iOS data protection internals &lt;br /&gt;
*Alexandre Dulaunoy (Incident Management - Security Research at CIRCL) on dynamic malware analysis &lt;br /&gt;
*Ludovic Petit (Group Fraud &amp;amp;amp; Information Security Adviser at SFR, Vodafone Group) on WebApp Security and legal and regulatory aspects &lt;br /&gt;
*Seba Deleersnyder &amp;amp;amp; Eoin Keary (OWASP Board) on OWASP Update&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For more information and updates, please check out [http://www.owaspbenelux.eu/ www.owaspbenelux.eu] &lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring the event and the Luxembourg Chapter in 2012? Please contact Jocelyn Aubert (Jocelyn.Aubert[at]owasp.org)!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.yajug.org/ YAJUG] (Java User Group, Luxembourg)  ===&lt;br /&gt;
&lt;br /&gt;
The Luxembourg Chapter will participate to the next YAJUG (Java User Group, Luxembourg) event: &lt;br /&gt;
&lt;br /&gt;
'''YAJUG - How to Secure your Java Applications''' ''Wednesday, May 27th 2009 - 17:45'' &lt;br /&gt;
&lt;br /&gt;
[http://www.tudor.lu Centre de Recherche Public Henri Tudor] - 29, avenue John F. Kennedy - L-1855 Luxembourg-Kirchberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*17h45 - Welcome and registration &lt;br /&gt;
*18h00 - Introduction to Cryptography with JCA and JCE, Sébastien Stormacq, Sun Microsystems (French, slides in English) &lt;br /&gt;
*19h15 - [http://www.owasp.org/images/b/bb/2009-05-27_owasp%40yajug.ppt OWASP Top 10 Security Breaches for Java Web Applications], Jocelyn Aubert, OWASP-LU (French, slides in English) &lt;br /&gt;
*20h30 - Drink&lt;br /&gt;
&lt;br /&gt;
The whole program is available on [http://www.yajug.org/confluence/display/Public/Future+Events YAJUG website]. &lt;br /&gt;
&lt;br /&gt;
'''Note:''' This event is NOT an OWASP event! You have to register on YAJUG website (fee: 40 euros). &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.c3l.lu/ C3L] (Chaos Computer Club Lëtzebuerg)  ===&lt;br /&gt;
&lt;br /&gt;
''Monday, April 6th 2009'' - 20:00 (...until late in the night) &lt;br /&gt;
&lt;br /&gt;
Brasserie [http://www.seppl.lu/ Seppl] (Club-Room) - Luxembourg-Limpertsberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*15 minutes intro OWASP Luxembourg Chapter &lt;br /&gt;
*remaining time - Technical Chaos regarding OWASP&lt;br /&gt;
&lt;br /&gt;
== Chapter Board  ==&lt;br /&gt;
&lt;br /&gt;
The Luxembourg chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*ADELSBACH André &lt;br /&gt;
*AUBERT Jocelyn &lt;br /&gt;
*DULAUNOY Alexandre&lt;br /&gt;
*RIGHETTO Dominique &lt;br /&gt;
*STEICHEN Pascal&lt;br /&gt;
*ZOLLER Thierry&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors  ==&lt;br /&gt;
OWASP Luxembourg thanks its structural chapter supporters: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]] &lt;br /&gt;
[[Image:Logocircl.png|link=http://circl.lu/]] &lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
[https://secwatch.nl https://www.owasp.org/images/f/ff/Secwatch_logo_small.png]&lt;br /&gt;
[[File:Avi Logo Transparent Background 300pix.png|200px|link=https://avinetworks.com/]] &lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Day_2017&amp;diff=232475</id>
		<title>OWASP BeNeLux-Day 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Day_2017&amp;diff=232475"/>
				<updated>2017-08-20T20:20:46Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Change the header...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Header-BNL-2017.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday|&amp;lt;p&amp;gt;&lt;br /&gt;
* speaker &amp;gt; &amp;lt;u&amp;gt;Closing keynote:&amp;lt;/u&amp;gt; The Future of Security&lt;br /&gt;
}}&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2016-2.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl17 #owaspbnl17]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2016-2.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== OWASP BeNeLux training is reserved for OWASP members, and registration is required! ==&lt;br /&gt;
To support the OWASP organisation, we ask training attendees to become an OWASP member, it's only US$50!&lt;br /&gt;
Students and faculty are invited to become member as well, but can freely attend.&lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[https://owasp-benelux-day-2016-2.eventbrite.com Register now!]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
=== Trainingday is November 23rd  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room TBA !! Room TBA !! Room TBA&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[BeNeLux_OWASP_Day_2017#training name! | TBD]] &amp;lt;br&amp;gt;by [[BeNeLux_OWASP_Day_2017#speaker name | TBD]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | TBD&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | TBD&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Trainings ==&lt;br /&gt;
=== training title ===&lt;br /&gt;
traning desciption&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
= Mobile Security Summit =&lt;br /&gt;
=== The Mobile Security Summit is taking place parallel to the trainings, November 23rd  ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is November 24th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;190pt&amp;quot; | Speaker &lt;br /&gt;
! width=&amp;quot;400pt&amp;quot; | Topic&lt;br /&gt;
! width=&amp;quot;100pt&amp;quot; | Slides&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 09h15&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Opening''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || [[BeNeLux_OWASP_Day_2017#speaker name | speaker name]]&lt;br /&gt;
|| [[BeNeLux_OWASP_Day_2017#talk title]] &lt;br /&gt;
|| &amp;lt;!--[https://www.owasp.org/images/6/67/Benelux_day_20161125_D_Incalza_Securing_Android_Applications.pdf Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || TBD&lt;br /&gt;
||   TBD&lt;br /&gt;
|| &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 ||TBD&lt;br /&gt;
|| TBD&lt;br /&gt;
|| &lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || TBD&lt;br /&gt;
|| TBD&lt;br /&gt;
|| &lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || TBD&lt;br /&gt;
|| TBD&lt;br /&gt;
||&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || TBD&lt;br /&gt;
|| TBD&lt;br /&gt;
||&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 ||  TBD&lt;br /&gt;
|| TBD&lt;br /&gt;
|| &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || TBD&lt;br /&gt;
| TBD&lt;br /&gt;
| TBD&lt;br /&gt;
|| TBD&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Closing'' &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
=== talk title ===&lt;br /&gt;
Abstract&lt;br /&gt;
== Speakers == &lt;br /&gt;
===speaker name===&lt;br /&gt;
Speaker bios&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event,starting at 7PM ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
There are 3 combined sponsorship packages (Gold, Silver or Bronze) that cover the BeNeLux chapter meetings 2018 and the BeNeLux OWASP Days 2017 in Tilburg, the Netherlands.&lt;br /&gt;
&lt;br /&gt;
Download our sponsor brochure TBD and contact [mailto:seba@owasp.org us] for questions or sponsorship confirmation!&lt;br /&gt;
&lt;br /&gt;
Your sponsorship will be invested directly in the chapter meetings, supporting speaker and catering expenses. &lt;br /&gt;
&lt;br /&gt;
The sponsorship will also be dedicated to cover the costs of the OWASP 2017 BeNeLux event.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
= Call for Speakers  =&lt;br /&gt;
&lt;br /&gt;
== Call for Speakers ==&lt;br /&gt;
&lt;br /&gt;
'''The call for Speakers is closed.&lt;br /&gt;
 See you next year!'''&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec conferences are true security conferences with all talks and presentations focusing on various areas of information security. Topics should focus on the technical and social aspects of security, and should not contain marketing or sales pitches.&lt;br /&gt;
&lt;br /&gt;
We encourage and prioritize submissions covering research and new work impacting:&lt;br /&gt;
&lt;br /&gt;
* Secure development of web applications.&lt;br /&gt;
* Security testing of web applications.&lt;br /&gt;
* Security of DevOps processes, architectures, and tools.&lt;br /&gt;
* Security of applications designed for mobile devices.&lt;br /&gt;
* Security of Internet of Things devices and platforms.&lt;br /&gt;
* Cloud platform security&lt;br /&gt;
* Browser security&lt;br /&gt;
* HTML5 security&lt;br /&gt;
* OWASP tools or projects in practice&lt;br /&gt;
&lt;br /&gt;
'''Terms'''&lt;br /&gt;
&lt;br /&gt;
By your submission you agree to the OWASP [https://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement]. It requires that you use an OWASP [https://www.owasp.org/images/7/76/OWASP_Presentation_Template.zip presentation template] or other non-branded template. Presentations may not use company-themed decks or include a company logo except on the speaker bio slide. Failure to observe these requirements will result in talk removal.&lt;br /&gt;
&lt;br /&gt;
All presentation slides will be published on the conference website. Pictures and other materials in presentations should not violate any copyrights. Presentation submitters are solely liable for copyright violations. You may choose any [http://creativecommons.org/licenses Creative Commons] license for your slides, including CC0. OWASP [http://creativecommons.org/licenses suggests the use of open licenses].&lt;br /&gt;
&lt;br /&gt;
We will cover your travel expenses or costs for accommodations.&lt;br /&gt;
&lt;br /&gt;
'''Deadlines'''&lt;br /&gt;
&lt;br /&gt;
* Submission of proposal closes: 11 September, 2016 – 23:59&lt;br /&gt;
* Notification of acceptance: 2 October, 2016&lt;br /&gt;
* Conference Date:  25 November, 2016&lt;br /&gt;
&lt;br /&gt;
'''Submission'''&lt;br /&gt;
&lt;br /&gt;
To submit a proposal, please submit an abstract of your intended presentation (500 to 4000 characters), a brief biography (150 to 800 characters) and a headshot (combine multiple files in one zip file). Your planned presentation time is 40 minutes (excluding ~5 minutes for discussion and change of speaker). Feel free to attach a preliminary version of your presentation if available. Any proposal submitted is subject to a democratic vote by the program committee. Keep in mind: The better your description of the talk, the better picture the program committee will have to review your submission. Please proofread your submission; after approval your abstract, biography, and headshot will be published verbatim into the program and website.&lt;br /&gt;
&lt;br /&gt;
Submission page: https://easychair.org/conferences/?conf=owaspbenelux162&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
&lt;br /&gt;
'''Platinum'''&lt;br /&gt;
'''Gold:'''&lt;br /&gt;
'''Silver:'''&lt;br /&gt;
'''Bronze:'''&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Header-BNL-2017.png&amp;diff=232474</id>
		<title>File:Header-BNL-2017.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Header-BNL-2017.png&amp;diff=232474"/>
				<updated>2017-08-20T20:19:25Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=226034</id>
		<title>Luxembourg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=226034"/>
				<updated>2017-02-06T07:49:13Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Chapter Sponsors */ update sponsors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Luxembourg|extra=The chapter leader is [mailto:jocelyn.aubert@owasp.org Jocelyn Aubert]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-luxemburg|emailarchives=http://lists.owasp.org/pipermail/owasp-luxemburg/}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Luxembourg&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
Join our [http://www.linkedin.com/groups?gid=1781989&amp;amp;trk=anetsrch_name&amp;amp;goback=.gdr_1238414238580_1 LinkedIn group]! &lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day 2016 - II  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day! The event will take place on 24 (trainings) and 25 (conference) November 2016, in Leuven - Belgium.&lt;br /&gt;
&lt;br /&gt;
See [[BeNeLux OWASP Day 2016-2]] for more details.&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day, March 17 &amp;amp;amp; 18, 2016 in Esch-sur-Alzette, Luxembourg  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce that like in 2011, the OWASP BeNeLux Day will be held in Belval Campus, Esch-sur-Alzette, Luxembourg.&lt;br /&gt;
More information on [http://www.owaspbenelux.eu www.owaspbenelux.eu]!&lt;br /&gt;
&lt;br /&gt;
=== OWASP AppSecEU 2015, 19-22 May 2015, Amsterdam, The Netherlands ===&lt;br /&gt;
The Luxembourg chapter is co-organizing together with Belgium and Netherlands chapters this amazing conference to be held in Amsterdam this spring!&lt;br /&gt;
More information on the [http://2015.appsec.eu conference website.]&lt;br /&gt;
&lt;br /&gt;
Hope to see you there!&lt;br /&gt;
&lt;br /&gt;
=== French translation of Top Ten ===&lt;br /&gt;
The Luxembourg chapter, in collaboration with other volunteers (French and Swiss) is currently involved in the French translation of the OWASP Top Ten for 2013 (available in release candidate here: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]).&lt;br /&gt;
&lt;br /&gt;
The final version of Top Ten should be available in May, and the French version should be available a few days after the release of the original version.&lt;br /&gt;
The document is usually translated into different languages (German, Spanish, Italian, Chinese, etc.)&lt;br /&gt;
&lt;br /&gt;
People potentially interested to contribute to the German translation, can contact the [[OWASP_German_Language_Project]].&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day 2011, December 1st &amp;amp;amp; 2nd 2011 @ University of Luxembourg  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce that OWASP BeNeLux Day 2011 will take place on December 1st &amp;amp;amp; 2nd 2011 at the University of Luxembourg. &lt;br /&gt;
&lt;br /&gt;
*'''December 1st 2011: Training Day'''&lt;br /&gt;
&lt;br /&gt;
OWASP Training: Secure Application Development, by Eoin Keary This intensive one-day training focuses on the most common web application security problems, including aspects of both the OWASP Top Ten (2010) and the MITRE Top 25. The training will introduce and demonstrate application assessment techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''December 2nd 2011: Conference Day'''&lt;br /&gt;
&lt;br /&gt;
List of confirmed speakers (more to be announced soon): &lt;br /&gt;
&lt;br /&gt;
*Brenno De Winter (Journalist) on the Diginotar story &lt;br /&gt;
*Koen Vanderloock (Lead Security Competence Group at Cegeka) on the new OWASP Simba project &lt;br /&gt;
*Justin Clarke (Director and Co-Founder of Gotham Digital Science Ltd) on practical crypto attacks against web applications &lt;br /&gt;
*Lieven Desmet (Research Manager at University Leuven) on HTML5 security &lt;br /&gt;
*Andrey Belenko (Chief Security Researcher at ElcomSoft Co. Ltd) on iOS data protection internals &lt;br /&gt;
*Alexandre Dulaunoy (Incident Management - Security Research at CIRCL) on dynamic malware analysis &lt;br /&gt;
*Ludovic Petit (Group Fraud &amp;amp;amp; Information Security Adviser at SFR, Vodafone Group) on WebApp Security and legal and regulatory aspects &lt;br /&gt;
*Seba Deleersnyder &amp;amp;amp; Eoin Keary (OWASP Board) on OWASP Update&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For more information and updates, please check out [http://www.owaspbenelux.eu/ www.owaspbenelux.eu] &lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring the event and the Luxembourg Chapter in 2012? Please contact Jocelyn Aubert (Jocelyn.Aubert[at]owasp.org)!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.yajug.org/ YAJUG] (Java User Group, Luxembourg)  ===&lt;br /&gt;
&lt;br /&gt;
The Luxembourg Chapter will participate to the next YAJUG (Java User Group, Luxembourg) event: &lt;br /&gt;
&lt;br /&gt;
'''YAJUG - How to Secure your Java Applications''' ''Wednesday, May 27th 2009 - 17:45'' &lt;br /&gt;
&lt;br /&gt;
[http://www.tudor.lu Centre de Recherche Public Henri Tudor] - 29, avenue John F. Kennedy - L-1855 Luxembourg-Kirchberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*17h45 - Welcome and registration &lt;br /&gt;
*18h00 - Introduction to Cryptography with JCA and JCE, Sébastien Stormacq, Sun Microsystems (French, slides in English) &lt;br /&gt;
*19h15 - [http://www.owasp.org/images/b/bb/2009-05-27_owasp%40yajug.ppt OWASP Top 10 Security Breaches for Java Web Applications], Jocelyn Aubert, OWASP-LU (French, slides in English) &lt;br /&gt;
*20h30 - Drink&lt;br /&gt;
&lt;br /&gt;
The whole program is available on [http://www.yajug.org/confluence/display/Public/Future+Events YAJUG website]. &lt;br /&gt;
&lt;br /&gt;
'''Note:''' This event is NOT an OWASP event! You have to register on YAJUG website (fee: 40 euros). &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.c3l.lu/ C3L] (Chaos Computer Club Lëtzebuerg)  ===&lt;br /&gt;
&lt;br /&gt;
''Monday, April 6th 2009'' - 20:00 (...until late in the night) &lt;br /&gt;
&lt;br /&gt;
Brasserie [http://www.seppl.lu/ Seppl] (Club-Room) - Luxembourg-Limpertsberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*15 minutes intro OWASP Luxembourg Chapter &lt;br /&gt;
*remaining time - Technical Chaos regarding OWASP&lt;br /&gt;
&lt;br /&gt;
== Chapter Board  ==&lt;br /&gt;
&lt;br /&gt;
The Luxembourg chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*ADELSBACH André &lt;br /&gt;
*AUBERT Jocelyn &lt;br /&gt;
*DULAUNOY Alexandre&lt;br /&gt;
*RIGHETTO Dominique &lt;br /&gt;
*STEICHEN Pascal&lt;br /&gt;
*ZOLLER Thierry&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors  ==&lt;br /&gt;
OWASP Luxembourg thanks its structural chapter supporters: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]] &lt;br /&gt;
[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
[[File:VeraCode logo.png|250px|link=https://www.veracode.com]]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg] &lt;br /&gt;
[http://www.intigriti.be https://www.owasp.org/images/5/54/Intigriti_verticaal.jpg]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/9/92/Ecurify-2016.png]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016-2&amp;diff=220091</id>
		<title>BeNeLux OWASP Day 2016-2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016-2&amp;diff=220091"/>
				<updated>2016-08-08T06:23:41Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: add header!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP_BeNeLux_Day_2016_II.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
&lt;br /&gt;
* The Call for speakers is open!&lt;br /&gt;
&lt;br /&gt;
== Call for Speakers ==&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec conferences are true security conferences with all talks and presentations focusing on various areas of information security. Topics should focus on the technical and social aspects of security, and should not contain marketing or sales pitches.&lt;br /&gt;
&lt;br /&gt;
We encourage and prioritize submissions covering research and new work impacting:&lt;br /&gt;
&lt;br /&gt;
* Secure development of web applications.&lt;br /&gt;
* Security testing of web applications.&lt;br /&gt;
* Security of DevOps processes, architectures, and tools.&lt;br /&gt;
* Security of applications designed for mobile devices.&lt;br /&gt;
* Security of Internet of Things devices and platforms.&lt;br /&gt;
* Cloud platform security&lt;br /&gt;
* Browser security&lt;br /&gt;
