<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kelly+FitzGerald</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kelly+FitzGerald"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Kelly_FitzGerald"/>
		<updated>2026-05-09T07:31:29Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles/Sponsors/Venafi&amp;diff=135943</id>
		<title>Los Angeles/Sponsors/Venafi</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles/Sponsors/Venafi&amp;diff=135943"/>
				<updated>2012-09-17T05:23:06Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Created the page, added initial description&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Full Company Description==&lt;br /&gt;
&lt;br /&gt;
[http://www.venafi.com/ Venafi] is the inventor of and market leader in Enterprise Key and Certificate Management (EKCM) solutions. Venafi delivered the first enterprise-class solution to automate the provisioning, discovery, monitoring and management of digital certificates and encryption keys——from the datacenter to the cloud and beyond——built specifically for encryption management interoperability across heterogeneous environments. Venafi products reduce the unquantified and unmanaged risks associated with encryption deployments that result in data breaches, security audit failures and unplanned system outages. Venafi customers include the world’’s most prestigious Global 2000 organizations in financial services, insurance, high tech, telecommunications, aerospace, healthcare and retail. &lt;br /&gt;
&lt;br /&gt;
==Condensed Company Description==&lt;br /&gt;
&lt;br /&gt;
Venafi is the inventor of and market leader in Enterprise Key and Certificate Management (EKCM), and delivered the first enterprise-class solution to automate the provisioning, discovery, monitoring and management of digital certificates and encryption keys, built specifically for encryption management interoperability across heterogeneous environments&lt;br /&gt;
—— from the datacenter to the cloud and beyond.&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=135942</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=135942"/>
				<updated>2012-09-17T05:19:28Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Added wiki article link for Venafi sponsor&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the Los Angeles Chapter!  ==&lt;br /&gt;
&lt;br /&gt;
'''Sponsors and Supporters Donate Here:''' &lt;br /&gt;
=====https://www.cvent.com/events/owasp-sponsorship-and-donation/registration-99bc1441e2684ff5b214b0df6b3a9ae3.aspx=====&lt;br /&gt;
&lt;br /&gt;
Single Meeting Supporter:&lt;br /&gt;
Organizations that wish to support the OWASP Los Angeles Chapter with a 100% tax deductible donation  enable the OWASP Foundation to continue its mission &lt;br /&gt;
&lt;br /&gt;
Get the following benefits::&lt;br /&gt;
 - Meet upwards of 60-70 potential new clients&lt;br /&gt;
 - Be recognized as a local supporter by posting your company logo on the local chapter page(Image size for logos: gif, jpg or png with a size of 150px X 45px at 72dpi or 55px X 80px at 72dpi) &lt;br /&gt;
 - Have a table at local chapter meeting &lt;br /&gt;
 - Promote your products and services&lt;br /&gt;
 - Bring a raffle prize to gather business cards&lt;br /&gt;
&lt;br /&gt;
Contact us [[#Los Angeles Chapter]] for general questions relating to sponsorship and donations &lt;br /&gt;
&lt;br /&gt;
== Announcements  ==&lt;br /&gt;
&lt;br /&gt;
http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png&lt;br /&gt;
===== We are on Meetup. Please join our community there. =====&lt;br /&gt;
&lt;br /&gt;
===== http://www.meetup.com/OWASP-Los-Angeles/ =====&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Next Meeting September 19, 2012: Special Dinner  Meeting with Los Angeles Chapters: OWASP, ISSA, ISC2 and CSA == &lt;br /&gt;
*'''At: The Olympic Collection Banquet &amp;amp; Conference Center'''&lt;br /&gt;
&lt;br /&gt;
*11301 Olympic Blvd. #204, ● West Los Angeles, CA 90064&lt;br /&gt;
&lt;br /&gt;
===== Please RSVP here:  http://www.issala.org/events/?event_id=35 =====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thanks to generous support of our sponsors== &lt;br /&gt;
&lt;br /&gt;
'''Bay Dynamics''' http://www.baydynamics.com/ &lt;br /&gt;
&lt;br /&gt;
'''[[Los Angeles/Sponsors/Venafi|Venafi]]''' http://www.Venafi.com/&lt;br /&gt;
&lt;br /&gt;
'''Trustwave''' https://www.trustwave.com/&lt;br /&gt;
&lt;br /&gt;
'''Security Innovation''' http://www.securityinnovation.com/&lt;br /&gt;
&lt;br /&gt;
'''Phone Factor''' http://www.phonefactor.com/index.php&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
== Would you like to speak at an OWASP Los Angeles Meeting? == &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. The talk must be vendor neutral and its content be available under Creative Common 3.0 license. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Archives of Previous Meetings  ==&lt;br /&gt;
[[Los Angeles/2012 Meetings|2012 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2011 Meetings|2011 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2010 Meetings|2010 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2009 Meetings|2009 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles/2008 Meetings|2008 Meetings]] &lt;br /&gt;
&lt;br /&gt;
[[Los Angeles Presentation Archive|List of presentations available from past meetings]] &amp;lt;!--A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Los Angeles Chapter  ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and President  &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
*[mailto:edward@owasp.org Edward Bonver] -- Board Member&lt;br /&gt;
*[mailto:Kelly.Fitzgerald@owasp.org Kelly Fitzgerald] -- Board Member &lt;br /&gt;
*[mailto:Stuart.Schwartz@owasp.org Stuart Schwartz] -- Board Member &lt;br /&gt;
&lt;br /&gt;
Volunteer OWASP Leaders: Yev Avidon and Mikhael Felker  &amp;lt;br&amp;gt;&lt;br /&gt;
Los Angeles chapter was founded by Cassio Goldschmidt. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
Web archive: http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
[[Category:California]] [[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107671</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107671"/>
				<updated>2011-03-25T21:25:59Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;April 27, 2011 7:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Symantec&amp;lt;br&amp;gt;900 Corporate Pointe&amp;lt;br&amp;gt;Culver City, CA 90232&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Please RSVP: http://owasp-april2011.eventbrite.com/&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: NoSQL Security'''  ==&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Bryan Sullivan'''&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
[[Image:BryanSullivan.JPG]]&lt;br /&gt;
&lt;br /&gt;
Bryan Sullivan is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on topics such as RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011).&lt;br /&gt;
&lt;br /&gt;
'''Abstract: NoSQL Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NoSQL databases are rapidly gaining popularity, especially for use in distributed, high-availability cloud services. But are we making the same mistakes with NoSQL in the childhood of the cloud that we made with SQL in the childhood of the web? This talk will examine some general security issues that come with emphasizing the Availability aspect of Consistency/Availability/Partition-tolerance, and we'll also look at some specific issues with popular NoSQL databases such as MongoDB and Cassandra. &lt;br /&gt;
&lt;br /&gt;
== '''Sponsors:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:BPS Logo.jpg|http://www.businesspartnersolutions.com/]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;BPS has experience with fortune 500, City, and State Government clients. BPS has working technical knowledge in the following areas of security and compliance: &lt;br /&gt;
&lt;br /&gt;
Audit trail monitoring and planning&amp;lt;br&amp;gt;Business continuity planning and disaster recovery&amp;lt;br&amp;gt;Configuration management&amp;lt;br&amp;gt;Data classification&amp;lt;br&amp;gt;Incident response planning&amp;lt;br&amp;gt;Policy development&amp;lt;br&amp;gt;Risk analysis and acceptance&amp;lt;br&amp;gt;Forensics&amp;lt;br&amp;gt;Forensic tools and methodology&amp;lt;br&amp;gt;Secure software development lifecycle (SDLC)&amp;lt;br&amp;gt;Vulnerability management and remediation&amp;lt;br&amp;gt;Project management&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
[[2009 Meetings]]&lt;br /&gt;
&lt;br /&gt;
[[2010 Meetings]]&lt;br /&gt;
&lt;br /&gt;
[[2011 Meetings]]&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here].&lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107428</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107428"/>
				<updated>2011-03-23T20:28:25Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;April 27, 2011 6:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Symantec&amp;lt;br&amp;gt;900 Corporate Pointe&amp;lt;br&amp;gt;Culver City, CA 90232&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Please RSVP: http://owasp-april2011.eventbrite.com/&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: NoSQL Security'''  ==&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Bryan Sullivan'''&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
[[Image:BryanSullivan.JPG]]&lt;br /&gt;
&lt;br /&gt;
Bryan Sullivan is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on topics such as RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011).&lt;br /&gt;
&lt;br /&gt;
'''Abstract: NoSQL Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NoSQL databases are rapidly gaining popularity, especially for use in distributed, high-availability cloud services. But are we making the same mistakes with NoSQL in the childhood of the cloud that we made with SQL in the childhood of the web? This talk will examine some general security issues that come with emphasizing the Availability aspect of Consistency/Availability/Partition-tolerance, and we'll also look at some specific issues with popular NoSQL databases such as MongoDB and Cassandra. &lt;br /&gt;
&lt;br /&gt;
== '''Sponsors:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:BPS Logo.jpg|http://www.businesspartnersolutions.com/]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;BPS has experience with fortune 500, City, and State Government clients. BPS has working technical knowledge in the following areas of security and compliance: &lt;br /&gt;
&lt;br /&gt;
Audit trail monitoring and planning&amp;lt;br&amp;gt;Business continuity planning and disaster recovery&amp;lt;br&amp;gt;Configuration management&amp;lt;br&amp;gt;Data classification&amp;lt;br&amp;gt;Incident response planning&amp;lt;br&amp;gt;Policy development&amp;lt;br&amp;gt;Risk analysis and acceptance&amp;lt;br&amp;gt;Forensics&amp;lt;br&amp;gt;Forensic tools and methodology&amp;lt;br&amp;gt;Secure software development lifecycle (SDLC)&amp;lt;br&amp;gt;Vulnerability management and remediation&amp;lt;br&amp;gt;Project management&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107427</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107427"/>
				<updated>2011-03-23T20:27:35Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;April 27, 2011 6:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Symantec&amp;lt;br&amp;gt;900 Corporate Pointe&amp;lt;br&amp;gt;Culver City, CA 90232&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Please RSVP: http://owasp-april2011.eventbrite.com/&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: NoSQL Security'''  ==&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Bryan Sullivan'''&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
[[Image:BryanSullivan.JPG]]Bryan Sullivan is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect. &lt;br /&gt;
&lt;br /&gt;
Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on topics such as RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Abstract: NoSQL Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NoSQL databases are rapidly gaining popularity, especially for use in distributed, high-availability cloud services. But are we making the same mistakes with NoSQL in the childhood of the cloud that we made with SQL in the childhood of the web? This talk will examine some general security issues that come with emphasizing the Availability aspect of Consistency/Availability/Partition-tolerance, and we'll also look at some specific issues with popular NoSQL databases such as MongoDB and Cassandra. &lt;br /&gt;
&lt;br /&gt;
== '''Sponsors:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:BPS Logo.jpg|http://www.businesspartnersolutions.com/]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;BPS has experience with fortune 500, City, and State Government clients. BPS has working technical knowledge in the following areas of security and compliance: &lt;br /&gt;
&lt;br /&gt;
Audit trail monitoring and planning&amp;lt;br&amp;gt;Business continuity planning and disaster recovery&amp;lt;br&amp;gt;Configuration management&amp;lt;br&amp;gt;Data classification&amp;lt;br&amp;gt;Incident response planning&amp;lt;br&amp;gt;Policy development&amp;lt;br&amp;gt;Risk analysis and acceptance&amp;lt;br&amp;gt;Forensics&amp;lt;br&amp;gt;Forensic tools and methodology&amp;lt;br&amp;gt;Secure software development lifecycle (SDLC)&amp;lt;br&amp;gt;Vulnerability management and remediation&amp;lt;br&amp;gt;Project management&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:BryanSullivan.JPG&amp;diff=107426</id>
		<title>File:BryanSullivan.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:BryanSullivan.JPG&amp;diff=107426"/>
				<updated>2011-03-23T20:25:25Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107425</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107425"/>
				<updated>2011-03-23T20:19:05Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Removing an extra line&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;April 27, 2011 6:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Symantec&amp;lt;br&amp;gt;900 Corporate Pointe&amp;lt;br&amp;gt;Culver City, CA 90232&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Please RSVP: http://owasp-april2011.eventbrite.com/&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: NoSQL Security'''  ==&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Bryan Sullivan'''&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Bryan Sullivan is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect. &lt;br /&gt;
&lt;br /&gt;
Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on topics such as RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Abstract: NoSQL Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NoSQL databases are rapidly gaining popularity, especially for use in distributed, high-availability cloud services. But are we making the same mistakes with NoSQL in the childhood of the cloud that we made with SQL in the childhood of the web? This talk will examine some general security issues that come with emphasizing the Availability aspect of Consistency/Availability/Partition-tolerance, and we'll also look at some specific issues with popular NoSQL databases such as MongoDB and Cassandra. &lt;br /&gt;
&lt;br /&gt;
== '''Sponsors:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:BPS Logo.jpg|http://www.businesspartnersolutions.com/]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;BPS has experience with fortune 500, City, and State Government clients. BPS has working technical knowledge in the following areas of security and compliance: &lt;br /&gt;
&lt;br /&gt;
Audit trail monitoring and planning&amp;lt;br&amp;gt;Business continuity planning and disaster recovery&amp;lt;br&amp;gt;Configuration management&amp;lt;br&amp;gt;Data classification&amp;lt;br&amp;gt;Incident response planning&amp;lt;br&amp;gt;Policy development&amp;lt;br&amp;gt;Risk analysis and acceptance&amp;lt;br&amp;gt;Forensics&amp;lt;br&amp;gt;Forensic tools and methodology&amp;lt;br&amp;gt;Secure software development lifecycle (SDLC)&amp;lt;br&amp;gt;Vulnerability management and remediation&amp;lt;br&amp;gt;Project management&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107424</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107424"/>
				<updated>2011-03-23T20:18:17Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: All edits done save for press photo of B. Sullivan&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;April 27, 2011 6:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Symantec&amp;lt;br&amp;gt;900 Corporate Pointe&amp;lt;br&amp;gt;Culver City, CA 90232&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Please RSVP: http://owasp-april2011.eventbrite.com/&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: NoSQL Security'''  ==&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Bryan Sullivan'''&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Bryan Sullivan is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect. &lt;br /&gt;
&lt;br /&gt;
Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on topics such as RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Abstract: NoSQL Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NoSQL databases are rapidly gaining popularity, especially for use in distributed, high-availability cloud services. But are we making the same mistakes with NoSQL in the childhood of the cloud that we made with SQL in the childhood of the web? This talk will examine some general security issues that come with emphasizing the Availability aspect of Consistency/Availability/Partition-tolerance, and we'll also look at some specific issues with popular NoSQL databases such as MongoDB and Cassandra. &lt;br /&gt;
&lt;br /&gt;
== '''Sponsors:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:BPS_Logo.jpg|http://www.businesspartnersolutions.com/]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;BPS has experience with fortune 500, City, and State Government clients. BPS has working technical knowledge in the following areas of security and compliance:&lt;br /&gt;
&lt;br /&gt;
Audit trail monitoring and planning&amp;lt;br&amp;gt;Business continuity planning and disaster recovery&amp;lt;br&amp;gt;Configuration management&amp;lt;br&amp;gt;Data classification&amp;lt;br&amp;gt;Incident response planning&amp;lt;br&amp;gt;Policy development&amp;lt;br&amp;gt;Risk analysis and acceptance&amp;lt;br&amp;gt;Forensics&amp;lt;br&amp;gt;Forensic tools and methodology&amp;lt;br&amp;gt;Secure software development lifecycle (SDLC)&amp;lt;br&amp;gt;Vulnerability management and remediation&amp;lt;br&amp;gt;Project management&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:BPS_Logo.jpg&amp;diff=107422</id>
		<title>File:BPS Logo.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:BPS_Logo.jpg&amp;diff=107422"/>
				<updated>2011-03-23T20:12:21Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107421</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107421"/>
				<updated>2011-03-23T20:11:16Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Changing the date for April 27th.  Still need to update sponser.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;April 27, 2011 6:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Symantec&amp;lt;br&amp;gt;900 Corporate Pointe&amp;lt;br&amp;gt;Culver City, CA 90232&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Please RSVP: &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: NoSQL Security'''  ==&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Bryan Sullivan'''&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Bryan Sullivan is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect. &lt;br /&gt;
&lt;br /&gt;
Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on topics such as RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Abstract: NoSQL Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NoSQL databases are rapidly gaining popularity, especially for use in distributed, high-availability cloud services. But are we making the same mistakes with NoSQL in the childhood of the cloud that we made with SQL in the childhood of the web? This talk will examine some general security issues that come with emphasizing the Availability aspect of Consistency/Availability/Partition-tolerance, and we'll also look at some specific issues with popular NoSQL databases such as MongoDB and Cassandra. &lt;br /&gt;
&lt;br /&gt;
== '''Sponsors:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Evolve logo.jpg|http://www.go-evolve.com/]] &lt;br /&gt;
&lt;br /&gt;
Evolve Technology Group:&amp;lt;br&amp;gt;Evolve Technology Group’s mission is to build robust networks to support Data, Voice and Video. We provide professional consulting services to integrate technology solutions that effectively mitigate a wide variety of information security risks and performance issues faced by our clients. In our constantly changing world, we provide relevance in the industry with best of breed products and solutions coupled with superior customer service to enable our clients to exceed their goals. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:WebSenseLogo.jpg|http://www.websense.com/content/home.aspx]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Websense:&amp;lt;br&amp;gt;The Websense TRITONT security architecture provides the industry’s first and only unified content security solution to deliver the best modern security for inbound threats and outbound risks with the lowest total cost of ownership. Websense secures the modern business as its infrastructure dissolves and users, data, and applications move to the Web. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107420</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=107420"/>
				<updated>2011-03-23T20:04:38Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Mid-edit Save for the LA April 2011 meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;March 16, 2011 6:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Les Freres Taix French Restaurant&amp;lt;br&amp;gt;1911 West Sunset Blvd.&amp;lt;br&amp;gt;Los Angeles, CA 90026&amp;lt;br&amp;gt;213/484-1265&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
 Please RSVP: [http://www.issa-la.org/rsvpoptions/ http://www.issa-la.org/rsvpoptions/&lt;br /&gt;
 ]&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: NoSQL Security''' ==&lt;br /&gt;
'''Speaker: Bryan Sullivan'''[[Image:Liam OMurchu.png|left|112x130px|Scottsutherland.jpeg]]&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Bryan Sullivan is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect.&lt;br /&gt;
&lt;br /&gt;
Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on topics such as RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Abstract: NoSQL Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NoSQL databases are rapidly gaining popularity, especially for use in distributed, high-availability cloud services. But are we making the same mistakes with NoSQL in the childhood of the cloud that we made with SQL in the childhood of the web? This talk will examine some general security issues that come with emphasizing the Availability aspect of Consistency/Availability/Partition-tolerance, and we'll also look at some specific issues with popular NoSQL databases such as MongoDB and Cassandra.&lt;br /&gt;