* HTML5 security&lt;br /&gt;
* OWASP tools or projects in practice&lt;br /&gt;
&lt;br /&gt;
'''Terms'''&lt;br /&gt;
&lt;br /&gt;
By your submission you agree to the OWASP [https://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement]. It requires that you use an OWASP [https://www.owasp.org/images/7/76/OWASP_Presentation_Template.zip presentation template] or other non-branded template. Presentations may not use company-themed decks or include a company logo except on the speaker bio slide. Failure to observe these requirements will result in talk removal.&lt;br /&gt;
&lt;br /&gt;
All presentation slides will be published on the conference website. Pictures and other materials in presentations should not violate any copyrights. Presentation submitters are solely liable for copyright violations. You may choose any [http://creativecommons.org/licenses Creative Commons] license for your slides, including CC0. OWASP [http://creativecommons.org/licenses suggests the use of open licenses].&lt;br /&gt;
&lt;br /&gt;
We will cover your travel expenses or costs for accommodations.&lt;br /&gt;
&lt;br /&gt;
'''Deadlines'''&lt;br /&gt;
&lt;br /&gt;
* Submission of proposal closes: 11 September, 2016 – 23:59&lt;br /&gt;
* Notification of acceptance: 2 October, 2016&lt;br /&gt;
* Conference Date:  25 November, 2016&lt;br /&gt;
&lt;br /&gt;
'''Submission'''&lt;br /&gt;
&lt;br /&gt;
To submit a proposal, please submit an abstract of your intended presentation (500 to 4000 characters), a brief biography (150 to 800 characters) and a headshot (combine multiple files in one zip file). Your planned presentation time is 40 minutes (excluding ~5 minutes for discussion and change of speaker). Feel free to attach a preliminary version of your presentation if available. Any proposal submitted is subject to a democratic vote by the program committee. Keep in mind: The better your description of the talk, the better picture the program committee will have to review your submission. Please proofread your submission; after approval your abstract, biography, and headshot will be published verbatim into the program and website.&lt;br /&gt;
&lt;br /&gt;
Submission page: https://easychair.org/conferences/?conf=owaspbenelux162&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* [[BeNeLux_OWASP_Day_2016#1st Speaker |TBD]]&lt;br /&gt;
* [[BeNeLux_OWASP_Day_2016#Stefan_Burgmair |Stefan Burgmair (OWASP Germany) ]]&lt;br /&gt;
* [[BeNeLux_OWASP_Day_2016#Erik_Poll |Erik Poll (Radboud University) ]]&lt;br /&gt;
* [[BeNeLux_OWASP_Day_2016#Arne_Swinnen | Arne Swinnen (Nviso)]]&lt;br /&gt;
* [[BeNeLux_OWASP_Day_2016#Glenn_Ten_Cate |Glenn Ten Cate]] &amp;amp; [[BeNeLux_OWASP_Day_2016#Riccardo_Ten_Cate | Riccardo Ten Cate ]]&lt;br /&gt;
* [[BeNeLux_OWASP_Day_2016#Christian Schneider | Christian Schneider]] &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* [[BeNeLux_OWASP_Day_2016#Michael_Hamm | Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)]]&lt;br /&gt;
* [[BeNeLux_OWASP_Day_2016#Kevin_Allix | Kevin Allix (University of Luxembourg)]]&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
= Trainingday =&lt;br /&gt;
=== Trainingday is November 24th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 4.320 !! Room 4.350 !! Room 4.360 !! Room 4.400&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | First training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Second training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Third training &lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Forth training  &lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Trainings ==&lt;br /&gt;
=== Placeholder ===&lt;br /&gt;
Some text&lt;br /&gt;
====Prerequisites for this workshop====&lt;br /&gt;
&lt;br /&gt;
== Trainers ==&lt;br /&gt;
===Placeholder===&lt;br /&gt;
Trainer information comes here&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is November 25th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;190pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
! width=&amp;quot;140pt&amp;quot; | Presentation&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 09h15&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Opening''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || 1st Speaker &lt;br /&gt;
|| 1st talk&lt;br /&gt;
|| TBD&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || 2nd Speaker&lt;br /&gt;
|| 2nd talk&lt;br /&gt;
|| TBD&lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || 3rd Speaker&lt;br /&gt;
|| 3rd talk&lt;br /&gt;
|| TBD&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || 4th Speaker&lt;br /&gt;
|| 4th Talk&lt;br /&gt;
|| TBD&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || 5th Speaker&lt;br /&gt;
|| 5th Talk&lt;br /&gt;
|| TBD&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || 6th Speaker&lt;br /&gt;
|| 6th Talk&lt;br /&gt;
|| TBD&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || 7th Speaker&lt;br /&gt;
|| 7th Talk&lt;br /&gt;
|| TBD&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Closing'' &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
=== Placeholder ===&lt;br /&gt;
== Speakers == &lt;br /&gt;
=== Placehoder===&lt;br /&gt;
Speaker information comes here&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event,starting at 7PM ==&lt;br /&gt;
Social Event information&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hosted and co-organized by === &lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_Day_2016_II.png&amp;diff=220090</id>
		<title>File:OWASP BeNeLux Day 2016 II.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_Day_2016_II.png&amp;diff=220090"/>
				<updated>2016-08-08T06:17:40Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Header for OWASP BeNeLux Day 2016 II&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Header for OWASP BeNeLux Day 2016 II&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=220089</id>
		<title>Luxembourg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=220089"/>
				<updated>2016-08-08T06:14:00Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Local News */ add OWASP BeNeLux Day 2016 II&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Luxembourg|extra=The chapter leader is [mailto:jocelyn.aubert@owasp.org Jocelyn Aubert]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-luxemburg|emailarchives=http://lists.owasp.org/pipermail/owasp-luxemburg/}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Luxembourg&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
Join our [http://www.linkedin.com/groups?gid=1781989&amp;amp;trk=anetsrch_name&amp;amp;goback=.gdr_1238414238580_1 LinkedIn group]! &lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day 2016 - II  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day! The event will take place on 24 (trainings) and 25 (conference) November 2016, in Leuven - Belgium.&lt;br /&gt;
&lt;br /&gt;
See [[BeNeLux OWASP Day 2016-2]] for more details.&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day, March 17 &amp;amp;amp; 18, 2016 in Esch-sur-Alzette, Luxembourg  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce that like in 2011, the OWASP BeNeLux Day will be held in Belval Campus, Esch-sur-Alzette, Luxembourg.&lt;br /&gt;
More information on [http://www.owaspbenelux.eu www.owaspbenelux.eu]!&lt;br /&gt;
&lt;br /&gt;
=== OWASP AppSecEU 2015, 19-22 May 2015, Amsterdam, The Netherlands ===&lt;br /&gt;
The Luxembourg chapter is co-organizing together with Belgium and Netherlands chapters this amazing conference to be held in Amsterdam this spring!&lt;br /&gt;
More information on the [http://2015.appsec.eu conference website.]&lt;br /&gt;
&lt;br /&gt;
Hope to see you there!&lt;br /&gt;
&lt;br /&gt;
=== French translation of Top Ten ===&lt;br /&gt;
The Luxembourg chapter, in collaboration with other volunteers (French and Swiss) is currently involved in the French translation of the OWASP Top Ten for 2013 (available in release candidate here: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]).&lt;br /&gt;
&lt;br /&gt;
The final version of Top Ten should be available in May, and the French version should be available a few days after the release of the original version.&lt;br /&gt;
The document is usually translated into different languages (German, Spanish, Italian, Chinese, etc.)&lt;br /&gt;
&lt;br /&gt;
People potentially interested to contribute to the German translation, can contact the [[OWASP_German_Language_Project]].&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day 2011, December 1st &amp;amp;amp; 2nd 2011 @ University of Luxembourg  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce that OWASP BeNeLux Day 2011 will take place on December 1st &amp;amp;amp; 2nd 2011 at the University of Luxembourg. &lt;br /&gt;
&lt;br /&gt;
*'''December 1st 2011: Training Day'''&lt;br /&gt;
&lt;br /&gt;
OWASP Training: Secure Application Development, by Eoin Keary This intensive one-day training focuses on the most common web application security problems, including aspects of both the OWASP Top Ten (2010) and the MITRE Top 25. The training will introduce and demonstrate application assessment techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''December 2nd 2011: Conference Day'''&lt;br /&gt;
&lt;br /&gt;
List of confirmed speakers (more to be announced soon): &lt;br /&gt;
&lt;br /&gt;
*Brenno De Winter (Journalist) on the Diginotar story &lt;br /&gt;
*Koen Vanderloock (Lead Security Competence Group at Cegeka) on the new OWASP Simba project &lt;br /&gt;
*Justin Clarke (Director and Co-Founder of Gotham Digital Science Ltd) on practical crypto attacks against web applications &lt;br /&gt;
*Lieven Desmet (Research Manager at University Leuven) on HTML5 security &lt;br /&gt;
*Andrey Belenko (Chief Security Researcher at ElcomSoft Co. Ltd) on iOS data protection internals &lt;br /&gt;
*Alexandre Dulaunoy (Incident Management - Security Research at CIRCL) on dynamic malware analysis &lt;br /&gt;
*Ludovic Petit (Group Fraud &amp;amp;amp; Information Security Adviser at SFR, Vodafone Group) on WebApp Security and legal and regulatory aspects &lt;br /&gt;
*Seba Deleersnyder &amp;amp;amp; Eoin Keary (OWASP Board) on OWASP Update&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For more information and updates, please check out [http://www.owaspbenelux.eu/ www.owaspbenelux.eu] &lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring the event and the Luxembourg Chapter in 2012? Please contact Jocelyn Aubert (Jocelyn.Aubert[at]owasp.org)!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.yajug.org/ YAJUG] (Java User Group, Luxembourg)  ===&lt;br /&gt;
&lt;br /&gt;
The Luxembourg Chapter will participate to the next YAJUG (Java User Group, Luxembourg) event: &lt;br /&gt;
&lt;br /&gt;
'''YAJUG - How to Secure your Java Applications''' ''Wednesday, May 27th 2009 - 17:45'' &lt;br /&gt;
&lt;br /&gt;
[http://www.tudor.lu Centre de Recherche Public Henri Tudor] - 29, avenue John F. Kennedy - L-1855 Luxembourg-Kirchberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*17h45 - Welcome and registration &lt;br /&gt;
*18h00 - Introduction to Cryptography with JCA and JCE, Sébastien Stormacq, Sun Microsystems (French, slides in English) &lt;br /&gt;
*19h15 - [http://www.owasp.org/images/b/bb/2009-05-27_owasp%40yajug.ppt OWASP Top 10 Security Breaches for Java Web Applications], Jocelyn Aubert, OWASP-LU (French, slides in English) &lt;br /&gt;
*20h30 - Drink&lt;br /&gt;
&lt;br /&gt;
The whole program is available on [http://www.yajug.org/confluence/display/Public/Future+Events YAJUG website]. &lt;br /&gt;
&lt;br /&gt;
'''Note:''' This event is NOT an OWASP event! You have to register on YAJUG website (fee: 40 euros). &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.c3l.lu/ C3L] (Chaos Computer Club Lëtzebuerg)  ===&lt;br /&gt;
&lt;br /&gt;
''Monday, April 6th 2009'' - 20:00 (...until late in the night) &lt;br /&gt;
&lt;br /&gt;
Brasserie [http://www.seppl.lu/ Seppl] (Club-Room) - Luxembourg-Limpertsberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*15 minutes intro OWASP Luxembourg Chapter &lt;br /&gt;
*remaining time - Technical Chaos regarding OWASP&lt;br /&gt;
&lt;br /&gt;
== Chapter Board  ==&lt;br /&gt;
&lt;br /&gt;
The Luxembourg chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*ADELSBACH André &lt;br /&gt;
*AUBERT Jocelyn &lt;br /&gt;
*DULAUNOY Alexandre&lt;br /&gt;
*RIGHETTO Dominique &lt;br /&gt;
*STEICHEN Pascal&lt;br /&gt;
*ZOLLER Thierry&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors  ==&lt;br /&gt;
OWASP Luxembourg thanks its structural chapter supporters: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]] &lt;br /&gt;
[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
[http://www.f5.com https://www.owasp.org/images/f/fd/AppSec_Research_2010_sponsor_F5_logo.jpg]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=211315</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=211315"/>
				<updated>2016-03-17T15:13:45Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Conferenceday */ add room&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[File:OWASP_BeNeLux_2016_logo.jpeg|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
* Kevin Allix (University of Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}, i.e. Maison du Savoir on the 4th floor.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 4.320 !! Room 4.350 !! Room 4.360 !! Room 4.400&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer ==&lt;br /&gt;
===Abstract===&lt;br /&gt;
This workshop is an introduction into (web) application security with hands-on labs, using OWASP documentation and tooling. You will be introduced into the security mindset, discus the OWASP TopTen 2013 and learn basic skills in how to find vulnerabilities in web applications. All tools and documentation are provided during the training.&lt;br /&gt;
As this is an hands-on workshop, please bring your own laptop!&lt;br /&gt;
&lt;br /&gt;
===Prerequisites for this workshop===&lt;br /&gt;
:Laptop with Virtualbox or VMware&lt;br /&gt;
:Basic understanding of HTTP and web application testing/development&lt;br /&gt;
:An open mind&lt;br /&gt;
===Martin Knobloch===&lt;br /&gt;
Martin is Principal Consultant at Nixu BeNeLux (https://www.nixu.com/en/nixubenelux). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&lt;br /&gt;
In2006, Martin got involved in OWASP when attending his first OWASP conference. He became a member of the OWASP Netherland Chapter board in 2007. He has contributed to several OWASP projects and is co-organizer of the OWASP BeNeLux-Day conference since 2008. Martin has been chair of the Global Education Committee from 2008 until the ending of the Global Committees. &lt;br /&gt;
Futher, Martin is the conference chair of the OWASP AppSec-Eu/Research 2015 conference in Amsterdam, the Netherlands and involved in the AppSec-Eu 2016 among other activities as CfT Co-Chair. &lt;br /&gt;
Martin is a frequent speaker at universities, hacker spaces and various conferences.&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling ==&lt;br /&gt;
=== Abstract ===&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) =====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder ===&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd ==&lt;br /&gt;
===Abstract ===&lt;br /&gt;
Want to learn the basics of Web App pen testing? Or would you prefer to develop new advanced pen testing tricks? Join the us for the lightning Security Shepherd Web Application training session that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the industry today. Compete against other participants and solve increasingly complex security puzzles derived from real world security threats. Attendees will leave with a real familiarity of web application pen testing best practice, terminology, workflow's and commonly used tool kits.&amp;lt;br&amp;gt;&lt;br /&gt;
===Prerequisites===&lt;br /&gt;
A Laptop Capable of Connecting to Internet on the day&lt;br /&gt;
You should have Java,&lt;br /&gt;
Java Installed, OWASP ZAP / Burpsuite Downloaded or Installed, Firefox is the browser of choice.&lt;br /&gt;
===Pol Mac Cana===&lt;br /&gt;
Paul is currently working as a Security Technical Team Lead and has over 6 years experience in infoSec. He has contributed to the OWASP Security Shepherd Project since its inception and has given training session utilising the tool to universities and educational bodies for a number of years. He received his MSc. in Information Security and Digital Forensics from ITB in Dublin&lt;br /&gt;
&lt;br /&gt;
== O-saft ==&lt;br /&gt;
=== Abstract ===&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Torsten Gigler === &lt;br /&gt;
* Torsten Gigler ... Internernal Security Advisor in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
The conference will take place at Maison du Savoir, 3rd floor, room 3.540.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || Kevin Allix || Challenges in Android Malware Detection&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2016 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
=== Kevin Allix - Challenges in Android Malware Detection ===&lt;br /&gt;
''Abstract:'' What is the state of Malware detection for Android? This talk will present a landscape of Android Malware and techniques used to (try and) detect Malware, with a focus on the limitations of the state-of-the-art detection methods.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' After a Master degree obtained in 2007, Kevin Allix held operational positions for four years during which he deployed and ran network security equipments for dozens of customers, and built tools to help administrate one of the biggest french Video-on-Demand platform. In 2011, he joined the University of Luxembourg to start a PhD at the 'Centre for Security, Reliability and Trust'. He is now a Research Associate at SnT - uni.lu where he keeps focusing on Android malware detection.&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event,starting at 7PM ==&lt;br /&gt;
&lt;br /&gt;
[http://urban.lu/urbannew/belval/ Urban Belval Bar &amp;amp; Restaurant]&lt;br /&gt;
:7 Avenue du Rock'n'Roll&lt;br /&gt;
:L- 4361Esch/Belval&lt;br /&gt;
:Au rez-de-chaussée du Plaza I, sortie Rockhal&lt;br /&gt;
:Phone: +352 26573281&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hosted and co-organized by === &lt;br /&gt;
[[Image:Uni_lu_CSC.jpg||link=http://csc.uni.lu]]&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]]&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
;[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
;[https://www.nixu.com/en/nixubenelux https://www.owasp.org/images/5/50/Nixu-logo.png]&lt;br /&gt;
;[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
;[http://www.securify.nl https://www.owasp.org/images/9/92/Ecurify-2016.png] &lt;br /&gt;
;[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
;[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
;[https://xebia.com/agile-security-risk-management https://www.owasp.org/images/f/f9/Logo_xebia.jpg]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=211308</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=211308"/>
				<updated>2016-03-17T06:39:58Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Trainingday */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[File:OWASP_BeNeLux_2016_logo.jpeg|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
* Kevin Allix (University of Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}, i.e. Maison du Savoir on the 4th floor.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 4.320 !! Room 4.350 !! Room 4.360 !! Room 4.400&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer ==&lt;br /&gt;
===Abstract===&lt;br /&gt;
This workshop is an introduction into (web) application security with hands-on labs, using OWASP documentation and tooling. You will be introduced into the security mindset, discus the OWASP TopTen 2013 and learn basic skills in how to find vulnerabilities in web applications. All tools and documentation are provided during the training.&lt;br /&gt;
As this is an hands-on workshop, please bring your own laptop!&lt;br /&gt;
&lt;br /&gt;
===Prerequisites for this workshop===&lt;br /&gt;
:Laptop with Virtualbox or VMware&lt;br /&gt;
:Basic understanding of HTTP and web application testing/development&lt;br /&gt;
:An open mind&lt;br /&gt;
===Martin Knobloch===&lt;br /&gt;
Martin is Principal Consultant at Nixu BeNeLux (https://www.nixu.com/en/nixubenelux). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&lt;br /&gt;
In2006, Martin got involved in OWASP when attending his first OWASP conference. He became a member of the OWASP Netherland Chapter board in 2007. He has contributed to several OWASP projects and is co-organizer of the OWASP BeNeLux-Day conference since 2008. Martin has been chair of the Global Education Committee from 2008 until the ending of the Global Committees. &lt;br /&gt;
Futher, Martin is the conference chair of the OWASP AppSec-Eu/Research 2015 conference in Amsterdam, the Netherlands and involved in the AppSec-Eu 2016 among other activities as CfT Co-Chair. &lt;br /&gt;
Martin is a frequent speaker at universities, hacker spaces and various conferences.&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling ==&lt;br /&gt;
=== Abstract ===&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) =====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
=== Sebastien Deleersnyder ===&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd ==&lt;br /&gt;
===Abstract ===&lt;br /&gt;
Want to learn the basics of Web App pen testing? Or would you prefer to develop new advanced pen testing tricks? Join the us for the lightning Security Shepherd Web Application training session that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the industry today. Compete against other participants and solve increasingly complex security puzzles derived from real world security threats. Attendees will leave with a real familiarity of web application pen testing best practice, terminology, workflow's and commonly used tool kits.&amp;lt;br&amp;gt;&lt;br /&gt;
===Prerequisites===&lt;br /&gt;
A Laptop Capable of Connecting to Internet on the day&lt;br /&gt;
You should have Java,&lt;br /&gt;
Java Installed, OWASP ZAP / Burpsuite Downloaded or Installed, Firefox is the browser of choice.&lt;br /&gt;
===Pol Mac Cana===&lt;br /&gt;
Paul is currently working as a Security Technical Team Lead and has over 6 years experience in infoSec. He has contributed to the OWASP Security Shepherd Project since its inception and has given training session utilising the tool to universities and educational bodies for a number of years. He received his MSc. in Information Security and Digital Forensics from ITB in Dublin&lt;br /&gt;
&lt;br /&gt;
== O-saft ==&lt;br /&gt;
=== Abstract ===&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Torsten Gigler === &lt;br /&gt;
* Torsten Gigler ... Internernal Security Advisor in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || Kevin Allix || Challenges in Android Malware Detection&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2016 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
=== Kevin Allix - Challenges in Android Malware Detection ===&lt;br /&gt;
''Abstract:'' What is the state of Malware detection for Android? This talk will present a landscape of Android Malware and techniques used to (try and) detect Malware, with a focus on the limitations of the state-of-the-art detection methods.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' After a Master degree obtained in 2007, Kevin Allix held operational positions for four years during which he deployed and ran network security equipments for dozens of customers, and built tools to help administrate one of the biggest french Video-on-Demand platform. In 2011, he joined the University of Luxembourg to start a PhD at the 'Centre for Security, Reliability and Trust'. He is now a Research Associate at SnT - uni.lu where he keeps focusing on Android malware detection.&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event,starting at 7PM ==&lt;br /&gt;
&lt;br /&gt;
[http://urban.lu/urbannew/belval/ Urban Belval Bar &amp;amp; Restaurant]&lt;br /&gt;
:7 Avenue du Rock'n'Roll&lt;br /&gt;
:L- 4361Esch/Belval&lt;br /&gt;
:Au rez-de-chaussée du Plaza I, sortie Rockhal&lt;br /&gt;
:Phone: +352 26573281&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hosted and co-organized by === &lt;br /&gt;
[[Image:Uni_lu_CSC.jpg||link=http://csc.uni.lu]]&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]]&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
;[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
;[https://www.nixu.com/en/nixubenelux https://www.owasp.org/images/5/50/Nixu-logo.png]&lt;br /&gt;
;[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
;[http://www.securify.nl https://www.owasp.org/images/9/92/Ecurify-2016.png] &lt;br /&gt;
;[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
;[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
;[https://xebia.com/agile-security-risk-management https://www.owasp.org/images/f/f9/Logo_xebia.jpg]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=210955</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=210955"/>
				<updated>2016-03-11T09:32:50Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[File:OWASP_BeNeLux_2016_logo.jpeg|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
* Kevin Allix (University of Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer by Martin Knobloch ==&lt;br /&gt;
Abstract:&lt;br /&gt;
This workshop is an introduction into (web) application security with hands-on labs, using OWASP documentation and tooling. You will be introduced into the security mindset, discus the OWASP TopTen 2013 and learn basic skills in how to find vulnerabilities in web applications. All tools and documentation are provided during the training.&lt;br /&gt;
As this is an hands-on workshop, please bring your own laptop!&lt;br /&gt;
&lt;br /&gt;
Prerequisites for this workshop:&lt;br /&gt;
:Laptop with Virtualbox or VMware&lt;br /&gt;
:Basic understanding of HTTP and web application testing/development&lt;br /&gt;
:An open mind&lt;br /&gt;
'''Martin Knobloch'''&lt;br /&gt;
Martin is Principal Consultant at Nixu BeNeLux (https://www.nixu.com/en/nixubenelux). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&lt;br /&gt;
In2006, Martin got involved in OWASP when attending his first OWASP conference. He became a member of the OWASP Netherland Chapter board in 2007. He has contributed to several OWASP projects and is co-organizer of the OWASP BeNeLux-Day conference since 2008. Martin has been chair of the Global Education Committee from 2008 until the ending of the Global Committees. &lt;br /&gt;
Futher, Martin is the conference chair of the OWASP AppSec-Eu/Research 2015 conference in Amsterdam, the Netherlands and involved in the AppSec-Eu 2016 among other activities as CfT Co-Chair. &lt;br /&gt;
Martin is a frequent speaker at universities, hacker spaces and various conferences.&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling by Sebastien Deleersnyder ==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) ====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
==== Sebastien Deleersnyder ====&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd by Pol Mac Cana  ==&lt;br /&gt;
Want to learn the basics of Web App pen testing? Or would you prefer to develop new advanced pen testing tricks? Join the us for the lightning Security Shepherd Web Application training session that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the industry today. Compete against other participants and solve increasingly complex security puzzles derived from real world security threats. Attendees will leave with a real familiarity of web application pen testing best practice, terminology, workflow's and commonly used tool kits.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Prerequisites'''&amp;lt;br&amp;gt;&lt;br /&gt;
A Laptop Capable of Connecting to Internet on the day&lt;br /&gt;
You should have Java,&lt;br /&gt;
Java Installed, OWASP ZAP / Burpsuite Downloaded or Installed.&amp;lt;br&amp;gt;&lt;br /&gt;
Paul is currently working as a Security Technical Team Lead and has over 6 years experience in infoSec. He has contributed to the OWASP Security Shepherd Project since its inception and has given training session utilising the tool to universities and educational bodies for a number of years. He received his MSc. in Information Security and Digital Forensics from ITB in Dublin&lt;br /&gt;
&lt;br /&gt;
== O-saft by Torsten Gigler ==&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio's ==== &lt;br /&gt;
* Torsten Gigler ... Internernal Security Advisor in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || Kevin Allix || Challenges in Android Malware Detection&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2016 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
=== Kevin Allix - Challenges in Android Malware Detection ===&lt;br /&gt;
''Abstract:'' What is the state of Malware detection for Android? This talk will present a landscape of Android Malware and techniques used to (try and) detect Malware, with a focus on the limitations of the state-of-the-art detection methods.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' After a Master degree obtained in 2007, Kevin Allix held operational positions for four years during which he deployed and ran network security equipments for dozens of customers, and built tools to help administrate one of the biggest french Video-on-Demand platform. In 2011, he joined the University of Luxembourg to start a PhD at the 'Centre for Security, Reliability and Trust'. He is now a Research Associate at SnT - uni.lu where he keeps focusing on Android malware detection.&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event ==&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hosted and co-organized by === &lt;br /&gt;
[[Image:Uni_lu_CSC.jpg||link=http://csc.uni.lu]]&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]]&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
;[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
;[https://www.nixu.com/en/nixubenelux https://www.owasp.org/images/5/50/Nixu-logo.png]&lt;br /&gt;
;[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
;[http://www.securify.nl https://www.owasp.org/images/9/92/Ecurify-2016.png] &lt;br /&gt;
;[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
;[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=210954</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=210954"/>
				<updated>2016-03-11T09:32:10Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Conferenceday */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[File:OWASP_BeNeLux_2016_logo.jpeg|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
* Kevin Allix (University of Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer by Martin Knobloch ==&lt;br /&gt;
Abstract:&lt;br /&gt;
This workshop is an introduction into (web) application security with hands-on labs, using OWASP documentation and tooling. You will be introduced into the security mindset, discus the OWASP TopTen 2013 and learn basic skills in how to find vulnerabilities in web applications. All tools and documentation are provided during the training.&lt;br /&gt;
As this is an hands-on workshop, please bring your own laptop!&lt;br /&gt;
&lt;br /&gt;
Prerequisites for this workshop:&lt;br /&gt;
:Laptop with Virtualbox or VMware&lt;br /&gt;
:Basic understanding of HTTP and web application testing/development&lt;br /&gt;
:An open mind&lt;br /&gt;
'''Martin Knobloch'''&lt;br /&gt;
Martin is Principal Consultant at Nixu BeNeLux (https://www.nixu.com/en/nixubenelux). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&lt;br /&gt;
In2006, Martin got involved in OWASP when attending his first OWASP conference. He became a member of the OWASP Netherland Chapter board in 2007. He has contributed to several OWASP projects and is co-organizer of the OWASP BeNeLux-Day conference since 2008. Martin has been chair of the Global Education Committee from 2008 until the ending of the Global Committees. &lt;br /&gt;
Futher, Martin is the conference chair of the OWASP AppSec-Eu/Research 2015 conference in Amsterdam, the Netherlands and involved in the AppSec-Eu 2016 among other activities as CfT Co-Chair. &lt;br /&gt;
Martin is a frequent speaker at universities, hacker spaces and various conferences.&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling by Sebastien Deleersnyder ==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) ====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
==== Sebastien Deleersnyder ====&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd by Pol Mac Cana  ==&lt;br /&gt;
Want to learn the basics of Web App pen testing? Or would you prefer to develop new advanced pen testing tricks? Join the us for the lightning Security Shepherd Web Application training session that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the industry today. Compete against other participants and solve increasingly complex security puzzles derived from real world security threats. Attendees will leave with a real familiarity of web application pen testing best practice, terminology, workflow's and commonly used tool kits.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Prerequisites'''&amp;lt;br&amp;gt;&lt;br /&gt;
A Laptop Capable of Connecting to Internet on the day&lt;br /&gt;
You should have Java,&lt;br /&gt;
Java Installed, OWASP ZAP / Burpsuite Downloaded or Installed.&amp;lt;br&amp;gt;&lt;br /&gt;
Paul is currently working as a Security Technical Team Lead and has over 6 years experience in infoSec. He has contributed to the OWASP Security Shepherd Project since its inception and has given training session utilising the tool to universities and educational bodies for a number of years. He received his MSc. in Information Security and Digital Forensics from ITB in Dublin&lt;br /&gt;
&lt;br /&gt;
== O-saft by Torsten Gigler ==&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio's ==== &lt;br /&gt;
* Torsten Gigler ... Internernal Security Advisor in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || Kevin Allix || Challenges in Android Malware Detection&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2016 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Kevin Allix - Challenges in Android Malware Detection ===&lt;br /&gt;
''Abstract:'' What is the state of Malware detection for Android? This talk will present a landscape of Android Malware and techniques used to (try and) detect Malware, with a focus on the limitations of the state-of-the-art detection methods.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' After a Master degree obtained in 2007, Kevin Allix held operational positions for four years during which he deployed and ran network security equipments for dozens of customers, and built tools to help administrate one of the biggest french Video-on-Demand platform. In 2011, he joined the University of Luxembourg to start a PhD at the 'Centre for Security, Reliability and Trust'. He is now a Research Associate at SnT - uni.lu where he keeps focusing on Android malware detection.&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event ==&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hosted and co-organized by === &lt;br /&gt;
[[Image:Uni_lu_CSC.jpg||link=http://csc.uni.lu]]&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]]&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
;[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
;[https://www.nixu.com/en/nixubenelux https://www.owasp.org/images/5/50/Nixu-logo.png]&lt;br /&gt;
;[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
;[http://www.securify.nl https://www.owasp.org/images/9/92/Ecurify-2016.png] &lt;br /&gt;
;[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
;[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=210953</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=210953"/>
				<updated>2016-03-11T09:30:31Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Confirmed speakers Conference */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[File:OWASP_BeNeLux_2016_logo.jpeg|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
* Kevin Allix (University of Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer by Martin Knobloch ==&lt;br /&gt;
Abstract:&lt;br /&gt;
This workshop is an introduction into (web) application security with hands-on labs, using OWASP documentation and tooling. You will be introduced into the security mindset, discus the OWASP TopTen 2013 and learn basic skills in how to find vulnerabilities in web applications. All tools and documentation are provided during the training.&lt;br /&gt;
As this is an hands-on workshop, please bring your own laptop!&lt;br /&gt;
&lt;br /&gt;
Prerequisites for this workshop:&lt;br /&gt;
:Laptop with Virtualbox or VMware&lt;br /&gt;
:Basic understanding of HTTP and web application testing/development&lt;br /&gt;
:An open mind&lt;br /&gt;
'''Martin Knobloch'''&lt;br /&gt;
Martin is Principal Consultant at Nixu BeNeLux (https://www.nixu.com/en/nixubenelux). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&lt;br /&gt;
In2006, Martin got involved in OWASP when attending his first OWASP conference. He became a member of the OWASP Netherland Chapter board in 2007. He has contributed to several OWASP projects and is co-organizer of the OWASP BeNeLux-Day conference since 2008. Martin has been chair of the Global Education Committee from 2008 until the ending of the Global Committees. &lt;br /&gt;
Futher, Martin is the conference chair of the OWASP AppSec-Eu/Research 2015 conference in Amsterdam, the Netherlands and involved in the AppSec-Eu 2016 among other activities as CfT Co-Chair. &lt;br /&gt;
Martin is a frequent speaker at universities, hacker spaces and various conferences.&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling by Sebastien Deleersnyder ==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) ====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
==== Sebastien Deleersnyder ====&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd by Pol Mac Cana  ==&lt;br /&gt;
Want to learn the basics of Web App pen testing? Or would you prefer to develop new advanced pen testing tricks? Join the us for the lightning Security Shepherd Web Application training session that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the industry today. Compete against other participants and solve increasingly complex security puzzles derived from real world security threats. Attendees will leave with a real familiarity of web application pen testing best practice, terminology, workflow's and commonly used tool kits.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Prerequisites'''&amp;lt;br&amp;gt;&lt;br /&gt;
A Laptop Capable of Connecting to Internet on the day&lt;br /&gt;
You should have Java,&lt;br /&gt;
Java Installed, OWASP ZAP / Burpsuite Downloaded or Installed.&amp;lt;br&amp;gt;&lt;br /&gt;