&lt;br /&gt;
== '''Sponsors:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Evolve logo.jpg|http://www.go-evolve.com/]] &lt;br /&gt;
&lt;br /&gt;
Evolve Technology Group:&amp;lt;br&amp;gt;Evolve Technology Group’s mission is to build robust networks to support Data, Voice and Video. We provide professional consulting services to integrate technology solutions that effectively mitigate a wide variety of information security risks and performance issues faced by our clients. In our constantly changing world, we provide relevance in the industry with best of breed products and solutions coupled with superior customer service to enable our clients to exceed their goals. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:WebSenseLogo.jpg|http://www.websense.com/content/home.aspx]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Websense:&amp;lt;br&amp;gt;The Websense TRITONT security architecture provides the industry’s first and only unified content security solution to deliver the best modern security for inbound threats and outbound risks with the lowest total cost of ownership. Websense secures the modern business as its infrastructure dissolves and users, data, and applications move to the Web. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106501</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106501"/>
				<updated>2011-03-09T00:57:22Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;March 16, 2011 6:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Les Freres Taix French Restaurant&amp;lt;br&amp;gt;1911 West Sunset Blvd.&amp;lt;br&amp;gt;Los Angeles, CA 90026&amp;lt;br&amp;gt;213/484-1265&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
 Please RSVP: [http://www.issa-la.org/rsvpoptions/ http://www.issa-la.org/rsvpoptions/&lt;br /&gt;
 ]&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: STUXNET'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
== '''Speaker: Liam O Murchu'''[[Image:Liam OMurchu.png|left|112x130px|Scottsutherland.jpeg]]&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran. &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067122121S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''Abstract: STUXNET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Dinner Menu Options:&lt;br /&gt;
&lt;br /&gt;
■Chicken Vol Au Vent&amp;lt;br&amp;gt;■Lamb Shank&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Dinner Fees:&lt;br /&gt;
&lt;br /&gt;
LA members &amp;amp;amp; members of other ISSA chapters, ISACA, OWASP members – with reservations and online-payment: $20&amp;lt;br&amp;gt;LA members &amp;amp;amp; members of other ISSA chapters, ISACA, OWASP members – without reservation: $30&amp;lt;br&amp;gt;Non-members with reservations and online-payment: $30&amp;lt;br&amp;gt;Non-members without reservation: $40&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Sponsors:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Evolve logo.jpg|http://www.go-evolve.com/]] &lt;br /&gt;
&lt;br /&gt;
Evolve Technology Group:&amp;lt;br&amp;gt;Evolve Technology Group’s mission is to build robust networks to support Data, Voice and Video. We provide professional consulting services to integrate technology solutions that effectively mitigate a wide variety of information security risks and performance issues faced by our clients. In our constantly changing world, we provide relevance in the industry with best of breed products and solutions coupled with superior customer service to enable our clients to exceed their goals. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:WebSenseLogo.jpg|http://www.websense.com/content/home.aspx]]&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Websense:&amp;lt;br&amp;gt;The Websense TRITONT security architecture provides the industry’s first and only unified content security solution to deliver the best modern security for inbound threats and outbound risks with the lowest total cost of ownership. Websense secures the modern business as its infrastructure dissolves and users, data, and applications move to the Web. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106500</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106500"/>
				<updated>2011-03-09T00:54:15Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;March 16, 2011 6:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Les Freres Taix French Restaurant&amp;lt;br&amp;gt;1911 West Sunset Blvd.&amp;lt;br&amp;gt;Los Angeles, CA 90026&amp;lt;br&amp;gt;213/484-1265&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
 Please RSVP: [http://www.issa-la.org/rsvpoptions/ http://www.issa-la.org/rsvpoptions/&lt;br /&gt;
 ]&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: STUXNET'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
== '''Speaker: Liam O Murchu'''[[Image:Liam OMurchu.png|left|112x130px|Scottsutherland.jpeg]]&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran. &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067122121S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067115834S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''''''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Abstract: STUXNET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Sponsor:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Evolve logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
Evolve Technology Group:&amp;lt;br&amp;gt;Evolve Technology Group’s mission is to build robust networks to support Data, Voice and Video. We provide professional consulting services to integrate technology solutions that effectively mitigate a wide variety of information security risks and performance issues faced by our clients. In our constantly changing world, we provide relevance in the industry with best of breed products and solutions coupled with superior customer service to enable our clients to exceed their goals. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:WebSenseLogo.jpg]]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Websense:&amp;lt;br&amp;gt;The Websense TRITONT security architecture provides the industry’s first and only unified content security solution to deliver the best modern security for inbound threats and outbound risks with the lowest total cost of ownership. Websense secures the modern business as its infrastructure dissolves and users, data, and applications move to the Web. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106499</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106499"/>
				<updated>2011-03-09T00:50:58Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;March 16, 2011 6:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Les Freres Taix French Restaurant&amp;lt;br&amp;gt;1911 West Sunset Blvd.&amp;lt;br&amp;gt;Los Angeles, CA 90026&amp;lt;br&amp;gt;213/484-1265&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
 Please RSVP: [http://www.issa-la.org/rsvpoptions/ http://www.issa-la.org/rsvpoptions/&lt;br /&gt;
 ]&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: STUXNET'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
== '''Speaker: Liam O Murchu'''[[Image:Liam OMurchu.png|left|112x130px|Scottsutherland.jpeg]]&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran. &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067122121S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067115834S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''''''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Abstract: STUXNET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Sponsor:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Evolve logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
Evolve Technology Group:&amp;lt;br&amp;gt;Evolve Technology Group’s mission is to build robust networks to support Data, Voice and Video. We provide professional consulting services to integrate technology solutions that effectively mitigate a wide variety of information security risks and performance issues faced by our clients. In our constantly changing world, we provide relevance in the industry with best of breed products and solutions coupled with superior customer service to enable our clients to exceed their goals. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:WebSenseLogo.jpg]]&lt;br /&gt;
Websense:&amp;lt;br&amp;gt;The Websense TRITONT security architecture provides the industry’s first and only unified content security solution to deliver the best modern security for inbound threats and outbound risks with the lowest total cost of ownership. Websense secures the modern business as its infrastructure dissolves and users, data, and applications move to the Web. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106498</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106498"/>
				<updated>2011-03-09T00:49:36Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;March 16, 2011 6:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Les Freres Taix French Restaurant&amp;lt;br&amp;gt;1911 West Sunset Blvd.&amp;lt;br&amp;gt;Los Angeles, CA 90026&amp;lt;br&amp;gt;213/484-1265&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
 Please RSVP: [http://www.issa-la.org/rsvpoptions/ http://www.issa-la.org/rsvpoptions/&lt;br /&gt;
 ]&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: STUXNET'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
== '''Speaker: Liam O Murchu'''[[Image:Liam OMurchu.png|left|112x130px|Scottsutherland.jpeg]]&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran. &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067122121S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067115834S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''''''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Abstract: STUXNET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Sponsor:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Evolve_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Evolve Technology Group:&amp;lt;br&amp;gt;Evolve Technology Group’s mission is to build robust networks to support Data, Voice and Video. We provide professional consulting services to integrate technology solutions that effectively mitigate a wide variety of information security risks and performance issues faced by our clients. In our constantly changing world, we provide relevance in the industry with best of breed products and solutions coupled with superior customer service to enable our clients to exceed their goals. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Websense:&amp;lt;br&amp;gt;The Websense TRITONT security architecture provides the industry’s first and only unified content security solution to deliver the best modern security for inbound threats and outbound risks with the lowest total cost of ownership. Websense secures the modern business as its infrastructure dissolves and users, data, and applications move to the Web. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:WebSenseLogo.jpg&amp;diff=106497</id>
		<title>File:WebSenseLogo.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:WebSenseLogo.jpg&amp;diff=106497"/>
				<updated>2011-03-09T00:46:56Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Evolve_logo.jpg&amp;diff=106496</id>
		<title>File:Evolve logo.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Evolve_logo.jpg&amp;diff=106496"/>
				<updated>2011-03-09T00:46:33Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106494</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106494"/>