Paul is currently working as a Security Technical Team Lead and has over 6 years experience in infoSec. He has contributed to the OWASP Security Shepherd Project since its inception and has given training session utilising the tool to universities and educational bodies for a number of years. He received his MSc. in Information Security and Digital Forensics from ITB in Dublin&lt;br /&gt;
&lt;br /&gt;
== O-saft by Torsten Gigler ==&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio's ==== &lt;br /&gt;
* Torsten Gigler ... Internernal Security Advisor in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || Kevin Allix || Mobile Security&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2016 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event ==&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hosted and co-organized by === &lt;br /&gt;
[[Image:Uni_lu_CSC.jpg||link=http://csc.uni.lu]]&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]]&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
;[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
;[https://www.nixu.com/en/nixubenelux https://www.owasp.org/images/5/50/Nixu-logo.png]&lt;br /&gt;
;[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
;[http://www.securify.nl https://www.owasp.org/images/9/92/Ecurify-2016.png] &lt;br /&gt;
;[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
;[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=210291</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=210291"/>
				<updated>2016-03-02T15:36:03Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[File:OWASP_BeNeLux_2016_logo.jpeg|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer by Martin Knobloch ==&lt;br /&gt;
Abstract:&lt;br /&gt;
This workshop is an introduction into (web) application security with hands-on labs, using OWASP documentation and tooling. You will be introduced into the security mindset, discus the OWASP TopTen 2013 and learn basic skills in how to find vulnerabilities in web applications. All tools and documentation are provided during the training.&lt;br /&gt;
As this is an hands-on workshop, please bring your own laptop!&lt;br /&gt;
&lt;br /&gt;
Prerequisites for this workshop:&lt;br /&gt;
:Laptop with Virtualbox or VMware&lt;br /&gt;
:Basic understanding of HTTP and web application testing/development&lt;br /&gt;
:An open mind&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling by Sebastien Deleersnyder ==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) ====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
==== Sebastien Deleersnyder ====&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd by Mark Denihan ==&lt;br /&gt;
Want to learn the basics of Web App pen testing? Or would you prefer to develop new advanced pen testing tricks? Join the us for the lightning Security Shepherd Web Application training session that will bring attendees up to speed on all the latest and greatest security testing techniques that are a concern in the industry today. Compete against other participants and solve increasingly complex security puzzles derived from real world security threats. Attendees will leave with a real familiarity of web application pen testing best practice, terminology, workflow's and commonly used tool kits.&lt;br /&gt;
&lt;br /&gt;
== O-saft by Torsten Gigler ==&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio's ==== &lt;br /&gt;
* Torsten Gigler ... Internernal Security Advisor in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || Kevin Allix || Mobile Security&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2016 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event ==&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hosted and co-organized by === &lt;br /&gt;
[[Image:Uni_lu_CSC.jpg||link=http://csc.uni.lu]]&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]]&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png] &lt;br /&gt;
[https://www.nixu.com/en/nixubenelux https://www.owasp.org/images/1/1c/Nixu_CyberSecurity_logo_small.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=209543</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=209543"/>
				<updated>2016-02-24T10:43:45Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Hosted and co-organized by */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[File:OWASP_BeNeLux_2016_logo.jpeg|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Achim Hoffman &amp;amp; Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer by Martin Knobloch ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling by Sebastien Deleersnyder ==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) ====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
==== Sebastien Deleersnyder ====&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd by Mark Denihan ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== O-saft by Achim Hoffman &amp;amp; Torsten Gigler ==&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio's ==== &lt;br /&gt;
* Achim Hoffmann ... Starting with Linux/network security in the nineties. Achim Hoffmann has been working in web application security since more than 15 years. While working as a developer for web-application for several years he started concentrating on web application security as major subject in different roles like penetration tester, doing SCA and giving security workshops. He is author, co-author and maintainer of various papers about web application security at BSI (Germany), OWASP and WASC. He also published some tools (EnDe, EMiR, ReDoS, O-Saft) which aim to make web application security more visible. Achim is owner of sic[!]sec GmbH, Germany, a company that provides information security services. Outside work he is German OWASP Board Member and helps maintaining OWASP's mailing lists.&lt;br /&gt;
* Torsten Gigler ... Internernal Security Advisor in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || Kevin Allix || Mobile Security&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2016 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event ==&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hosted and co-organized by === &lt;br /&gt;
[[Image:Uni_lu_CSC.jpg||link=http://csc.uni.lu]]&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]]&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Uni_lu_CSC.jpg&amp;diff=209542</id>
		<title>File:Uni lu CSC.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Uni_lu_CSC.jpg&amp;diff=209542"/>
				<updated>2016-02-24T10:42:36Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Jocelyn.aubert uploaded a new version of &amp;amp;quot;File:Uni lu CSC.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Logo of the Computer Science and Communications Research Unit of the University of Luxembourg&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Uni_lu_CSC.jpg&amp;diff=209541</id>
		<title>File:Uni lu CSC.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Uni_lu_CSC.jpg&amp;diff=209541"/>
				<updated>2016-02-24T10:41:59Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Jocelyn.aubert uploaded a new version of &amp;amp;quot;File:Uni lu CSC.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Logo of the Computer Science and Communications Research Unit of the University of Luxembourg&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Uni_lu_CSC.jpg&amp;diff=209540</id>
		<title>File:Uni lu CSC.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Uni_lu_CSC.jpg&amp;diff=209540"/>
				<updated>2016-02-24T10:41:41Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Jocelyn.aubert uploaded a new version of &amp;amp;quot;File:Uni lu CSC.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Logo of the Computer Science and Communications Research Unit of the University of Luxembourg&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=209539</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=209539"/>
				<updated>2016-02-24T10:41:11Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Hosted and co-organized by */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[File:OWASP_BeNeLux_2016_logo.jpeg|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Achim Hoffman &amp;amp; Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer by Martin Knobloch ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling by Sebastien Deleersnyder ==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) ====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
==== Sebastien Deleersnyder ====&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd by Mark Denihan ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== O-saft by Achim Hoffman &amp;amp; Torsten Gigler ==&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio's ==== &lt;br /&gt;
* Achim Hoffmann ... Starting with Linux/network security in the nineties. Achim Hoffmann has been working in web application security since more than 15 years. While working as a developer for web-application for several years he started concentrating on web application security as major subject in different roles like penetration tester, doing SCA and giving security workshops. He is author, co-author and maintainer of various papers about web application security at BSI (Germany), OWASP and WASC. He also published some tools (EnDe, EMiR, ReDoS, O-Saft) which aim to make web application security more visible. Achim is owner of sic[!]sec GmbH, Germany, a company that provides information security services. Outside work he is German OWASP Board Member and helps maintaining OWASP's mailing lists.&lt;br /&gt;
* Torsten Gigler ... Internernal Security Advisor in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || Kevin Allix || Mobile Security&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2016 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event ==&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hosted and co-organized by === &lt;br /&gt;
[[Image:Bnl11-university-logo.jpg|link=http://wwwen.uni.lu]]&lt;br /&gt;
[[Image:Uni_lu_CSC.jpg|center||link=http://csc.uni.lu]]&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]]&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Uni_lu_CSC.jpg&amp;diff=209538</id>
		<title>File:Uni lu CSC.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Uni_lu_CSC.jpg&amp;diff=209538"/>
				<updated>2016-02-24T10:40:28Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Jocelyn.aubert uploaded a new version of &amp;amp;quot;File:Uni lu CSC.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Logo of the Computer Science and Communications Research Unit of the University of Luxembourg&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Uni_lu_CSC.jpg&amp;diff=209535</id>
		<title>File:Uni lu CSC.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Uni_lu_CSC.jpg&amp;diff=209535"/>
				<updated>2016-02-24T10:31:52Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Logo of the Computer Science and Communications Research Unit of the University of Luxembourg&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Logo of the Computer Science and Communications Research Unit of the University of Luxembourg&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=208853</id>
		<title>Luxembourg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=208853"/>
				<updated>2016-02-13T18:54:30Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* OWASP BeNeLux Day, March 17 &amp;amp;amp; 18, 2016 in Esch-sur-Alzette, Luxembourg */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Luxembourg|extra=The chapter leader is [mailto:jocelyn.aubert@owasp.org Jocelyn Aubert]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-luxemburg|emailarchives=http://lists.owasp.org/pipermail/owasp-luxemburg/}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Luxembourg&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
Join our [http://www.linkedin.com/groups?gid=1781989&amp;amp;trk=anetsrch_name&amp;amp;goback=.gdr_1238414238580_1 LinkedIn group]! &lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day, March 17 &amp;amp;amp; 18, 2016 in Esch-sur-Alzette, Luxembourg  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce that like in 2011, the OWASP BeNeLux Day will be held in Belval Campus, Esch-sur-Alzette, Luxembourg.&lt;br /&gt;
More information on [http://www.owaspbenelux.eu www.owaspbenelux.eu]!&lt;br /&gt;
&lt;br /&gt;
=== OWASP AppSecEU 2015, 19-22 May 2015, Amsterdam, The Netherlands ===&lt;br /&gt;
The Luxembourg chapter is co-organizing together with Belgium and Netherlands chapters this amazing conference to be held in Amsterdam this spring!&lt;br /&gt;
More information on the [http://2015.appsec.eu conference website.]&lt;br /&gt;
&lt;br /&gt;
Hope to see you there!&lt;br /&gt;
&lt;br /&gt;
=== French translation of Top Ten ===&lt;br /&gt;
The Luxembourg chapter, in collaboration with other volunteers (French and Swiss) is currently involved in the French translation of the OWASP Top Ten for 2013 (available in release candidate here: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]).&lt;br /&gt;
&lt;br /&gt;
The final version of Top Ten should be available in May, and the French version should be available a few days after the release of the original version.&lt;br /&gt;
The document is usually translated into different languages (German, Spanish, Italian, Chinese, etc.)&lt;br /&gt;
&lt;br /&gt;
People potentially interested to contribute to the German translation, can contact the [[OWASP_German_Language_Project]].&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day 2011, December 1st &amp;amp;amp; 2nd 2011 @ University of Luxembourg  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce that OWASP BeNeLux Day 2011 will take place on December 1st &amp;amp;amp; 2nd 2011 at the University of Luxembourg. &lt;br /&gt;
&lt;br /&gt;
*'''December 1st 2011: Training Day'''&lt;br /&gt;
&lt;br /&gt;
OWASP Training: Secure Application Development, by Eoin Keary This intensive one-day training focuses on the most common web application security problems, including aspects of both the OWASP Top Ten (2010) and the MITRE Top 25. The training will introduce and demonstrate application assessment techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''December 2nd 2011: Conference Day'''&lt;br /&gt;
&lt;br /&gt;
List of confirmed speakers (more to be announced soon): &lt;br /&gt;
&lt;br /&gt;
*Brenno De Winter (Journalist) on the Diginotar story &lt;br /&gt;
*Koen Vanderloock (Lead Security Competence Group at Cegeka) on the new OWASP Simba project &lt;br /&gt;
*Justin Clarke (Director and Co-Founder of Gotham Digital Science Ltd) on practical crypto attacks against web applications &lt;br /&gt;
*Lieven Desmet (Research Manager at University Leuven) on HTML5 security &lt;br /&gt;
*Andrey Belenko (Chief Security Researcher at ElcomSoft Co. Ltd) on iOS data protection internals &lt;br /&gt;
*Alexandre Dulaunoy (Incident Management - Security Research at CIRCL) on dynamic malware analysis &lt;br /&gt;
*Ludovic Petit (Group Fraud &amp;amp;amp; Information Security Adviser at SFR, Vodafone Group) on WebApp Security and legal and regulatory aspects &lt;br /&gt;
*Seba Deleersnyder &amp;amp;amp; Eoin Keary (OWASP Board) on OWASP Update&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For more information and updates, please check out [http://www.owaspbenelux.eu/ www.owaspbenelux.eu] &lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring the event and the Luxembourg Chapter in 2012? Please contact Jocelyn Aubert (Jocelyn.Aubert[at]owasp.org)!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.yajug.org/ YAJUG] (Java User Group, Luxembourg)  ===&lt;br /&gt;
&lt;br /&gt;
The Luxembourg Chapter will participate to the next YAJUG (Java User Group, Luxembourg) event: &lt;br /&gt;
&lt;br /&gt;
'''YAJUG - How to Secure your Java Applications''' ''Wednesday, May 27th 2009 - 17:45'' &lt;br /&gt;
&lt;br /&gt;
[http://www.tudor.lu Centre de Recherche Public Henri Tudor] - 29, avenue John F. Kennedy - L-1855 Luxembourg-Kirchberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*17h45 - Welcome and registration &lt;br /&gt;
*18h00 - Introduction to Cryptography with JCA and JCE, Sébastien Stormacq, Sun Microsystems (French, slides in English) &lt;br /&gt;
*19h15 - [http://www.owasp.org/images/b/bb/2009-05-27_owasp%40yajug.ppt OWASP Top 10 Security Breaches for Java Web Applications], Jocelyn Aubert, OWASP-LU (French, slides in English) &lt;br /&gt;
*20h30 - Drink&lt;br /&gt;
&lt;br /&gt;
The whole program is available on [http://www.yajug.org/confluence/display/Public/Future+Events YAJUG website]. &lt;br /&gt;
&lt;br /&gt;
'''Note:''' This event is NOT an OWASP event! You have to register on YAJUG website (fee: 40 euros). &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.c3l.lu/ C3L] (Chaos Computer Club Lëtzebuerg)  ===&lt;br /&gt;
&lt;br /&gt;
''Monday, April 6th 2009'' - 20:00 (...until late in the night) &lt;br /&gt;
&lt;br /&gt;
Brasserie [http://www.seppl.lu/ Seppl] (Club-Room) - Luxembourg-Limpertsberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*15 minutes intro OWASP Luxembourg Chapter &lt;br /&gt;
*remaining time - Technical Chaos regarding OWASP&lt;br /&gt;
&lt;br /&gt;
== Chapter Board  ==&lt;br /&gt;
&lt;br /&gt;
The Luxembourg chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*ADELSBACH André &lt;br /&gt;
*AUBERT Jocelyn &lt;br /&gt;
*DULAUNOY Alexandre&lt;br /&gt;
*RIGHETTO Dominique &lt;br /&gt;
*STEICHEN Pascal&lt;br /&gt;
*ZOLLER Thierry&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors  ==&lt;br /&gt;
OWASP Luxembourg thanks its structural chapter supporters: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]] &lt;br /&gt;
[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
[http://www.f5.com https://www.owasp.org/images/f/fd/AppSec_Research_2010_sponsor_F5_logo.jpg]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=208852</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=208852"/>
				<updated>2016-02-13T18:30:01Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: update the logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[File:OWASP_BeNeLux_2016_logo.jpeg|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Achim Hoffman &amp;amp; Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer by Martin Knobloch ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling by Sebastien Deleersnyder ==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) ====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
==== Sebastien Deleersnyder ====&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd by Mark Denihan ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== O-saft by Achim Hoffman &amp;amp; Torsten Gigler ==&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio's ==== &lt;br /&gt;
* Achim Hoffmann ... Starting with Linux/network security in the nineties. Achim Hoffmann has been working in web application security since more than 15 years. While working as a developer for web-application for several years he started concentrating on web application security as major subject in different roles like penetration tester, doing SCA and giving security workshops. He is author, co-author and maintainer of various papers about web application security at BSI (Germany), OWASP and WASC. He also published some tools (EnDe, EMiR, ReDoS, O-Saft) which aim to make web application security more visible. Achim is owner of sic[!]sec GmbH, Germany, a company that provides information security services. Outside work he is German OWASP Board Member and helps maintaining OWASP's mailing lists.&lt;br /&gt;
* Torsten Gigler ... Internernal Security Consultant in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || Kevin Allix || Mobile Security&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2016 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event ==&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hosted and co-organized by === &lt;br /&gt;
[[Image:Bnl11-university-logo.jpg|link=http://wwwen.uni.lu]] &lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_2016_logo.jpeg&amp;diff=208851</id>
		<title>File:OWASP BeNeLux 2016 logo.jpeg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_2016_logo.jpeg&amp;diff=208851"/>
				<updated>2016-02-13T18:28:59Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Jocelyn.aubert uploaded a new version of &amp;amp;quot;File:OWASP BeNeLux 2016 logo.jpeg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_2016_logo.jpeg&amp;diff=208850</id>
		<title>File:OWASP BeNeLux 2016 logo.jpeg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_2016_logo.jpeg&amp;diff=208850"/>
				<updated>2016-02-13T18:24:40Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_2015.png&amp;diff=208849</id>
		<title>File:OWASP BeNeLux 2015.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_2015.png&amp;diff=208849"/>
				<updated>2016-02-13T18:21:37Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Jocelyn.aubert uploaded a new version of &amp;amp;quot;File:OWASP BeNeLux 2015.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_2015.png&amp;diff=208848</id>
		<title>File:OWASP BeNeLux 2015.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_2015.png&amp;diff=208848"/>
				<updated>2016-02-13T18:18:59Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Jocelyn.aubert uploaded a new version of &amp;amp;quot;File:OWASP BeNeLux 2015.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=208847</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=208847"/>
				<updated>2016-02-13T18:16:00Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Add sponsors' logos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Achim Hoffman &amp;amp; Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer by Martin Knobloch ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling by Sebastien Deleersnyder ==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) ====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
==== Sebastien Deleersnyder ====&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd by Mark Denihan ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== O-saft by Achim Hoffman &amp;amp; Torsten Gigler ==&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio's ==== &lt;br /&gt;
* Achim Hoffmann ... Starting with Linux/network security in the nineties. Achim Hoffmann has been working in web application security since more than 15 years. While working as a developer for web-application for several years he started concentrating on web application security as major subject in different roles like penetration tester, doing SCA and giving security workshops. He is author, co-author and maintainer of various papers about web application security at BSI (Germany), OWASP and WASC. He also published some tools (EnDe, EMiR, ReDoS, O-Saft) which aim to make web application security more visible. Achim is owner of sic[!]sec GmbH, Germany, a company that provides information security services. Outside work he is German OWASP Board Member and helps maintaining OWASP's mailing lists.&lt;br /&gt;
* Torsten Gigler ... Internernal Security Consultant in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || Kevin Allix || Mobile Security&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2016 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event ==&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hosted and co-organized by === &lt;br /&gt;
[[Image:Bnl11-university-logo.jpg|link=http://wwwen.uni.lu]] &lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=208846</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=208846"/>
				<updated>2016-02-13T18:11:46Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Agenda */ Add the name of the speaker for Uni.lu on Mobile Security&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Julie Gommes&lt;br /&gt;
* Stefan Burgmair (OWASP Germany) &lt;br /&gt;
* Erik Poll (Radboud University)&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &amp;amp; Alvaro Muñoz (HPE)&lt;br /&gt;
* Michael Hamm (CIRCL - Computer Incident Response Center Luxembourg)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
'''University of Luxembourg'''&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Maison du Savoir'''&amp;lt;br/&amp;gt;&lt;br /&gt;
''2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette''&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Achim Hoffman &amp;amp; Torsten Gigler&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Primer by Martin Knobloch ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Hands-on Threat Modeling by Sebastien Deleersnyder ==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) ====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
==== Sebastien Deleersnyder ====&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
== Security Shepherd by Mark Denihan ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== O-saft by Achim Hoffman &amp;amp; Torsten Gigler ==&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
The use of SSL/TLS to protect the transport of data has become very common today. On the other hand it does not work pretty 'out of the box'. Furthermore it has more and more secuirty issues. As a consequence it often does not protect as assumed. It is often difficult to understand, what are the root causes of the issues, and how to detect and &lt;br /&gt;
finally avoid or fix them.&amp;lt;br&amp;gt;&lt;br /&gt;
This training will give a brief introduction to SSL, how it works i. g., what issues are related to the protocol, the PKI used, and the known vulnerabilities including potential attacks and provide tools to check for these issues. The main focus will be on SSL/TLS used in HTTPS. Other usages i.e. SSL for SMTP are a small subset. As a round-up there will be recommendations how to configure and maintain TLS securely.&lt;br /&gt;
&lt;br /&gt;
==== Course Topics ==== &lt;br /&gt;
The main part of the course will be a hands-on-training showing by example how to check the established TLS/SSL connection (including ciphers) to a web server and show how to analyse the provided certificate. Various tools will be explained. It will be demonstrated how these tools can be used to detect weaknesses in the TLS/SSL connection and such.&amp;lt;br&amp;gt;&lt;br /&gt;
The explained tools are for example: openssl, sslscan, testssl.sh, o-saft, and some more, as well as some online checking tools like ssllabs.com. We show what are these tools useful for, what they can do, and what they cannot. Finally we show how the OWASP tool o-saft can be used to cover most of the previous shown techniques and how to use its advanced features like:&lt;br /&gt;
* checking for ciphers&lt;br /&gt;
* checking for special SSL settings&lt;br /&gt;
* check multiple servers at a time&lt;br /&gt;
* customizing the results&lt;br /&gt;
* customizing o-saft itself&lt;br /&gt;
* or simple debugging of various SSL connection problems.&amp;lt;br&amp;gt;&lt;br /&gt;
The purpose of this course is to provide a tool set for checking TLS/SSL to the participants, and teach the participants how and when to use which tool, and why some tools do not provide complete results (e.g. protocols, ciphers). The course is about analysing TLS/SSL from a client-site view. It will not go into the details of fuzzing or even breaking TLS/SSL, or exploiting vulnerabilities. Mostly we will analyse HTTPS, furthermore we will provide some examples for protocols using STARTTLS, too (e.g. SMTP).&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally it will give system architects, administrator, or operational people, hints how to set-up and configure TLS/SSL in a proper secure way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Technical requirements ==== &lt;br /&gt;
The participants should bring their own laptop with any operating system (recommended is Linux) and at least following tools installed:&lt;br /&gt;
* openssl (1.0.1e or newer)&lt;br /&gt;
* perl (5.8 or newer), on windows system Strawberry perl is recommended&lt;br /&gt;
* Net::SSLeay (1.53 or newer), IO::Socket::SSL (1.37 or newer)&lt;br /&gt;
* Tcl (8.5) optional, on a windows system ActiveTcl (8.6) is recommended&lt;br /&gt;
* python (2.7) optional&amp;lt;br&amp;gt;&lt;br /&gt;
Optional, for smooth testing, a local SSL-enabled (SSLv2, SSLv3, TLS) web server should be running on the laptop (i.e. OWASP-BWA).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio's ==== &lt;br /&gt;
* Achim Hoffmann ... Starting with Linux/network security in the nineties. Achim Hoffmann has been working in web application security since more than 15 years. While working as a developer for web-application for several years he started concentrating on web application security as major subject in different roles like penetration tester, doing SCA and giving security workshops. He is author, co-author and maintainer of various papers about web application security at BSI (Germany), OWASP and WASC. He also published some tools (EnDe, EMiR, ReDoS, O-Saft) which aim to make web application security more visible. Achim is owner of sic[!]sec GmbH, Germany, a company that provides information security services. Outside work he is German OWASP Board Member and helps maintaining OWASP's mailing lists.&lt;br /&gt;
* Torsten Gigler ... Internernal Security Consultant in a large scale enterprise &amp;gt;15 years (ICT-Infrastructure- and Application Security). He has been volunteering for OWASP since more than 3 years: since 2 years co-developer of O-Saft, contributed to the Transport Layer Protection Cheat Sheet (Cipher Section), project leader 'OWASP Top 10 für Entwickler' / OWASP Top 10 for Developers, contributed to the German translation of OWASP-Top-10 2013, supported the Top_10_2013-Project: Review, Wiki.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Julie Gommes || Gamers, You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stefan Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || Kevin Allix || Mobile Security&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider &amp;amp; Alvaro Muñoz || Serial Killer: Silently Pwning your Java Endpoints&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2016 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== Julie Gommes - Gamers, You're the New Botnets ===&lt;br /&gt;
''Abstract:'' Downloading, playing, downloading, playing, downloading, playing, downloading, playing, downloading, playing... that is really funny.&lt;br /&gt;
You can try new games every day but the guys who share those games are not just happy and funny people doing that just for pleasure to share &amp;quot;games&amp;quot;.&lt;br /&gt;
Yeas, they're sharing games, but lot of other Tools they enjoy to play with...&lt;br /&gt;
Let's talk about malwares, about botnets, about backdoors and about some computer which can win a &amp;quot;botnet award&amp;quot;.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Julie Gommes is a cybersecurity contractor, working in Paris on risk analysis, Security gap analysis, Security in project management, Audit, CISO support. She is also trainer for exposed professionals (journalists, lawyers, HR, employees of NGOs ...). https://fr.linkedin.com/in/juliegommes; Twitter : @JujuSete&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Stefan Burgmair - OWASP Top 10 Privacy Risks ===&lt;br /&gt;
''Abstract:'' There are lively discussions about how to protect personal data especially with the upcoming EU Data Protection Regulation that requires Privacy by Design. But still there was no independent description of privacy risks specifically for web applications available. Thus, companies lack guidance to identify and avoid privacy risks during systems development. Therefore the OWASP Top 10 Privacy Risks project developed a list of the top 10 privacy risks in web applications. The project covers technical and organizational aspects like missing encryption or insufficient transparency and results and practical countermeasures are presented in this session.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Stefan Burgmair is a German security and privacy consultant at msg systems in Munich. He wrote his Master Thesis in information systems and management about the “Top 10 Privacy Risks for Web Applications” and continues to deliver key content for the project.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Erik Poll - LangSec meets State Machines ===&lt;br /&gt;
''Abstract:'' Language-theoretic Security, or LangSec for short, provides&lt;br /&gt;
useful insights into the root causes of an important class&lt;br /&gt;
security flaws - namely flaws in handling input - and ways to&lt;br /&gt;
avoid these. This talk will discuss the core ideas of LangSec and&lt;br /&gt;
the relation with security research we have done at over the&lt;br /&gt;
years, where we used state machines as a means to systematically&lt;br /&gt;
investigate GSM, bank cards, internet banking tokens, and TLS.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Erik Poll is Associate Professor in the Digital Security group of&lt;br /&gt;
the Radboud University in Nijmegen. His research interests&lt;br /&gt;
include smart cards, security protocols, the security of payment&lt;br /&gt;
systems and smart grids, and formal methods that can improve&lt;br /&gt;
security by providing a rigorous basis for design, analysis, and&lt;br /&gt;
testing.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Christian Schneider &amp;amp; Alvaro Muñoz - Serial Killer: Silently Pwning your Java Endpoints ===&lt;br /&gt;
''Abstract:'' In this session we begin with modelling the attack surface of Java deserialization, which often leads to remote code execution (RCE), by showcasing vulnerabilities we found in modern and widely used applications and frameworks. We extend existing research about risks of deserialization broadening the attack surface. After a live demo of getting a Meterpreter shell in a modern Java endpoint setup we delve into the exploitation styles for this vulnerability to lay the foundation of the first of three key takeaways for the attendees. The first key takeaway is identification of test types that should be executed during a dynamic assessment of an application in order to find this kind of vulnerability. This includes analyzing the deserialization interface and using blackbox tests to create payloads with gadgets matching the application’s classpath to verify the RCE. Discussion extends to cover indirect deserialization interfaces that use non-binary data formats, such as XML-based interfaces, which can also act as a driver for deserialization within the application. The next key takeaway covers the realm of static code analysis (SAST). We present code patterns security reviewers should look for when doing whitebox assessments of applications or frameworks. This is especially interesting for code offering dynamic functionality including AOP, generic mappings, reflection, interceptors, etc. - all of which have a high probability of including code that can facilitate as deserialization gadgets and thus help the attackers in exploiting deserialization vulnerabilities. In this section we present the techniques used to find the vulnerabilities within the popular frameworks showcased during the live demo at the session’s start. Finally we conclude with tips on implementing different techniques of hardening measures for applications offering deserialisation interfaces (either direct binary deserialization interfaces or indirect XML-based ones) to give the attendees the third key takeaway: protecting applications properly. This includes ways to verify data integrity prior to deserialization and ways to properly inspect the data before it’s handled by the Java deserialization process.&lt;br /&gt;
&lt;br /&gt;
''Bio's:'' &lt;br /&gt;
* Christian Schneider (@cschneider4711) writes software since the nineties, works as a freelance software developer since 1997, focuses on Java since 1999 and on IT-Security - especially Pentesting - since 2005. He enjoys writing articles about web application security as well as speaks and trains at conferences (OWASP AppSecEU, JAX, WJAX, WebTechCon, DevOpsCon, HackPra, RSA). He blogs at [https://www.Christian-Schneider.net Christian-Schneider.net]&lt;br /&gt;
* Alvaro Muñoz (@pwntester) works as Principal Security Researcher with HPE Security Fortify. He enjoys researching different programming languages and web application frameworks for vulnerabilities and unsafe APIs. Before joining the HPE research team, he worked as an Application Security Consultant helping enterprises to start and improve their application security programs. He blogs at [http://www.pwntester.com pwntester.com]&lt;br /&gt;
&lt;br /&gt;
=== Michael Hamm - Experiences with Paste-Monitoring ===&lt;br /&gt;
''Abstract:'' Paste platforms like Pastebin.com provide the possibility to store and share text online. Often this kind of services are used by programmers but also abused by attackers to present their achievements. CIRCL acts as a fire brigade and monitor several of those paste platforms to early detect potential incidents and help the victims. The findings vary from lists of vulnerable or compromised websites, leaked credentials, database dumps, opportunistic announcements, stolen credit card details and many more. We will present the used techniques, and some key experiences with the findings and introduce the AIL framework - Framework for Analysis of Information Leaks. AIL is designed to analyse unstructured data and identify potential data leaks.&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Works since 2000 in the field of security and since 2010 as CIRCL Operator.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Glenn ten Cate, Riccardo ten Cate -- Security knowledge framework ===&lt;br /&gt;
Over 10 years of experience in web application security bundled into a single application. &amp;lt;br/&amp;gt;&lt;br /&gt;
The Security Knowledge Framework is a vital asset to the coding toolkit of you and your development team. &amp;lt;br/&amp;gt;&lt;br /&gt;
Use SKF to learn and integrate security by design in your web application.&lt;br /&gt;
&lt;br /&gt;
SKF is an open source security knowledgebase including manageble projects with checklists and best practice code examples in multiple programming languages showing &amp;lt;br/&amp;gt;&lt;br /&gt;
you how to prevent hackers gaining access and running exploits on your application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;We will be talking about:&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Training your developers in writing secure code&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support pre-development (Security by design, early feedback of possible security issues)&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Security support post-development(Double check your code by means of the OWASP ASVS checklists )&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Code examples for secure coding&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;quot;Bio:&amp;quot;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Glenn&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher Glenn has over 10 years experience in the field of security. &amp;lt;br/&amp;gt;&lt;br /&gt;