				<updated>2011-03-09T00:44:54Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Adding Sponsers&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;March 16, 2011 6:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Les Freres Taix French Restaurant&amp;lt;br&amp;gt;1911 West Sunset Blvd.&amp;lt;br&amp;gt;Los Angeles, CA 90026&amp;lt;br&amp;gt;213/484-1265&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
 Please RSVP: [http://www.issa-la.org/rsvpoptions/ http://www.issa-la.org/rsvpoptions/&lt;br /&gt;
 ]&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: STUXNET'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
== '''Speaker: Liam O Murchu'''[[Image:Liam OMurchu.png|left|112x130px|Scottsutherland.jpeg]]&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran. &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067122121S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067115834S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''''''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Abstract: STUXNET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Sponsor:'''  ==&lt;br /&gt;
&lt;br /&gt;
Evolve Technology Group:&amp;lt;br&amp;gt;Evolve Technology Group’s mission is to build robust networks to support Data, Voice and Video. We provide professional consulting services to integrate technology solutions that effectively mitigate a wide variety of information security risks and performance issues faced by our clients. In our constantly changing world, we provide relevance in the industry with best of breed products and solutions coupled with superior customer service to enable our clients to exceed their goals.&lt;br /&gt;
&lt;br /&gt;
Websense:&amp;lt;br&amp;gt;The Websense TRITONT security architecture provides the industry’s first and only unified content security solution to deliver the best modern security for inbound threats and outbound risks with the lowest total cost of ownership. Websense secures the modern business as its infrastructure dissolves and users, data, and applications move to the Web. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106493</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106493"/>
				<updated>2011-03-09T00:43:43Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;March 16, 2011 6:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Les Freres Taix French Restaurant&amp;lt;br&amp;gt;1911 West Sunset Blvd.&amp;lt;br&amp;gt;Los Angeles, CA 90026&amp;lt;br&amp;gt;213/484-1265&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
 Please RSVP: [http://www.issa-la.org/rsvpoptions/ http://www.issa-la.org/rsvpoptions/&lt;br /&gt;
 ]&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: STUXNET'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
== '''Speaker: Liam O Murchu'''[[Image:Liam OMurchu.png|left|112x130px|Scottsutherland.jpeg]]&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran. &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067122121S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067115834S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''''''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Abstract: STUXNET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Liam O Murchu is the manager of Security Response Operations for North America with Symantec. In this role he leads the team of malware reverse engineers and is constantly combating the latest malware attacks and dealing with cutting edge threats of all sorts. Liam has analyzed the majority of the high profile threats that have emerged in the last number of years, both documenting their actions and working with both private parties and law enforcement agencies to counter these threats. His research has been presented before the US congress and the British and EU Parliaments. As part of his research he has been credited with discovering several zero day vulnerabilities. Most recently Liam has been analyzing the Stuxnet worm which is speculated to have been targeting Uranium enrichment plants in Iran. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Sponsor:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Netspi logo.png|left|Netspi logo.png]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.netspi.com/ http://www.netspi.com/] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106492</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=106492"/>
				<updated>2011-03-09T00:41:16Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;March 16, 2011 6:00 P.M.&amp;amp;nbsp;- 8:30 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Les Freres Taix French Restaurant&amp;lt;br&amp;gt;1911 West Sunset Blvd.&amp;lt;br&amp;gt;Los Angeles, CA 90026&amp;lt;br&amp;gt;213/484-1265&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
 Please RSVP: [http://www.issa-la.org/rsvpoptions/ http://www.issa-la.org/rsvpoptions/&lt;br /&gt;
 ]&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: STUXNET'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
== '''Speaker: Scott Sutherland'''[[Image:Liam_OMurchu.png|left|112x168px|Scottsutherland.jpeg]]&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Scott Sutherland is a Senior Security Consultant responsible for the development and management of penetration test services at NetSPI, which is a security services company based in Minneapolis. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. Scott has ten years of IT consulting experience. Six of which have been focused on providing security services. Additionally, Scott presented at the National OWASP AppSec 2010 Conference and the local Security BSidesMSP conferences in the last year.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067122121S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067115834S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Abstract: Database Security in the Real World'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This presentation will provide an overview of the common threats and vectors that are leveraged by real world attackers to gain unauthorized access to high value databases. It is well understood that high value databases support critical applications and store sensitive information, but they can also be used to escalate privileges in Windows environments and propagate botnets across the internet. This presentation will provide developers and system administrators with a better understanding of how those attacks are conducted.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Sponsor:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Netspi logo.png|left|Netspi logo.png]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.netspi.com/ http://www.netspi.com/] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Liam_OMurchu.png&amp;diff=106491</id>
		<title>File:Liam OMurchu.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Liam_OMurchu.png&amp;diff=106491"/>
				<updated>2011-03-09T00:36:35Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_2009,_2010&amp;diff=106486</id>
		<title>Los Angeles Previous Presentations 2009, 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_2009,_2010&amp;diff=106486"/>
				<updated>2011-03-08T22:13:13Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: moved Los Angeles Previous Presentations Mega Archive to Los Angeles Previous Presentations 2009, 2010&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &amp;amp;nbsp;Previous Presentations  =&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298059442687S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''Wednesday, January 26, 2011 7:00 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
*'''Evercookie: The Persistent Cookie'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&amp;amp;lt;span id=&amp;quot;fck_dom_range_temp_1298060072205_918&amp;quot; /&amp;amp;gt;&lt;br /&gt;
900&amp;amp;nbsp;Corporate Pointe&lt;br /&gt;
Culver City, CA&amp;amp;nbsp;90230&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
'''&amp;lt;br&amp;gt;Description:&amp;lt;br&amp;gt;'''Evercookie is a JavaScript API that produces extremely persistent cookies in a browser. Its goal is to identify a client even after they have removed standard cookies, Flash cookies Local Shared Objects or LSOs), and others. &lt;br /&gt;
&lt;br /&gt;
Evercookie accomplishes this by storing the cookie data in several types of storage mechanisms that are available on the local browser. Additionally, if evercookie has found the user has removed any of the types of cookies in question, it recreates them using each mechanism available. &lt;br /&gt;
&lt;br /&gt;
You can read more about Samy and Evercookie at [http://samy.pl/evercookie '''http://samy.pl/evercookie/'''] &lt;br /&gt;
&lt;br /&gt;
'''Speaker: &amp;lt;br&amp;gt;'''Samy Kamkar is best known for the Samy worm, the first XSS worm, infecting over one million users on MySpace in less than 24 hours. A co-founder of Fonality, Inc., an IP PBX company, Samy previously led the development of all toplevel domain name server software and systems for Global Domains International (.ws), and worked for Penn State University developing AI-based psychometric personality assessment software. In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in network security, reverse engineering, and network gaming. When not strapped behind the Matrix, Samy can be found stunt driving, getting involved in local community service projects, and continuing his focus on staying out of jail. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''Sponser:&amp;lt;br&amp;gt;'''IBM&amp;amp;nbsp;Rational Software&amp;lt;br&amp;gt;http://www-01.ibm.com/software/rational/&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298059442687S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''Wednesday, July 21, 2011 7:00 PM'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1281462225310S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''How I Met Your Girlfriend: Entirely New Classes of Web Attacks'''&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&lt;br /&gt;
900 Corporate Pointe&lt;br /&gt;
Culver City, CA 90230&amp;lt;/pre&amp;gt;&lt;br /&gt;
Description:&amp;lt;br&amp;gt;This includes using HTML5 client-side XSS (without XSS hitting the server!), and my newly discovered attacks on PHP session hijacking and random numbers (accurately guessing PHP session cookies), browser protocol confusion (turning a browser into an SMTP server), firewall and NAT penetration via Javascript (turning your router against you), remote iPhone Google Maps hijacking (iPhone penetration combined with HTTP man-in-the-middle), extracting extremely accurate geolocation information from a web browser (not using IP geolocation), and more. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Speaker: Samy Kamkar is best known for the Samy worm, the first XSS worm, infecting over one million users on MySpace in less than 24 hours. A co-founder of Fonality, Inc., an IP PBX company, Samy previously led the development of all top-level domain name server software and systems for Global Domains International (.ws), and worked for Penn State University developing AI-based psychometric personality assessment software. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in network security, reverse engineering, and network gaming. When not strapped behind the Matrix, Samy can be found stunt driving, getting involved in local community service projects, and continuing his focus on staying out of jail. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Dinner Sponser: Citrix Systems&amp;lt;br&amp;gt;[[Image:Citrix Picture.jpg|80x80px|http://lacitrix.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, June 09, 2010 7:30PM&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*Security Assertion Markup Language (SAML), Shibboleth Single SignOn System, and Shibboleth's role at University of Southern California&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&lt;br /&gt;