His goal is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Riccardo&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
As a developer and penetration tester Riccardo specialises in web-application security and&amp;lt;br/&amp;gt;&lt;br /&gt;
has extensive knowledge in securing web applications in multiple coding languages.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event ==&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=207571</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=207571"/>
				<updated>2016-01-27T15:44:49Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Sponsor */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Announcement  ==&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== News ==&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers for Trainingday ==&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Stephen Burgmair (OWASP Germany) &lt;br /&gt;
* Jullie Gommes&lt;br /&gt;
* Erik Poll&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &lt;br /&gt;
* Michael Hamm (CIRCL)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training day and conference are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue is  ==&lt;br /&gt;
&lt;br /&gt;
University of Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
Maison du Savoir&amp;lt;br/&amp;gt;&lt;br /&gt;
2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
==== By train ====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
=== Trainingday is March 17th  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Achim Hoffman&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Training Abstracts ==&lt;br /&gt;
The training abstracts will be available soon&lt;br /&gt;
&lt;br /&gt;
=== Application Security Primer by Martin Knobloch ===&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
=== Hands-on Threat Modeling by Sebastien Deleersnyder ===&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
==== Course topics (1 day) ====&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
==== Threat Modeling – real life use cases ====&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
==== Sebastien Deleersnyder ====&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
=== Security Shepherd by Mark Denihan ===&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
=== O-saft by Achim Hoffman ===&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is March 18th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Jullie Gommes || Gamers You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stephen Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || University Luxembourg || Mobile Security&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider || Java Deserialization Security Issues&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2015 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Arne Swinnen - The Tales of a Bug Bounty Hunter ===&lt;br /&gt;
''Abstract:'' Bug bounty hunting is the new black! During this technical talk, several interesting vulnerabilities identified in Instagram, the increasingly-popular photo-based social media platform, will be presented.&amp;lt;br&amp;gt;&lt;br /&gt;
All vulnerabilities were disclosed responsibly via Facebook’s Public Bug Bounty program over the course of 2015 and 2016, and will be discussed in detail. Required advanced Mobile Security attack techniques for this Research, such as Binary Modification, Dynamic Hooking and Burp Suite Plugin Development will be covered, among other trickery.&amp;lt;br&amp;gt;&lt;br /&gt;
The most interesting vulnerabilities were hybrid: Combinations of complementary vulnerabilities in different environments (e.g. Web and Mobile). All identified issues’ root causes will be mapped onto the Software Development Life Cycle (SDLC), to analyze where they could have been prevented from materializing. Last but not least, the monetary rewards offered by Facebook for each vulnerability and general Bug Bounty Hunting advice will be shared with the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fame''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event ==&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
== Capture the Flag! ==&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Promotion  ==&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 150 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=207548</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=207548"/>
				<updated>2016-01-27T12:43:13Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Announcement  ===&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
=== OWASP BeNeLux Postponement  ===&lt;br /&gt;
&lt;br /&gt;
To allow a better organization of BeNeLux OWASP Day, the conference originally scheduled end of November, will be shifted in '''&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;March 2016&amp;lt;/span&amp;gt;'''. More information soon.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Stephen Burgmair (OWASP Germany) &lt;br /&gt;
* Jullie Gommes&lt;br /&gt;
* Erik Poll&lt;br /&gt;
* Arne Swinnen (Nviso)&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &lt;br /&gt;
* Michael Hamm (CIRCL)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free, but registration is required! ==== &lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
==== Venue is  ====&lt;br /&gt;
&lt;br /&gt;
University of Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
Maison du Savoir&amp;lt;br/&amp;gt;&lt;br /&gt;
2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette&lt;br /&gt;
&lt;br /&gt;
==== How to reach the venue? ====&lt;br /&gt;
&lt;br /&gt;
===== By car =====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
===== By train =====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
===== Hotel nearby =====&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday  ====&lt;br /&gt;
The training abstracts will be available soon&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Achim Hoffman&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Application Security Primer by Martin Knobloch==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Hands-on Threat Modeling by Sebastien Deleersnyder==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
===Course topics (1 day)===&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
===Threat Modeling – real life use cases===&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
===Sebastien Deleersnyder===&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
==Security Shepherd by Mark Denihan==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==O-saft by Achim Hoffman==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
==== Conferenceday, March 18th  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Jullie Gommes || Gamers You're the new Botnets&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || Stephen Burgmair || OWASP Top 10 Privacy Risks &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || Erik Poll || LangSec meets State Machines&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || Arne Swinnen || The Tales of a Bug Bounty Hunter&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || Glenn &amp;amp; Riccardo Ten Cate || OWASP Secure Knowledge Framework (SKF)&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || University Luxembourg || Mobile Security&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Christian Schneider || Java Deserialization Security Issues&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Michael Hamm || Experiences with Paste-Monitoring&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2015 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Arne Swinnen - The Tales of a Bug Bounty Hunter'''&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:'' Arne Swinnen is an IT Security Consultant at NVISO, a Belgian Cyber Security Consulting firm. Arne specializes in Application Security and Digital Forensics. He co-organized the first edition of the Cyber Security Challenge Belgium in 2015, a National cyber security competition designed exclusively for Belgian students.&amp;lt;br&amp;gt;&lt;br /&gt;
Arne was a speaker at Black Hat USA and BruCON in 2014, presenting novel anti-virus detection and evasion techniques (“One Packer to Rule Them All”). Since 2015, he is also listed on Facebook’s Bug Bounty Half of Fam''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event ====&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=207541</id>
		<title>BeNeLux OWASP Day 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2016&amp;diff=207541"/>
				<updated>2016-01-27T09:01:19Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Announcement  ===&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on &amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;17 and 18 March 2016&amp;lt;/span&amp;gt;, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{#switchtablink:Registration| Don't wait and register now!}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
=== OWASP BeNeLux Postponement  ===&lt;br /&gt;
&lt;br /&gt;
To allow a better organization of BeNeLux OWASP Day, the conference originally scheduled end of November, will be shifted in '''&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;March 2016&amp;lt;/span&amp;gt;'''. More information soon.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Stephen Burgmair (OWASP Germany) &lt;br /&gt;
* Jullie Gommes&lt;br /&gt;
* Erik Poll&lt;br /&gt;
* Arne Swinnen&lt;br /&gt;
* Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
* Christian Schneider &lt;br /&gt;
* Michael Hamm &amp;amp; Alexandre Dulaunoy (CIRCL)&lt;br /&gt;
* and a Mysterious speaker from Luxembourg University&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl16 #owaspbnl16]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free, but registration is required! ==== &lt;br /&gt;
&lt;br /&gt;
Register today at https://owasp-benelux-day-2016.eventbrite.com . We only have a limited number of seats available for our trainings and conference. First come, first serve!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
==== Venue is  ====&lt;br /&gt;
&lt;br /&gt;
University of Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
Maison du Savoir&amp;lt;br/&amp;gt;&lt;br /&gt;
2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette&lt;br /&gt;
&lt;br /&gt;
==== How to reach the venue? ====&lt;br /&gt;
&lt;br /&gt;
===== By car =====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
===== By train =====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
===== Hotel nearby =====&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday  ====&lt;br /&gt;
The training abstracts will be available soon&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training venue is at the same location as the {{#switchtablink:Venue|conference venue}}.&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Application Security Primer by Martin Knobloch&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Hands-on Threat Modeling by Sebastien Deleersnyder&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Security Shepherd by Mark Denihan&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | O-saft by Achim Hoffman&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Application Security Primer by Martin Knobloch==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Hands-on Threat Modeling by Sebastien Deleersnyder==&lt;br /&gt;
&lt;br /&gt;
This is a 1 day, trainer-led, on-site, Threat Modeling course. The training material and hands-on workshops include real live Use Cases. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
&lt;br /&gt;
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. The security objectives, threats, and attacks modeling activities during the threat modeling are designed to help you find vulnerabilities in your application. You can use the identified vulnerabilities to help shape your design and direct and scope your security testing.&lt;br /&gt;
&lt;br /&gt;
Threat modeling allows you to consider, document, and discuss the security implications of designs in the context of their planned operational environment and in a structured fashion. Threat modeling also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model.&lt;br /&gt;
&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications and databases. The students should bring their own laptop to the course.&lt;br /&gt;
&lt;br /&gt;
===Course topics (1 day)===&lt;br /&gt;
&lt;br /&gt;
Threat modeling introduction&lt;br /&gt;
*Threat modeling in a secure development lifecycle&lt;br /&gt;
*What is threat modeling&lt;br /&gt;
*Why threat modeling?&lt;br /&gt;
*Threat modeling stages&lt;br /&gt;
*Diagrams&lt;br /&gt;
*Identify threats&lt;br /&gt;
*Addressing threats&lt;br /&gt;
*Document a threat model&lt;br /&gt;
Diagrams – what are you building?&lt;br /&gt;
*Understanding context&lt;br /&gt;
*Doomsday scenarios&lt;br /&gt;
*Data flow diagrams&lt;br /&gt;
*Trust Boundaries&lt;br /&gt;
*'''Hands-on: diagram B2B web and mobile applications, sharing the same REST backend'''&lt;br /&gt;
Identifying threats – what can go wrong?&lt;br /&gt;
*STRIDE introduction&lt;br /&gt;
*Spoofing threats&lt;br /&gt;
*Tampering threats&lt;br /&gt;
*Repudiation threats&lt;br /&gt;
*Information disclosure threats&lt;br /&gt;
*Denial of service threats&lt;br /&gt;
*Elevation of privilege threats&lt;br /&gt;
*'''Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service'''&lt;br /&gt;
Addressing each threat&lt;br /&gt;
*Mitigation patterns&lt;br /&gt;
*Authentication: mitigating spoofing&lt;br /&gt;
*Integrity: mitigating tampering&lt;br /&gt;
*Non-repudiation: mitigating repudiation&lt;br /&gt;
*Confidentiality: mitigating information disclosure&lt;br /&gt;
*Availability: mitigating denial of service&lt;br /&gt;
*Authorization: mitigating elevation of privilege&lt;br /&gt;
Threat modeling tools&lt;br /&gt;
*General tools&lt;br /&gt;
*Open-Source tools&lt;br /&gt;
*Commercial tools&lt;br /&gt;
&lt;br /&gt;
The course students receive the following package as part of the course:&lt;br /&gt;
*Hand-outs of the presentations&lt;br /&gt;
*Work sheets of the use cases,&lt;br /&gt;
*Detailed solution descriptions of the use cases&lt;br /&gt;
*Template to document a threat model&lt;br /&gt;
*Template to calculate risk levels of identified threats&lt;br /&gt;
The students should bring their own laptop &lt;br /&gt;
&lt;br /&gt;
===Threat Modeling – real life use cases===&lt;br /&gt;
As highly skilled professionals with years of experience under our belts we know that there is a gap between academic knowledge of threat modeling and the real world.&lt;br /&gt;
In order to minimize that gap we have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops we provide our students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.&lt;br /&gt;
The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:&lt;br /&gt;
*B2B web and mobile applications, sharing the same REST backend&lt;br /&gt;
*An Internet of Things (IoT) deployment with an on premise gateway and cloud-based secure update service&lt;br /&gt;
After each hands-on workshop, the results are discussed, and the students receive a documented solution.&lt;br /&gt;
&lt;br /&gt;
===Sebastien Deleersnyder===&lt;br /&gt;
Sebastien Deleersnyder, managing partner and application security consultant at [http://www.toreon.com Toreon] will share his practical threat model experience. Sebastien led engagements in the domain of ICT-security, Web and Mobile Security with several customers including BNP Paribas Fortis, Atos Worldline, KBC, Nationale Nederlanden (ING), Isabel, Fluxys, OLAF, EU Council, TNT Post , Flemish Community, Agfa-Gevaert and ING Insurance International. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.&lt;br /&gt;
&lt;br /&gt;
==Security Shepherd by Mark Denihan==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==O-saft by Achim Hoffman==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
==== Conferenceday, March 18th  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;180pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 09h10&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || Gamers You're the new Botnets || Jullie Gommes&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || OWASP Top 10 Privacy Risks || Stephen Burgmair &lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || LangSec meets State Machines || Erik Poll&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || The Tales of a Bug Bounty Hunter: 10+ Interesting Vulnerabilities in Instagram || Arne Swinnen&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || OWASP Secure Knowledge Framework (SKF) || Glenn &amp;amp; Riccardo Ten Cate&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || Mobile Security || University Luxembourg&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 || Java Deserialization Security Issues || Christian Schneider&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || Experiences with Paste-Monitoring || Michael Hamm&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30 || OWASP Benelux 2015 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
=== Key note: TBD ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event ====&lt;br /&gt;
'''Wait for it...'''&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2016!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=205619</id>
		<title>Luxembourg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=205619"/>
				<updated>2015-12-29T15:54:34Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Luxembourg|extra=The chapter leader is [mailto:jocelyn.aubert@owasp.org Jocelyn Aubert]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-luxemburg|emailarchives=http://lists.owasp.org/pipermail/owasp-luxemburg/}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Luxembourg&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
Join our [http://www.linkedin.com/groups?gid=1781989&amp;amp;trk=anetsrch_name&amp;amp;goback=.gdr_1238414238580_1 LinkedIn group]! &lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day, March 17 &amp;amp;amp; 18, 2016 in Esch-sur-Alzette, Luxembourg  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce that like in 2011, the OWASP BeNeLux Day will be held in Belval Campus, Esch-sur-Alzette, Luxembourg.&lt;br /&gt;
More information to follow, stay tuned!&lt;br /&gt;
&lt;br /&gt;
=== OWASP AppSecEU 2015, 19-22 May 2015, Amsterdam, The Netherlands ===&lt;br /&gt;
The Luxembourg chapter is co-organizing together with Belgium and Netherlands chapters this amazing conference to be held in Amsterdam this spring!&lt;br /&gt;
More information on the [http://2015.appsec.eu conference website.]&lt;br /&gt;
&lt;br /&gt;
Hope to see you there!&lt;br /&gt;
&lt;br /&gt;
=== French translation of Top Ten ===&lt;br /&gt;
The Luxembourg chapter, in collaboration with other volunteers (French and Swiss) is currently involved in the French translation of the OWASP Top Ten for 2013 (available in release candidate here: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]).&lt;br /&gt;
&lt;br /&gt;
The final version of Top Ten should be available in May, and the French version should be available a few days after the release of the original version.&lt;br /&gt;
The document is usually translated into different languages (German, Spanish, Italian, Chinese, etc.)&lt;br /&gt;
&lt;br /&gt;
People potentially interested to contribute to the German translation, can contact the [[OWASP_German_Language_Project]].&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day 2011, December 1st &amp;amp;amp; 2nd 2011 @ University of Luxembourg  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce that OWASP BeNeLux Day 2011 will take place on December 1st &amp;amp;amp; 2nd 2011 at the University of Luxembourg. &lt;br /&gt;
&lt;br /&gt;
*'''December 1st 2011: Training Day'''&lt;br /&gt;
&lt;br /&gt;
OWASP Training: Secure Application Development, by Eoin Keary This intensive one-day training focuses on the most common web application security problems, including aspects of both the OWASP Top Ten (2010) and the MITRE Top 25. The training will introduce and demonstrate application assessment techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''December 2nd 2011: Conference Day'''&lt;br /&gt;
&lt;br /&gt;
List of confirmed speakers (more to be announced soon): &lt;br /&gt;
&lt;br /&gt;
*Brenno De Winter (Journalist) on the Diginotar story &lt;br /&gt;
*Koen Vanderloock (Lead Security Competence Group at Cegeka) on the new OWASP Simba project &lt;br /&gt;
*Justin Clarke (Director and Co-Founder of Gotham Digital Science Ltd) on practical crypto attacks against web applications &lt;br /&gt;
*Lieven Desmet (Research Manager at University Leuven) on HTML5 security &lt;br /&gt;
*Andrey Belenko (Chief Security Researcher at ElcomSoft Co. Ltd) on iOS data protection internals &lt;br /&gt;
*Alexandre Dulaunoy (Incident Management - Security Research at CIRCL) on dynamic malware analysis &lt;br /&gt;
*Ludovic Petit (Group Fraud &amp;amp;amp; Information Security Adviser at SFR, Vodafone Group) on WebApp Security and legal and regulatory aspects &lt;br /&gt;
*Seba Deleersnyder &amp;amp;amp; Eoin Keary (OWASP Board) on OWASP Update&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For more information and updates, please check out [http://www.owaspbenelux.eu/ www.owaspbenelux.eu] &lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring the event and the Luxembourg Chapter in 2012? Please contact Jocelyn Aubert (Jocelyn.Aubert[at]owasp.org)!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.yajug.org/ YAJUG] (Java User Group, Luxembourg)  ===&lt;br /&gt;
&lt;br /&gt;
The Luxembourg Chapter will participate to the next YAJUG (Java User Group, Luxembourg) event: &lt;br /&gt;
&lt;br /&gt;
'''YAJUG - How to Secure your Java Applications''' ''Wednesday, May 27th 2009 - 17:45'' &lt;br /&gt;
&lt;br /&gt;
[http://www.tudor.lu Centre de Recherche Public Henri Tudor] - 29, avenue John F. Kennedy - L-1855 Luxembourg-Kirchberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*17h45 - Welcome and registration &lt;br /&gt;
*18h00 - Introduction to Cryptography with JCA and JCE, Sébastien Stormacq, Sun Microsystems (French, slides in English) &lt;br /&gt;
*19h15 - [http://www.owasp.org/images/b/bb/2009-05-27_owasp%40yajug.ppt OWASP Top 10 Security Breaches for Java Web Applications], Jocelyn Aubert, OWASP-LU (French, slides in English) &lt;br /&gt;
*20h30 - Drink&lt;br /&gt;
&lt;br /&gt;
The whole program is available on [http://www.yajug.org/confluence/display/Public/Future+Events YAJUG website]. &lt;br /&gt;
&lt;br /&gt;
'''Note:''' This event is NOT an OWASP event! You have to register on YAJUG website (fee: 40 euros). &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.c3l.lu/ C3L] (Chaos Computer Club Lëtzebuerg)  ===&lt;br /&gt;
&lt;br /&gt;
''Monday, April 6th 2009'' - 20:00 (...until late in the night) &lt;br /&gt;
&lt;br /&gt;
Brasserie [http://www.seppl.lu/ Seppl] (Club-Room) - Luxembourg-Limpertsberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*15 minutes intro OWASP Luxembourg Chapter &lt;br /&gt;
*remaining time - Technical Chaos regarding OWASP&lt;br /&gt;
&lt;br /&gt;
== Chapter Board  ==&lt;br /&gt;
&lt;br /&gt;
The Luxembourg chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*ADELSBACH André &lt;br /&gt;
*AUBERT Jocelyn &lt;br /&gt;
*DULAUNOY Alexandre&lt;br /&gt;
*RIGHETTO Dominique &lt;br /&gt;
*STEICHEN Pascal&lt;br /&gt;
*ZOLLER Thierry&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors  ==&lt;br /&gt;
OWASP Luxembourg thanks its structural chapter supporters: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]] &lt;br /&gt;
[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
[http://www.f5.com https://www.owasp.org/images/f/fd/AppSec_Research_2010_sponsor_F5_logo.jpg]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=203986</id>
		<title>BeNeLux OWASP Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=203986"/>
				<updated>2015-11-30T08:29:05Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Venue is */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Announcement  ===&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on 17 and 18 March 2016, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Postponement  ===&lt;br /&gt;
&lt;br /&gt;
To allow a better organization of BeNeLux OWASP Day, the conference originally scheduled end of November, will be shifted in '''&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;March 2016&amp;lt;/span&amp;gt;'''. More information soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* TBD&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Jocelyn Aubert / Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl15 #owaspbnl15]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is to be opened soon ===&lt;br /&gt;
Stay tuned, we are working on it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
==== Venue is  ====&lt;br /&gt;
&lt;br /&gt;
University of Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
Maison du Savoir&amp;lt;br/&amp;gt;&lt;br /&gt;
2, avenue de l'Université&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4365 Esch-sur-Alzette&lt;br /&gt;
&lt;br /&gt;
==== How to reach the venue? ====&lt;br /&gt;
&lt;br /&gt;
===== By car =====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
===== By train =====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
===== Hotel nearby =====&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || '''[[Media: OWASP_benelux-day_2015_opening_agenda_closing.pdf | Welcome]]''' &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h10 - 12h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h50 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2015 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: TBD ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event ====&lt;br /&gt;
'''TBD'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2015!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=203985</id>
		<title>BeNeLux OWASP Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=203985"/>
				<updated>2015-11-30T08:27:42Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Hotel nearby */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Announcement  ===&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on 17 and 18 March 2016, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Postponement  ===&lt;br /&gt;
&lt;br /&gt;
To allow a better organization of BeNeLux OWASP Day, the conference originally scheduled end of November, will be shifted in '''&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;March 2016&amp;lt;/span&amp;gt;'''. More information soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* TBD&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Jocelyn Aubert / Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl15 #owaspbnl15]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is to be opened soon ===&lt;br /&gt;
Stay tuned, we are working on it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
==== Venue is  ====&lt;br /&gt;
&lt;br /&gt;
University of Luxembourg&lt;br /&gt;
&lt;br /&gt;
Maison du Savoir&lt;br /&gt;
&lt;br /&gt;
2, avenue de l'Université&lt;br /&gt;
&lt;br /&gt;
L-4365 Esch-sur-Alzette&lt;br /&gt;
&lt;br /&gt;
==== How to reach the venue? ====&lt;br /&gt;
&lt;br /&gt;
===== By car =====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
===== By train =====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
===== Hotel nearby =====&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&amp;lt;br/&amp;gt;&lt;br /&gt;
12, avenue du Rock'n'Roll&amp;lt;br/&amp;gt;&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&amp;lt;br/&amp;gt;&lt;br /&gt;
From 81 EUR per night&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || '''[[Media: OWASP_benelux-day_2015_opening_agenda_closing.pdf | Welcome]]''' &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h10 - 12h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h50 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2015 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: TBD ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event ====&lt;br /&gt;
'''TBD'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2015!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=203984</id>
		<title>BeNeLux OWASP Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=203984"/>
				<updated>2015-11-30T08:25:17Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Announcement  ===&lt;br /&gt;
We are proud to announce the dates of the next edition of BeNeLux OWASP Day!&lt;br /&gt;
The event will take place on 17 and 18 March 2016, in Belval Campus, in Esch-sur-Alzette - Luxembourg.&lt;br /&gt;
More information on the venue can be found {{#switchtablink:Venue|here}}.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Postponement  ===&lt;br /&gt;
&lt;br /&gt;
To allow a better organization of BeNeLux OWASP Day, the conference originally scheduled end of November, will be shifted in '''&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;March 2016&amp;lt;/span&amp;gt;'''. More information soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* TBD&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Jocelyn Aubert / Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl15 #owaspbnl15]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is to be opened soon ===&lt;br /&gt;
Stay tuned, we are working on it&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
==== Venue is  ====&lt;br /&gt;
&lt;br /&gt;
University of Luxembourg&lt;br /&gt;
&lt;br /&gt;
Maison du Savoir&lt;br /&gt;
&lt;br /&gt;
2, avenue de l'Université&lt;br /&gt;
&lt;br /&gt;
L-4365 Esch-sur-Alzette&lt;br /&gt;
&lt;br /&gt;
==== How to reach the venue? ====&lt;br /&gt;
&lt;br /&gt;
===== By car =====&lt;br /&gt;
Check the [https://goo.gl/maps/d8lTe Belval Campus map] - available on google maps - for route information.&lt;br /&gt;
&lt;br /&gt;
Outdoor parking areas and underground car parks are available throughout the campus, particularly [http://www.cfl.lu/espaces/voyageurs/en/gares-et-services/auto-moto-v%C3%A9lo/p-r-belval-universit%C3%A9-1-622-places-%C3%A0-votre-disposition P+R Belval Université], or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Square Mile parking] or [http://umbelval.lu/wp-content/uploads/2015/08/Tarifs-horaires-2015.pdf Belval Plaza].&lt;br /&gt;
&lt;br /&gt;
===== By train =====&lt;br /&gt;
Trains departing every 15 minutes from Luxembourg Central Station are direct to &amp;quot;Belval-Université&amp;quot; - line is connection-free via Esch-sur-Alzette. Get information on train schedules on the [http://www.cfl.lu/en CFL’s website].&lt;br /&gt;
&lt;br /&gt;
When on site, access to buildings is easy on foot.&lt;br /&gt;
&lt;br /&gt;
===== Hotel nearby =====&lt;br /&gt;
[http://www.accorhotels.com/fr/hotel-7071-ibis-esch-belval/index.shtml Hotel Ibis Esch-Belval]&lt;br /&gt;
12, avenue du Rock'n'Roll&lt;br /&gt;
L-4361 Esch-sur-Alzette, Luxembourg&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || '''[[Media: OWASP_benelux-day_2015_opening_agenda_closing.pdf | Welcome]]''' &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h10 - 12h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h50 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2015 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: TBD ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event ====&lt;br /&gt;
'''TBD'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2015!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=202347</id>
		<title>BeNeLux OWASP Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=202347"/>
				<updated>2015-10-20T08:40:14Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Postponement  ===&lt;br /&gt;
&lt;br /&gt;
To allow a better organization of BeNeLux OWASP Day, the conference originally scheduled end of November, will be shifted in '''&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;March 2016&amp;lt;/span&amp;gt;'''. More information soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* TBD&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Jocelyn Aubert / Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl15 #owaspbnl15]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is to be opened soon ===&lt;br /&gt;
Stay tuned, we are working on it&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking at the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || '''[[Media: OWASP_benelux-day_2015_opening_agenda_closing.pdf | Welcome]]''' &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h10 - 12h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h50 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2015 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: TBD ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event ====&lt;br /&gt;
'''TBD'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2015!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=202346</id>
		<title>BeNeLux OWASP Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=202346"/>
				<updated>2015-10-20T08:39:00Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Postponement  ===&lt;br /&gt;
&lt;br /&gt;
To allow a better organization of BeNeLux OWASP Day, the conference originally scheduled end of November, will be shifted in March 2016. More information soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* TBD&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Jocelyn Aubert / Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl15 #owaspbnl15]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is to be opened soon ===&lt;br /&gt;
Stay tuned, we are working on it&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking at the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || '''[[Media: OWASP_benelux-day_2015_opening_agenda_closing.pdf | Welcome]]''' &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h10 - 12h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h50 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2015 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: TBD ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event ====&lt;br /&gt;
'''TBD'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2015!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=202259</id>
		<title>BeNeLux OWASP Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=202259"/>
				<updated>2015-10-19T06:50:57Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Postponement  ===&lt;br /&gt;
&lt;br /&gt;
To allow a better organization of BeNeLux OWASP Day, the conference originally scheduled end of November, will be shifted in February 2016. More information soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* TBD&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Jocelyn Aubert / Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl15 #owaspbnl15]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is to be opened soon ===&lt;br /&gt;
Stay tuned, we are working on it&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking at the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || '''[[Media: OWASP_benelux-day_2015_opening_agenda_closing.pdf | Welcome]]''' &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h10 - 12h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h50 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2015 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: TBD ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event ====&lt;br /&gt;
'''TBD'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux Day and participate in the Capture the Flag event.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2015!'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_2015.png&amp;diff=202258</id>
		<title>File:OWASP BeNeLux 2015.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_2015.png&amp;diff=202258"/>
				<updated>2015-10-19T06:30:42Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Jocelyn.aubert uploaded a new version of &amp;amp;quot;File:OWASP BeNeLux 2015.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=200495</id>
		<title>BeNeLux OWASP Day 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2015&amp;diff=200495"/>
				<updated>2015-09-13T17:43:22Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OWASP BeNeLux 2015.png|center|512px]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2015  ===&lt;br /&gt;
&lt;br /&gt;
Registration to open soon!&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* TBD&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Jocelyn Aubert / Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl15 #owaspbnl15]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is to be opened soon ===&lt;br /&gt;
Stay tuned, we are working on it&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking at the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 26th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 27th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || '''[[Media: OWASP_benelux-day_2015_opening_agenda_closing.pdf | Welcome]]''' &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h10 - 12h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 12h50 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || TBD || &lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2015 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: TBD ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 26th ====&lt;br /&gt;
'''TBD'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2015 and participate in the Capture the Flag event November 26th 2015.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2015!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 26th and 27th of November, 2015.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_2015.png&amp;diff=200494</id>
		<title>File:OWASP BeNeLux 2015.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_BeNeLux_2015.png&amp;diff=200494"/>
				<updated>2015-09-13T17:38:35Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=200318</id>
		<title>Luxembourg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=200318"/>
				<updated>2015-09-10T08:10:37Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Luxembourg|extra=The chapter leader is [mailto:jocelyn.aubert@owasp.org Jocelyn Aubert]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-luxemburg|emailarchives=http://lists.owasp.org/pipermail/owasp-luxemburg/}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Luxembourg&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
Join our [http://www.linkedin.com/groups?gid=1781989&amp;amp;trk=anetsrch_name&amp;amp;goback=.gdr_1238414238580_1 LinkedIn group]! &lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day 2015, November 26 &amp;amp;amp; 27, 2015 in Luxembourg  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce that like in 2011, the OWASP BeNeLux Day 2015 will be held in Luxembourg.&lt;br /&gt;