900 Corporate Pointe&lt;br /&gt;
Culver City, CA 90230&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Speaker: Brendan Bellina &amp;lt;br&amp;gt;Title: Identity Services Architect and Manager of Enterprise Middleware Identity Management at USC &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
NOTE: We are having this month meeting on the second Wednesday, instead of the regular third Wednesday, to avoid conflict with ISSA Summit scheduled on June 16. You can still register for the summit at the ISSA LA website (http://www.issa-la.org/Default.aspx?id=1088). &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, April 21st, 2010 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The intersection of social and technical attacks in Web 2.0 applications by Mike Bailey and Mike Murray&lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   Symantec Corporation&lt;br /&gt;
   900 Corporate Pointe&lt;br /&gt;
   Culver City, CA 90230&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Topic: The intersection of social and technical attacks in Web 2.0 applications &lt;br /&gt;
&lt;br /&gt;
Speakers: Mike Bailey and Mike Murray &lt;br /&gt;
&lt;br /&gt;
Mike Bailey is a senior security researcher at MAD Security and an application security specialist. While his research spans a wide variety of domains, it generally focuses on secure web application development, web application scanning and penetration testing, online privacy issues, network protocols and services, and how to break them. &lt;br /&gt;
&lt;br /&gt;
Mike has spoken throughout the country at different security conferences and shows, including Blackhat DC, Toorcon, Defcon and others. Aside from coming up with new and interesting ways to break web and client-side applications, he also puts those attacks into practice as a penetration tester. Currently, Mike is studying the intersection of social and technical attacks in Web 2.0 applications. He publishes his research on the MAD Security blog as well as at Skeptikal.org. &lt;br /&gt;
&lt;br /&gt;
Mike Murray has spent his entire career in information security and currently leads the delivery arm of MAD Security (MADSecInc.com). Mike is a co-founder of InfoSecLeaders.com where he writes and talks about the skills and strategies for building a long-term career in information security. Mike's on security careers have been seen at major conferences like RSA and Defcon. &lt;br /&gt;
&lt;br /&gt;
== Wednesday, March 17th, 2010 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Mike Schrenk, author of &amp;quot;Webbots, Spiders, and Screen Scrapers&amp;quot;&lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   Symantec Corporation&lt;br /&gt;
   900 Corporate Pointe&lt;br /&gt;
   Culver City, CA 90230&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
BOOK PREVIEW: Webbots, Spiders, and Screen Scrapers SECOND EDITION &lt;br /&gt;
&lt;br /&gt;
Michael Schrenk will provide a preview of the largely expanded second edition of his book &amp;quot;Webbots, Spiders, and Screen Scrapers&amp;quot;. This second edition describes how technologies like JavaScript, AJAX and Flash challenge webbot developers and how those challenges are met. He will also talk about defeating CAPTCHAs, scalability and other related topics. &lt;br /&gt;
&lt;br /&gt;
Michael Schrenk is a software developer, author and instructor, who specializes in automated web browsing agents known as webbots. Michael uses the Internet in new and innovative (odd?) ways to provide competitive advantages for his clients in The US, Europe and Asia. &lt;br /&gt;
&lt;br /&gt;
He also helps journalists more effectively use computers to conduct online research through automation and by describing where and how to find otherwise hidden online information. No stranger to Europe--he's lived and worked for clients in Moscow and Madrid, Mike taught at the 2008 European Investigative Journalism Conference (Brussels Belgium), twice in 2009 he lectured at The Center for Investigative Journalism (London England) and later in 2009, he lead several sessions at the VVOJ Journalism conference (Utrecht The Netherlands). &lt;br /&gt;
&lt;br /&gt;
Last August, Mike made his fourth speaking appearance at the DEFCON computer hacking conference. Mike lives in sunny Las Vegas, Nevada (USA). You can contact him at http://www.schrenk.com or follow him on Twitter [http://twitter.com/mgschrenk @mgschrenk]. &lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, February 24th, 2010 7:00PM  ==&lt;br /&gt;
&lt;br /&gt;
*Cloud Computing Security: Raining on the Trendy New Parade&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Slides can be found [https://docs.google.com/fileview?id=0By_clZjtpXPwMWM0YWIyZDgtZmRkZC00YTZlLWE1MDEtNmU0N2Y3MzQwMTJh&amp;amp;hl=en here on Google Docs]. &lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   AT&amp;amp;amp;T Interactive&lt;br /&gt;
   611 N. Brand Blvd., 5th Floor&lt;br /&gt;
   Glendale, CA&lt;br /&gt;
&lt;br /&gt;
Cloud computing is an unstoppable meme at the CIO level, and will dominate corporate IT planning for the next several years. Although they do offer the promise of cost savings for many organizations, the basic ideas behind abstracting out the corporate datacenter greatly complicates the tasks of securing and auditing these systems. While there has been excellent research into low-level hypervisor and virtualization bugs, there has been little public discussion of the “big picture” problems for cloud computing. These include virtualized network devices, browser same-origin issues, credential management and many interesting legal challenges. &lt;br /&gt;
&lt;br /&gt;
Our goal with this talk will be to explore the different attack scenarios that exist in the cloud computing world and to provide a comparison between the security models of the leading cloud computing platforms. We will discuss how current attacks against applications and infrastructure are changed with cloud computing, as well as introduce the audience to new types of vulnerabilities that are unique to cloud computing. Attendees will learn how to analyze the threat posed to them by cloud computing platforms as either providers or consumers of software built on these new platforms. Our platforms for discussion include Salesforce.com, Google Apps, Microsoft Office Live, Google AppEngine, Microsoft Azure, Amazon EC2, and Sun. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Alex Stamos is a founding partner of iSEC Partners, a strategic digital security organization. Alex is an experienced security engineer and consultant specializing in application security and securing large infrastructures, and has taught multiple classes in network and application security. &lt;br /&gt;
&lt;br /&gt;
He is a leading researcher in the field of web application and web services security and has been a featured speaker at top industry conferences such as Black Hat, CanSecWest, DefCon, SyScan, Microsoft BlueHat and OWASP App Sec. &lt;br /&gt;
&lt;br /&gt;
He holds a BS in Electrical Engineering and Computer Science from the University of California, Berkeley. &lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, January 20th, 2010 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Do VLANs allow for good application security?&lt;br /&gt;
&lt;br /&gt;
    Meeting Location&lt;br /&gt;
    [http://maps.google.com/maps?q=900+Corporate+Pointe,+90230&amp;amp;ie=UTF8&amp;amp;oe=UTF-8&amp;amp;ll=33.988385,-118.387041&amp;amp;spn=0.010284,0.014055&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=addr Symantec Corporation]&lt;br /&gt;
    900 Corporate Pointe&lt;br /&gt;
    Culver City, CA 90230&lt;br /&gt;
    Laguna Conference Room&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Virtual Local Area Networks (VLANs) are not a new concept, and can help any organization better control network access. I will present some of the previous issues identified, what was the root cause, and how these have been fixed in current technology. In addition we will talk about how this can help to enhance security in your environment, and what controls must be in place in order to implement such an environment. We will also touch on how this can complicate your application environment, but improve overall security. &lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when working with VMware, VLANs, and web applications, to ensure that these networks are secure, and what to look for to potentially pass audit criteria. I will also talk about where and how these controls have been implemented in order to protect thousands of users while accessing one of the most hostile networks in the world. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan, Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including, consulting, engineering and administration. He has performed security assessment projects for health care, nuclear, manufacturing, pharmaceutical, banking and educational sectors. As an active participant in the information security community, he volunteers at DEFCON where he designs and implements the Firewall and Network for what is said to be the most hostile network environment in the world. &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security groups both as a board member of OWASP MSP and DC612. His roots and experience come from working for a large enterprise banks, designing and managing enterprise security systems. In the more recent years he has been working as an Information Security Consultant to review the security and architecture of information computing environments. &lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, December 16th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/b/bc/Sutton_-_Pulling_The_Plug-Security_Risks_in_Next_Generation_Offline_Web_Apps_-_OWASP_LA_OC.pdf Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as Gears (formerly Google Gears) and the Database Storage &amp;amp;lt;http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage/&amp;amp;gt; functionality included in the emerging HTML 5 &amp;amp;lt;http://dev.w3.org/html5/spec/Overview.html&amp;amp;gt; specification. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications. &lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given web application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Michael Sutton,Vice President and security research at Zscaler, has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry. &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, November 18th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/b/bc/Watching_software_run_11.18.09.pptx Watching Software Run with Brian Chess, Fortify Founder and Chief Scientist]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Now more than ever before, computer systems are vulnerable because software is vulnerable. No matter how good programmers get at making secure software, it will never be perfect—we will always have to contend with incomplete or inadequate code. Most efforts at living with bad code have focused on shoring it up from the outside: limiting network access (firewalls) or watching for suspicious behavior (intrusion detection). This talk takes a different perspective: we’ll look at methods for identifying and blunting the effects of software shortcomings from the inside by watching the software run. &lt;br /&gt;
&lt;br /&gt;