More information to follow, stay tuned!&lt;br /&gt;
&lt;br /&gt;
=== OWASP AppSecEU 2015, 19-22 May 2015, Amsterdam, The Netherlands ===&lt;br /&gt;
The Luxembourg chapter is co-organizing together with Belgium and Netherlands chapters this amazing conference to be held in Amsterdam this spring!&lt;br /&gt;
More information on the [http://2015.appsec.eu conference website.]&lt;br /&gt;
&lt;br /&gt;
Hope to see you there!&lt;br /&gt;
&lt;br /&gt;
=== French translation of Top Ten ===&lt;br /&gt;
The Luxembourg chapter, in collaboration with other volunteers (French and Swiss) is currently involved in the French translation of the OWASP Top Ten for 2013 (available in release candidate here: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]).&lt;br /&gt;
&lt;br /&gt;
The final version of Top Ten should be available in May, and the French version should be available a few days after the release of the original version.&lt;br /&gt;
The document is usually translated into different languages (German, Spanish, Italian, Chinese, etc.)&lt;br /&gt;
&lt;br /&gt;
People potentially interested to contribute to the German translation, can contact the [[OWASP_German_Language_Project]].&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day 2011, December 1st &amp;amp;amp; 2nd 2011 @ University of Luxembourg  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce that OWASP BeNeLux Day 2011 will take place on December 1st &amp;amp;amp; 2nd 2011 at the University of Luxembourg. &lt;br /&gt;
&lt;br /&gt;
*'''December 1st 2011: Training Day'''&lt;br /&gt;
&lt;br /&gt;
OWASP Training: Secure Application Development, by Eoin Keary This intensive one-day training focuses on the most common web application security problems, including aspects of both the OWASP Top Ten (2010) and the MITRE Top 25. The training will introduce and demonstrate application assessment techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''December 2nd 2011: Conference Day'''&lt;br /&gt;
&lt;br /&gt;
List of confirmed speakers (more to be announced soon): &lt;br /&gt;
&lt;br /&gt;
*Brenno De Winter (Journalist) on the Diginotar story &lt;br /&gt;
*Koen Vanderloock (Lead Security Competence Group at Cegeka) on the new OWASP Simba project &lt;br /&gt;
*Justin Clarke (Director and Co-Founder of Gotham Digital Science Ltd) on practical crypto attacks against web applications &lt;br /&gt;
*Lieven Desmet (Research Manager at University Leuven) on HTML5 security &lt;br /&gt;
*Andrey Belenko (Chief Security Researcher at ElcomSoft Co. Ltd) on iOS data protection internals &lt;br /&gt;
*Alexandre Dulaunoy (Incident Management - Security Research at CIRCL) on dynamic malware analysis &lt;br /&gt;
*Ludovic Petit (Group Fraud &amp;amp;amp; Information Security Adviser at SFR, Vodafone Group) on WebApp Security and legal and regulatory aspects &lt;br /&gt;
*Seba Deleersnyder &amp;amp;amp; Eoin Keary (OWASP Board) on OWASP Update&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For more information and updates, please check out [http://www.owaspbenelux.eu/ www.owaspbenelux.eu] &lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring the event and the Luxembourg Chapter in 2012? Please contact Jocelyn Aubert (Jocelyn.Aubert[at]owasp.org)!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.yajug.org/ YAJUG] (Java User Group, Luxembourg)  ===&lt;br /&gt;
&lt;br /&gt;
The Luxembourg Chapter will participate to the next YAJUG (Java User Group, Luxembourg) event: &lt;br /&gt;
&lt;br /&gt;
'''YAJUG - How to Secure your Java Applications''' ''Wednesday, May 27th 2009 - 17:45'' &lt;br /&gt;
&lt;br /&gt;
[http://www.tudor.lu Centre de Recherche Public Henri Tudor] - 29, avenue John F. Kennedy - L-1855 Luxembourg-Kirchberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*17h45 - Welcome and registration &lt;br /&gt;
*18h00 - Introduction to Cryptography with JCA and JCE, Sébastien Stormacq, Sun Microsystems (French, slides in English) &lt;br /&gt;
*19h15 - [http://www.owasp.org/images/b/bb/2009-05-27_owasp%40yajug.ppt OWASP Top 10 Security Breaches for Java Web Applications], Jocelyn Aubert, OWASP-LU (French, slides in English) &lt;br /&gt;
*20h30 - Drink&lt;br /&gt;
&lt;br /&gt;
The whole program is available on [http://www.yajug.org/confluence/display/Public/Future+Events YAJUG website]. &lt;br /&gt;
&lt;br /&gt;
'''Note:''' This event is NOT an OWASP event! You have to register on YAJUG website (fee: 40 euros). &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.c3l.lu/ C3L] (Chaos Computer Club Lëtzebuerg)  ===&lt;br /&gt;
&lt;br /&gt;
''Monday, April 6th 2009'' - 20:00 (...until late in the night) &lt;br /&gt;
&lt;br /&gt;
Brasserie [http://www.seppl.lu/ Seppl] (Club-Room) - Luxembourg-Limpertsberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*15 minutes intro OWASP Luxembourg Chapter &lt;br /&gt;
*remaining time - Technical Chaos regarding OWASP&lt;br /&gt;
&lt;br /&gt;
== Chapter Board  ==&lt;br /&gt;
&lt;br /&gt;
The Luxembourg chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*ADELSBACH André &lt;br /&gt;
*AUBERT Jocelyn &lt;br /&gt;
*DULAUNOY Alexandre&lt;br /&gt;
*RIGHETTO Dominique &lt;br /&gt;
*STEICHEN Pascal&lt;br /&gt;
*ZOLLER Thierry&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors  ==&lt;br /&gt;
OWASP Luxembourg thanks its structural chapter supporters: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]] &lt;br /&gt;
[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
[http://www.f5.com https://www.owasp.org/images/f/fd/AppSec_Research_2010_sponsor_F5_logo.jpg]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=200312</id>
		<title>Luxembourg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Luxembourg&amp;diff=200312"/>
				<updated>2015-09-10T07:58:19Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: /* Chapter Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Luxembourg|extra=The chapter leader is [mailto:jocelyn.aubert@owasp.org Jocelyn Aubert]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-luxemburg|emailarchives=http://lists.owasp.org/pipermail/owasp-luxemburg/}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Luxembourg&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
Join our [http://www.linkedin.com/groups?gid=1781989&amp;amp;trk=anetsrch_name&amp;amp;goback=.gdr_1238414238580_1 LinkedIn group]! &lt;br /&gt;
&lt;br /&gt;
=== French translation of Top Ten ===&lt;br /&gt;
The Luxembourg chapter, in collaboration with other volunteers (French and Swiss) is currently involved in the French translation of the OWASP Top Ten for 2013 (available in release candidate here: [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]).&lt;br /&gt;
&lt;br /&gt;
The final version of Top Ten should be available in May, and the French version should be available a few days after the release of the original version.&lt;br /&gt;
The document is usually translated into different languages (German, Spanish, Italian, Chinese, etc.)&lt;br /&gt;
&lt;br /&gt;
People potentially interested to contribute to the German translation, can contact the [[OWASP_German_Language_Project]].&lt;br /&gt;
&lt;br /&gt;
=== OWASP BeNeLux Day 2011, December 1st &amp;amp;amp; 2nd 2011 @ University of Luxembourg  ===&lt;br /&gt;
&lt;br /&gt;
We are proud to announce that OWASP BeNeLux Day 2011 will take place on December 1st &amp;amp;amp; 2nd 2011 at the University of Luxembourg. &lt;br /&gt;
&lt;br /&gt;
*'''December 1st 2011: Training Day'''&lt;br /&gt;
&lt;br /&gt;
OWASP Training: Secure Application Development, by Eoin Keary This intensive one-day training focuses on the most common web application security problems, including aspects of both the OWASP Top Ten (2010) and the MITRE Top 25. The training will introduce and demonstrate application assessment techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''December 2nd 2011: Conference Day'''&lt;br /&gt;
&lt;br /&gt;
List of confirmed speakers (more to be announced soon): &lt;br /&gt;
&lt;br /&gt;
*Brenno De Winter (Journalist) on the Diginotar story &lt;br /&gt;
*Koen Vanderloock (Lead Security Competence Group at Cegeka) on the new OWASP Simba project &lt;br /&gt;
*Justin Clarke (Director and Co-Founder of Gotham Digital Science Ltd) on practical crypto attacks against web applications &lt;br /&gt;
*Lieven Desmet (Research Manager at University Leuven) on HTML5 security &lt;br /&gt;
*Andrey Belenko (Chief Security Researcher at ElcomSoft Co. Ltd) on iOS data protection internals &lt;br /&gt;
*Alexandre Dulaunoy (Incident Management - Security Research at CIRCL) on dynamic malware analysis &lt;br /&gt;
*Ludovic Petit (Group Fraud &amp;amp;amp; Information Security Adviser at SFR, Vodafone Group) on WebApp Security and legal and regulatory aspects &lt;br /&gt;
*Seba Deleersnyder &amp;amp;amp; Eoin Keary (OWASP Board) on OWASP Update&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For more information and updates, please check out [http://www.owaspbenelux.eu/ www.owaspbenelux.eu] &lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring the event and the Luxembourg Chapter in 2012? Please contact Jocelyn Aubert (Jocelyn.Aubert[at]owasp.org)!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.yajug.org/ YAJUG] (Java User Group, Luxembourg)  ===&lt;br /&gt;
&lt;br /&gt;
The Luxembourg Chapter will participate to the next YAJUG (Java User Group, Luxembourg) event: &lt;br /&gt;
&lt;br /&gt;
'''YAJUG - How to Secure your Java Applications''' ''Wednesday, May 27th 2009 - 17:45'' &lt;br /&gt;
&lt;br /&gt;
[http://www.tudor.lu Centre de Recherche Public Henri Tudor] - 29, avenue John F. Kennedy - L-1855 Luxembourg-Kirchberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*17h45 - Welcome and registration &lt;br /&gt;
*18h00 - Introduction to Cryptography with JCA and JCE, Sébastien Stormacq, Sun Microsystems (French, slides in English) &lt;br /&gt;
*19h15 - [http://www.owasp.org/images/b/bb/2009-05-27_owasp%40yajug.ppt OWASP Top 10 Security Breaches for Java Web Applications], Jocelyn Aubert, OWASP-LU (French, slides in English) &lt;br /&gt;
*20h30 - Drink&lt;br /&gt;
&lt;br /&gt;
The whole program is available on [http://www.yajug.org/confluence/display/Public/Future+Events YAJUG website]. &lt;br /&gt;
&lt;br /&gt;
'''Note:''' This event is NOT an OWASP event! You have to register on YAJUG website (fee: 40 euros). &lt;br /&gt;
&lt;br /&gt;
=== OWASP @ [http://www.c3l.lu/ C3L] (Chaos Computer Club Lëtzebuerg)  ===&lt;br /&gt;
&lt;br /&gt;
''Monday, April 6th 2009'' - 20:00 (...until late in the night) &lt;br /&gt;
&lt;br /&gt;
Brasserie [http://www.seppl.lu/ Seppl] (Club-Room) - Luxembourg-Limpertsberg &lt;br /&gt;
&lt;br /&gt;
Agenda: &lt;br /&gt;
&lt;br /&gt;
*15 minutes intro OWASP Luxembourg Chapter &lt;br /&gt;
*remaining time - Technical Chaos regarding OWASP&lt;br /&gt;
&lt;br /&gt;
== Chapter Board  ==&lt;br /&gt;
&lt;br /&gt;
The Luxembourg chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*ADELSBACH André &lt;br /&gt;
*AUBERT Jocelyn &lt;br /&gt;
*DULAUNOY Alexandre&lt;br /&gt;
*RIGHETTO Dominique &lt;br /&gt;
*STEICHEN Pascal&lt;br /&gt;
*ZOLLER Thierry&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsors  ==&lt;br /&gt;
OWASP Luxembourg thanks its structural chapter supporters: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Bnl11-SECURITYANDTRUST-LOGO.jpg|link=http://www.securityandtrust.lu]] &lt;br /&gt;
[http://circl.lu/ http://circl.lu/pics/logo.png]&lt;br /&gt;
[http://www.f5.com https://www.owasp.org/images/f/fd/AppSec_Research_2010_sponsor_F5_logo.jpg]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jocelyn.aubert&amp;diff=189867</id>
		<title>User:Jocelyn.aubert</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jocelyn.aubert&amp;diff=189867"/>
				<updated>2015-02-18T15:10:42Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: some minor changes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Jocelyn-aubert.png|frame|Jocelyn Aubert]]&lt;br /&gt;
Jocelyn Aubert is currently the chapter leader of Luxembourg chapter.&lt;br /&gt;
&lt;br /&gt;
He works as a R&amp;amp;D Engineer in IT Security at the [http://www.list.lu Luxembourg Institute of Science and Technology] in Luxembourg, Luxembourg.&lt;br /&gt;
His main interests are Research and Development Engineering in software systems, IT Security, risk management tools and methodologies, monitoring critical infrastructures, access control and trust. He is very active and involved in several TPC of international conferences such as INCOM, CRISIS’09, VISM 2010, HICSS, SERVICE COMPUTATION, ICN and SOFTENG. He is a trainer in &amp;quot;Web application security&amp;quot;, &amp;quot;Information Security Management Systems&amp;quot;, &amp;quot;Risk management&amp;quot;, &amp;quot;ISO/IEC 27001 Implementer&amp;quot; and &amp;quot;Electronic Records Management&amp;quot;. Furthermore, he is a lecturer in Master's degree courses ([http://wwwen.uni.lu/ University of Luxembourg] - Luxembourg and [http://welcome.univ-lorraine.fr/en Université de Lorraine] - France). &lt;br /&gt;
&lt;br /&gt;
Jocelyn got involved in OWASP in 2008, when he decided to restart the Luxembourg chapter. He contributed to different OWASP projects (especially French translation of [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2010 Top Ten 2010] and [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2013 Top Ten 2013]), co-organizes the [http://owaspbenelux.eu OWASP BeNeLux-Day] conferences since 2008 and is member of the organizing team of [http://2015.appsec.eu/ OWASP AppSec-Eu/Research 2015].&lt;br /&gt;
&lt;br /&gt;
You can contact him by [mailto:jocelyn.aubert(at)owasp.org email].&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jocelyn.aubert&amp;diff=177412</id>
		<title>User:Jocelyn.aubert</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jocelyn.aubert&amp;diff=177412"/>
				<updated>2014-06-23T19:14:56Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Jocelyn-aubert.png|frame|Jocelyn Aubert]]&lt;br /&gt;
Jocelyn Aubert is currently the chapter leader of Luxembourg chapter.&lt;br /&gt;
&lt;br /&gt;
He works as a R&amp;amp;D Engineer in IT Security at the [http://www.tudor.lu Public Research Centre Henri Tudor] in Luxembourg, Luxembourg.&lt;br /&gt;
His main interests are Research and Development Engineering in software systems, IT Security, risk management tools and methodologies, monitoring critical infrastructures, access control and trust. He is very active and involved in several TPC of international conferences such as INCOM’09, CRISIS’09, VISM 2010, HICSS and SERVICE COMPUTATION.&lt;br /&gt;
&lt;br /&gt;
Jocelyn got involved in OWASP in 2008, when he decided to restart the Luxembourg chapter. He contributed to different OWASP projects (especially French translation of [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2010 Top Ten 2010] and [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2013 Top Ten 2013]) and co-organizes the [http://owaspbenelux.eu OWASP BeNeLux-Day] conferences since 2008.&lt;br /&gt;
&lt;br /&gt;
You can contact him by [mailto:jocelyn.aubert(at)owasp.org email].&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jocelyn.aubert&amp;diff=177411</id>
		<title>User:Jocelyn.aubert</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jocelyn.aubert&amp;diff=177411"/>
				<updated>2014-06-23T19:14:12Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: correcting some typos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Jocelyn-aubert.png|frame|Jocelyn Aubert]]&lt;br /&gt;
Jocelyn Aubert is currently the chapter leader of Luxembourg chapter.&lt;br /&gt;
&lt;br /&gt;
He works as a R&amp;amp;D Engineer in IT Security at the [http://www.tudor.lu Centre de Recherche Public Henri Tudor] in Luxembourg, Luxembourg.&lt;br /&gt;
His main interests are Research and Development Engineering in software systems, IT Security, risk management tools and methodologies, monitoring critical infrastructures, access control and trust. He is very active and involved in several TPC of international conferences such as INCOM’09, CRISIS’09, VISM 2010, HICSS and SERVICE COMPUTATION.&lt;br /&gt;
&lt;br /&gt;
Jocelyn got involved in OWASP in 2008, when he decided to restart the Luxembourg chapter. He contributed to different OWASP projects (especially French translation of [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2010 Top Ten 2010] and [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2013 Top Ten 2013]) and co-organizes the [http://owaspbenelux.eu OWASP BeNeLux-Day] conferences since 2008.&lt;br /&gt;
&lt;br /&gt;
You can contact him by [mailto:jocelyn.aubert(at)owasp.org email].&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jocelyn.aubert&amp;diff=177410</id>
		<title>User:Jocelyn.aubert</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jocelyn.aubert&amp;diff=177410"/>
				<updated>2014-06-23T19:12:52Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: update of the profile&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Jocelyn-aubert.png|frame|Jocelyn Aubert]]&lt;br /&gt;
Jocelyn Aubert is currently the chapter leader of Luxembourg chapter.&lt;br /&gt;
&lt;br /&gt;
He works as a R&amp;amp;D Engineer in IT Security at the [http://www.tudor.lu Centre de Recherche Public Henri Tudor] in Luxembourg, Luxembourg.&lt;br /&gt;
His main interests are Research and Development Engineering in software systems, IT Security, risk management tools and methodologies, monitoring critical infrastructures, access control and trust. He is very active and involved in several TPC of international conferences such as INCOM’09, CRISIS’09, VISM 2010, HICSS and SERVICE COMPUTATION.&lt;br /&gt;
&lt;br /&gt;
Jocelyn got involved in OWASP in 2008, when he decide to restart the Luxembourg chapter. He contributed to different OWASP projects (especially French translation of [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2010 Top Ten 2010] and [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2013 Top Ten 2013]) and co-organized the [http://owaspbenelux.eu OWASP BeNeLux-Day] conference since 2008.&lt;br /&gt;
&lt;br /&gt;
You can contact him by [mailto:jocelyn.aubert(at)owasp.org email]&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Jocelyn-aubert.png&amp;diff=177397</id>
		<title>File:Jocelyn-aubert.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Jocelyn-aubert.png&amp;diff=177397"/>
				<updated>2014-06-23T17:58:35Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Jocelyn.aubert uploaded a new version of &amp;amp;quot;File:Jocelyn-aubert.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;profile photo of Jocelyn Aubert&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Jocelyn-aubert.png&amp;diff=177396</id>
		<title>File:Jocelyn-aubert.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Jocelyn-aubert.png&amp;diff=177396"/>
				<updated>2014-06-23T17:57:08Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: profile photo of Jocelyn Aubert&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;profile photo of Jocelyn Aubert&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Bnl14header-v.1.0.png&amp;diff=176905</id>
		<title>File:Bnl14header-v.1.0.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Bnl14header-v.1.0.png&amp;diff=176905"/>
				<updated>2014-06-14T18:52:56Z</updated>
		
		<summary type="html">&lt;p&gt;Jocelyn.aubert: Header for the OWASP BeNeLux Day 2014&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Header for the OWASP BeNeLux Day 2014&lt;/div&gt;</summary>
		<author><name>Jocelyn.aubert</name></author>	</entry>

	</feed>