Modern languages like Java and C# are good for more than just programmers. They also provide a wealth of structured information when they execute. We can apply many same techniques developed for outside-in security, but at a finer granularity and with much more context. Along the way there is a lot to talk about: Where web application firewalls excel and where they fall down. Fuzzing vs. static analysis. The disappointments of both aspect oriented programming and building security in. Why nobody uses the Java Security model. Taking your security with you into the cloud. The reason SQL injection won’t go away. Revenge of the reference monitor. Why was Twitter’s security so bad? &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Brian Chess is a founder of Fortify Software and serves as Fortify's Chief Scientist, where his work focuses on practical methods for creating secure systems. His book, Secure Programming with Static Analysis, shows how static source code analysis is an indispensable tool for getting security right. Brian holds a Ph.D. in computer engineering from the University of California at Santa Cruz, where he studied the application of static analysis to the problem of finding security-relevant defects in source code. Before settling on security, Brian spent a decade in Silicon Valley working at huge companies and small startups. He has done research on a broad set of topics, ranging from integrated circuit design all the way to delivering software as a service. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, October 21st, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/c/ca/ISO27001_OWASPLA_Shankar_10212009.pdf Enabling Compliance Requirements using Information Security Management System (ISMS) Framework (ISO27001)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Growing threats and complex regulatory requirements emphasize the need for an effective Information Security Management System (ISMS) framework for an organization. Comprehensive and globally accepted standards like ISO27001 can help in protecting information assets and in enabling compliance requirements. ISO27001 provides an Information Security framework based on best practices and controls to ensure the confidentiality, integrity and availability of information assets. This presentation analyzes the possible synergies between the goals of Information Security Management System (ISMS) and the various compliance requirements, thus making the compliance efforts less complex. &amp;lt;br&amp;gt;Following are the key objectives of this presentation&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
*Provide an introduction to ISO27001 and its controls &lt;br /&gt;
*Discuss the implementation approach for an Information Security Management System (ISMS) framework &lt;br /&gt;
*Familiarize the audience with some common challenges in implementation &lt;br /&gt;
*Outline synergy between ISO27001 controls and some compliance requirements( PCI , etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Attendees will learn about ISO27001 Information Security Standard, ISMS implementation approach and how ISO27001 can be used in meeting various regulatory/compliance requirements like Sox, PCI etc. It will also help the attendees to improve the information security posture of the organization and provide an effective and efficient approach for handling various information security/compliance audits with less effort. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Shankar Subramaniyan has over 11 years of experience as a technology consulting and project management executive in the areas of IT Governance, Risk and Compliance (GRC), Business Continuity Planning and Network Design &amp;amp;amp; Architecture. He has thorough expertise on setting up Information Security Framework and Policies on the basis of industry standards such as ISO 27001. He has worked extensively on industry standards and best practices like BS7799 and ITIL. He also has good understanding and knowledge of various compliance requirements like PCI, Sox etc. Shankar' s experience includes IT audit, SOX remediation, ISMS (ISO27001) implementation, PCI compliance assessment, disaster recovery solution, enterprise risk management, designing IT security architecture and implementing ITIL processes. Shankar has rich experience in handling large projects and managing client relationships across corporate and educational sectors. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, September 16th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;On August 5th of 2009, Federal prosecutors on Monday charged Albert Gonzales with the largest case of credit and debit card data theft ever in the United States: 130 million credit cards numbers by hacking into the systems of Heartland Payment Systems, the New Jersey-based card processing company, as well as Hannaford Brothers, 7-Eleven and two unnamed national retailers. Using a SQL-injection attack, the hackers installed malware on Hannaford Brothers. Hannaford was PCI compliant at the time they were compromise that lets question the validity of regulatory compliance frameworks, and specifically PCI standards as an effective method to reduce data breaches, identity theft, and the proliferation of credit card fraud. This presentation will further analyze how status quo security standards, such as PCI-DSS, as well as other policies, standards, and guidelines truly affect security risk mitigation efforts against cybercrime based threats. These traditional efforts will be compared to threat modeling workflows in order to demonstrate how real risk is mitigated under each scenario. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Cases for financial fraud will be anonymously presented to create a business case for application threat modeling as a viable methodology to drive improved application design and security risk mitigation. Threat modeling concepts will be elaborated in order to prove how application architecture walkthroughs via threat modeling improve the mitigation of cybercrime threats. Attacker motives and goals will be presented and incorporated into attack trees and it will show how attack libraries can be used to effectively identify application vulnerabilities and devise countermeasures in web application. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;From the risk analysis perspective, several attacks will be considered and highlighted, particularly attacks that represent a systemic impact to an organization or government (such as for example a distributed denial of service). &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Through the presentation of threat modeling scenarios, analyses and correlations will be drawn from the represented model(s) to attack patterns, associated and discovered security vulnerabilities, data sources, application topologies, and possible roles and permissions associated with the application environment. The purpose of the presentation is to demonstrate how application threat modeling can be used as part of a nouveau age form of security risk mitigation and overall application security. Data flow diagrams and application walkthroughs will enable audience members to witness how application threat modeling is an evolved form of security process engineering for improved application design and overall application security. The presentation will also demonstrate how threat modeling is capable of delivering critical business functions as well as in mitigating current and future cyber attacks, such as distributed denial of service, botnet driven-malware, spear phishing techniques, and more attacks that ultimately lead to identity and credit card fraud. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;From the point of view of current and future cybercrime risk mitigation, several different strategies for application threat modeling will be discussed as related to securing both the web application web and critical financial infrastructures, such as ATMs. Finally some emphasis will be given to countermeasures that provide for incident response, intelligence and forensics capabilities. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Presentation outline, defining all topics that will be covered: &lt;br /&gt;
&lt;br /&gt;
*Status quo of regulatory compliance in mitigating risk &lt;br /&gt;
*Threat modeling techniques for cybercrime threats &lt;br /&gt;
*Attack tree analysis for attack tree vectors &lt;br /&gt;
*Threat modeling for multi-channel fraud threat scenarios &lt;br /&gt;
*Cyber crime threats and application countermeasures via threat modeling &lt;br /&gt;
*Example of mitigation strategies for cybercrime and application of defense in depth for web applications&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Any supporting research/tools: &lt;br /&gt;
&lt;br /&gt;
*Threat models and attack trees &lt;br /&gt;
*Threat model are produced using the Microsoft™ threat modeling tool &lt;br /&gt;
*Public available cybercrime data will be presented and correlated&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Marco Morana serves as one of the leaders of OWASP (Open Web Application Security Project) organization where he is actively involved in evangelize on web application security through presentations at local chapter meetings in USA as well as internationally. Marco has recently been awarded a contract from Wiley Publishing to co-author a book on Application Threat Modeling. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Besides being the OWASP Cincinnati chapter lead, Marco is also active contributor to OWASP projects such as the application threat modeling methodology for secure coding guideline and the security testing guide (ver. 2 and 3). Besides contributing to OWASP, Marco works as Technology Information Security Officer for a large financial organization in North America with responsibilities in the definition of the organization web application security standards, management of application security assessments during the SDLC, threat-fraud analysis and training of software developers, project managers and architects on different topics related to application security. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In the past, Marco served as senior security consultant and independent consultant where his responsibilities included providing software security services for several clients in the financial and banking, telecommunications and commercial sector industry. Besides security consulting, Marco had a career as technologist in the security industry where he contributed to the design business critical security products currently being used by several FORTUNE 500 companies as well by the US Government. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Marco work on software security is referred in the 2007 State Of the Art report by the Information Assurance Technology Analysis Center (IATAC). Marco received the NASA’s Space Act Award in 1999 for the patenting the S/MIME SEP (Secure Email Plug-in) application. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Marco research work on application and software security is widely published on several magazines such as In-secure magazine, Secure Enterprise, ISSA Journal and the C/C++ Users journal. Marco’s ideas and strategies for writing secure software are posted on his blog: http://securesoftware.blogspot.com. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tony UcedaVelez has more than 10 years of hands-on security and technology experience and is a vocal advocate of security process engineering – a terminology that describes the design and development of secure processes and controls working symbiotically to a unique business workflow. Tony currenlty serves as Managing Director for an Atlanta based risk advisory firm that focuses on security strategy and delivering effective means for risk mitigation and security process engineering. He has worked and consulted for the Fortune 500, as well as federal agencies in the U.S on the topic of application security and security process engineering. His diverse background in software development, security architecture, and network security, coupled with his expertise in process engineering and security risk management has allowed Tony to be a recognized leader in developing strategic security solutions that are multi-faceted in their approach to addressing enterprise risk. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In the realm of application security, Tony is a threat modeling evangelist and has provided numerous talks domestically and globally on its many benefits and application. He has served as a guest mentor to teams participating in Kennesaw State University’s annual Cybercrime capture the flag event as well as a Cybercrime speaker for Southern Polytechnic University in Atlanta. He has also served as a guest speaker on the subject of application threat modeling during ISACA’s annual Geek Week event and has also served as a keynote speaker on the subject for ISACA’s Global Symposium web cast series. Additional articles include articles related to CoBIT and the ValIT model (ISACA’s Journal), application threat modeling within the SDLC (InSecureMagazine), and security process engineering for a ROSI (return on security investment) (Journal of Finance). He is currently finalizing a Wiley publishing book on Application Threat Modeling with Marco Morana. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Prior to VerSprite, Tony served as Sr. Director of Security Risk Management to a Fortune 50 organization where he led security assessments against global application environments. His work encompassed web application security testing, security architecture reviews, and analysis for business logic exploits. He applied effective ways to introduce the subject of application risk to information owners by effectively mapping them to causal factors for business. Previous to this role, he spent more than 5 years in the field of application security across other Fortune 500 organizations within the banking, telecom, and information service industry segments. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Tony currently leads the OWASP Atlanta Chapter, where he manages monthly workshops and events for the Atlanta web application security community. He also has developed a case study program for the Atlanta chapter in order to develop case studies with local Atlanta companies who are seeking to apply application threat modeling techniques within the SDLC and/ or incorporate the many OWASP produced tools and frameworks. Tony can be reached at tonyuv@versprite.com or tonyuv@owasp.org. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tuesday, August 25th, 2009 3:00PM  ==&lt;br /&gt;
&lt;br /&gt;
*OWASP Live CD Demo and Q&amp;amp;amp;A with Matt Tessauro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Matt Tesauro will be in visiting our LA chapter and providing a quick demo of [http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project OWASP Live CD] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP Live CD. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Thursday, August 20th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The Software Assurance Maturity Model (SAMM)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.opensamm.org/ The Software Assurance Maturity Model (SAMM)] is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. SAMM is an open and free project and has recently been added under the Open Web Application Security Project (OWASP) Foundation. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tuesday, July 21st, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Lock picks, BumpKeys, and Hackers oh my! How secure is your application?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;This talk will focus on physical security controls, weaknesses, and counter measures. I will present on what lock picking is, how bump keys work, and ways to subverting electronic locks. We will also go into what are good controls, and what is often overlooked when designing secure environments. Many of the topics covered apply to application security, as the methods for securing these devices is by using obscurity. In the application world with automated tools and scripts, this does not hold water for very long. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan, NetSPI has 10 years of computer security experience, including consulting, engineering, and administration. He has performed security assessment projects in the healthcare, nuclear, manufacturing, pharmaceutical, banking and educational sectors. &amp;lt;br&amp;gt;As an active participant in the information security community, he volunteers at DEFCON, where he designs and implements the firewall and network for what is said to be the most hostile network environment in the world. This network allows speakers, press, vendors, and others to gain access to the Internet, without being hacked. In his spare time he and his wife run the local DEFCON group, DC612 and participate in the Minneapolis OWASP chapter. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== June 24th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Information Warfare: Past, Present and Future&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Information warfare is the composite use of psychological operations (PYOPS), military deception (MILDEC), operational security (OPSEC), computer network operations (CNO), and electronic warfare (EW) to control and disrupt information flow. Recently, interest in information war technologies, techniques and policy issues have increased, especially in the domain of CNO. Increased scrutiny over network operations is both legitimate and valid, as global commerce and military powers are integrated and dependent on the Internet for critical operations. This presentation will describe the five domains of information warfare, the past use of information warfare in the Gulf war and recent Cyber attacks on the Eastern European countries of Georgia and Estonia. Information will be presented on possible new directions of information warfare. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Mikhael Felker, CISSP-ISSEP has worked in a variety of roles including instructor, engineer, and researcher. He is currently employed by The Aerospace Corporation in the Information Assurance Technology Department, supporting Information Assurance (IA) for satellite systems. He is also an Instructor within the Computer &amp;amp;amp; Information Systems Division at UCLA Extension, teaching a course in networking. Actively involved in the Los Angeles security community, he is the Education Director for Los Angeles Chapter of Information Systems Security Association (ISSA), member and speaker of Information Systems Audit and Control Association (ISACA), and former Defense Sector Coordinator for InfraGard. Mikhael has published articles in IEEE Security &amp;amp;amp; Privacy, the ISSA Journal, Information Systems Control Journal, and SecurityFocus. He is a recipient of the Scholarship for Service Program (SFS) Fellowship, sponsored by the National Science Foundation and Department of Homeland Security (DHS). Mikhael completed his graduate work at Carnegie Mellon University with a Master's in Information Security Policy &amp;amp;amp; Management and Bachelor's at UCLA in Computer Science. He holds over 10 certifications in IT and Security. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== May 20th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*[http://video.google.com/videoplay?docid=2875886330538461390 Top Ten Web Hacking Techniques of 2008: &amp;quot;What's possible, not probable&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The polls are closed, votes are in, and we have the winners making up the Top Ten Web Hacking Techniques of 2008! The competition was fierce with the newest and most innovative web hacking techniques to the test. This session will review the top ten hacks from 2008 - what they indicate about the security of the web, what they mean for businesses, and what might be used against us soon down the road. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Jeremiah Grossman is the founder and CTO of WhiteHat Security. He is considered a world-renowned expert in Web security, is a co- founder of the Web Application Security Consortium, and was named to InfoWorld's Top 25 CTOs for 2007. Grossman is a frequent speaker at industry events including the Black Hat Briefings, RSA, CSI, HiTB, OWASP, ISSA, and a number of large universities. He has authored dozens of articles and white papers; is credited with the discovery of many cutting-edge attack and defensive techniques and is a co-author of XSS Attacks. Grossman is often quoted in the the business and technical press. Prior to WhiteHat, Grossman was an information security officer at Yahoo! &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== April 15th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*Cross Site Scripting, Exploits and Defenses&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For a long time, the impact of XSS vulnerabilities has been grossly underestimated. Recent compromises, such as the pro-Hillary [http://cyberinsecure.com/hacked-obama-site-redirects-visitors-to-clintons-site/ defacement] of Barack Obama's website, and a [http://www.securescience.net/twoubledtwitter.html Viral XSS in Twitter] demonstrated the impact of XSS vulnerabilities to the masses. &lt;br /&gt;
&lt;br /&gt;
During this presentation, David Campbell will demonstrate exactly how effective XSS vulns can be, and show you what you can do to protect yourself and your sites. &lt;br /&gt;
&lt;br /&gt;
This presentation was originally delivered to OWASP Colorado in May of 2008, and has been updated for this session. &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:DC_ED_OWASP_XSS_MAY2008_v1.0.pdf Slide deck from May '08 talk] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;David Campbell is an infosec veteran, with experience ranging from penetration testing for Fortune 100's to architecting security solutions for large multinational financials to consulting for government agencies. DC is presently chapter leader of OWASP Denver and is Principal Consultant at Electric Alchemy. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== March 12th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*NETWORK SECURITY DINNER WITH ISSA - CISO'S Security Dashboard Panel!!&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This month will be joining forces with ISSA to create the biggest netowork event for security professionals in Los Angeles for this year. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Agenda &lt;br /&gt;
&lt;br /&gt;
*5:30 p.m., Networking and tours of the antivirus facility &lt;br /&gt;
*6:30 p.m., Dinner &lt;br /&gt;
*7:30 p.m., CISO Panel&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Panelists &lt;br /&gt;
&lt;br /&gt;
*Robert J. Brown, CISSP, CISO WestCorp Credit Union &lt;br /&gt;
*Steve Haydostian, CISSP, Former CISO, Healthnet &lt;br /&gt;
*David Lam, CISSP, CISO, Stephen S. Wise &lt;br /&gt;
*Edward G. Pagett II, CISSP, CISO, Lender Processing Services, Inc. &lt;br /&gt;
*Mike O. Villegas, CISA, CISSP, Director of Information Security, Newegg.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Dinner Fees: &lt;br /&gt;
&lt;br /&gt;
*ISSA-LA members &amp;amp;amp; OWASP members - Pre-Register and Pay online: $25 &lt;br /&gt;
*ISSA-LA members &amp;amp;amp; OWASP members - Pay at the door: $30 &lt;br /&gt;
*Non-members - Pre-Register and Pay online: $30 &lt;br /&gt;
*Non-members - Pay at the door: $35&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;''Thanks to David Lam and Stan Stahl for agreeing to have OWASP joining this ISSA LA event!'' &lt;br /&gt;
&lt;br /&gt;
== February 18th 2009  ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Cloud Computing and Security] &amp;lt;br&amp;gt;The Cloud Computing and Software as a Service models are driving many companies to build innovative, scalable and cost effective alternatives to the traditional IT computing model. Even with the potential cost and scalability benefits of cloud computing, its use by more traditional enterprises has been retarded by the concerns of their professional security and audit staffs. In our experience these concerns are legitimate, and although surveys have shown that security is the #1 factor preventing adoption of cloud computing, there has been very little reliable discussion of the technical security risks inherent in the model and how engineers, sys-admins and architects can deal with these risks. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In this session, we will explore the widely differing security models of the leading cloud computing providers, including Amazon, Google and Salesforce. We will also reveal the significant differences in operational and application security practices necessary to deal with a cloud computing environment. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Alex Stamos is a co-founder and Partner at iSEC Partners Inc., a strategic digital security organization. Alex is an experienced security engineer specializing in solving difficult problems in application security and is a leading researcher in the field of web application and mobile security. He has been a featured speaker at top industry conferences such as Black Hat, Web 2.0 Expo, CanSecWest, DefCon, SyScan, SD Best Practices, Microsoft BlueHat and OWASP App Sec. Alex is a contributing author to &amp;quot;Hacking Exposed: Web 2.0&amp;quot; and an author of the upcoming book &amp;quot;Mobile Application Security&amp;quot;, both from McGraw-Hill. He holds a BSEE from the University of California, Berkeley. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== January 28th 2009  ==&lt;br /&gt;
&lt;br /&gt;
Building Security into the Test Organization &amp;lt;br&amp;gt;The common approach to detecting web security issues is still the regular application of a post-release pen-test or tool based scan. These last minute examinations rarely live up to broader organizational goals; they can be difficult to repeat, measure, or optimize over time. Most of all they're expensive: they find bugs late in the lifecycle. This talk recommends moving security testing responsibility within the test team itself. The approach discussed will work with-or-without the existence of explicit security requirements. See how security testing has been applied at other organizations and how it might be customized for yours. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Ben Walther firmly believes testers have a wonderfully devious mindset, and has been promoting the idea of &amp;quot;security testing&amp;quot; at Cigital's clients, at OWASP events, and to any friends and relatives who will listen. To this end, with the aid of O'Reilly media, Ben Walther and Paco Hope recently published a book entitled the &amp;quot;Web Security Testing Cookbook.&amp;quot; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== December 10th 2008  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/7/79/OWASP-WASCAppSec2007SanJose_SamyWorm.ppt The MySpace Worm] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The most virulent worm in the history of the series of tubes known as the Internet. One of the most highly accessed websites ever [see comScore]. One of the most ostentatious hackers alive. Over one million victims. Less than 24 hours. Fueled only by Chipotle burritos. The MySpace Worm. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Samy will be recapping the story of the development, release and eventual future of the MySpace worm. The 24 hours that led up to over one million friends. The eventual downfall of the MySpace site for several hours. The non-malicious intent and humorous progression of the worm. The t-shirts. The copycats. The behind-the-scenes story of the Secret Service raid at Samy's home and office. The demise of Samy's legal use of computers, community service, restitution, high-risk offender probation, and rehabilitation. And where Samy is today.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar, software engineer and self-proclaimed playboy, is a meddler in the security and software realms. He is currently the Director of Engineering and co-founder of Fonality, Inc., an IP PBX startup located in Culver City. Previously, Samy led the development of all core top-level domain name server software and systems for Global Domains International (.ws). Prior to that, Samy worked with Penn State University developing psychometric personality assessment software with attention to artificial intelligence and bioinformatics. When not strapped behind the Matrix, Samy can be found performing parkour (free running), practicing urban escape artist maneuvers, or is found getting involved in local community service projects. In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in the areas of network security, reverse engineering, and network gaming, and continues his focus in staying out of jail.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== November 19th 2008  ==&lt;br /&gt;
&lt;br /&gt;
A new web attack vector: [http://www.eweek.com/c/a/Security/Security-Researcher-to-Reveal-New-Web-Attack-Vector/ Script Fragmentation]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce a new web-based attack vector which utilizes client-side scripting to fragment malicious web content.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This involves distributing web exploits in a asynchronous manner to evade signature detection. Similar to TCP fragmentation attacks, which are still an issue in current IDS/IPS products, This attack vector involves sending any web exploit in fragments and uses the already existing components within the web browser to reassemble and execute the exploit.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Our presentation will discuss this attack vector used to evade both gateway and client side detection. We will show several proof of concepts containing common readily available web exploits.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stephan Chenette is a Senior Security Researcher who helps lead Websense Security Labs working on malcode detection techniques. Mr. Chenette specializes in research tools ranging from kernel-land sandboxes, to static analysis scanners. He has released public analyses on various vulnerabilities and malware. Prior to joining Websense, Stephan was a security software engineer for 4 years working in research and product development at eEye Digital Security.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== October 29th 2008  ==&lt;br /&gt;
&lt;br /&gt;
Entitlements Management: Security and policies for SOA using XML appliances&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loosely coupled Web Services can be insecure as, by their very nature, are exposed to application consumers. Security built into XML appliances alleviates the developer with the burden of coding security and policies into their application, freeing the developer to concentrate on conding business processes. This evenings meeting will discuss SOA security challenges and introduce the Layer7 XML appliance that allows for dynamic policies to be configured on the fly using an intuitive user interface. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Jonathan Gershater’s career started at 3Com, managing servers and networks. His initial foray into Enterprise Software began in 1999 at enCommerce, which was later acquired by Entrust. He worked at Sun Microsystems from 2005 to 2008 architecting and deploying identity solutions for customers using Sun Java System Identity products. He recently joined Layer 7 Technologies as a senior solution architect. He can be reached at jgershater@layer7tech.com. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== September 17th 2008  ==&lt;br /&gt;
&lt;br /&gt;
The web hacking incident database (WHID) 2007 Report is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. The database classifies each reported attack by, among other criteria, the method used, the outcome of the attack and the industry and the country of the attacked organization. Based on the database Breach Labs which sponsors WHID issues a periodical report on trends in Web Application Security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
By providing answers to questions such as: &lt;br /&gt;
&lt;br /&gt;
*The drivers behind Web hacking. &lt;br /&gt;
*The technology hackers use. &lt;br /&gt;
*The types of organizations attacked most often. &lt;br /&gt;
*The common outcomes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The presentation will discuss WHID statistics, focusing on rising trends in Web Attacks in the 1st half of 2008. As the WHID enables research into the business model behind hacking, the presentation goes beyond discussing the technical aspects of attacks such as SQL injection crawlers and Web Site herding, to discussing the business model common to all of the attacks: Economy of scale. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is a recognized security thought leader and evangelist who frequently speaks with the media and industry groups. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;He is the director of application security at Breach Security. He is also a faculty member for the SANS Institute, where his duties include instructor/courseware developer for Apache Security/Building a Web Application Firewall Workshop, Top 20 Vulnerabilities Team Member and Local Mentor for the SANS Track 4, &amp;quot;Hacker Techniques, Exploits and Incident Handling&amp;quot; course. He holds six SANS Global Information Assurance Certifications (GIAC): Intrusion Analyst (GCIA), Systems and Network Auditor (GSNA), Forensic Analyst (GCFA), Incident Handler (GCIH), Unix Security Administrator (GCUX) and Security Essentials (GSEC). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Mr. Barnett also serves as the team lead for the Center for Internet Security Apache Benchmark Project and is a member of the Web Application Security Consortium. His web security book, &amp;quot;Preventing Web Attacks with Apache,” was published by Addison/Wesley in 2006. &lt;br /&gt;
&lt;br /&gt;
== August 19th 2008  ==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't Write Your Own Security Code&amp;quot; – Application security is arguably the most difficult IT challenge facing organizations today. There are over 600 different categories of vulnerabilities to avoid and they are all tricky. Most of these problems are related to the design, implementation, and use of a relatively small set of security controls. To solve this problem for developers, Jeff created the OWASP ESAPI project – a clean intuitive toolbox of the core security building blocks that every web developer needs. In this talk, Jeff will show you how to create an ESAPI for your organization that will solve the OWASP Top Ten vulnerabilities, increase assurance, and dramatically cut costs all at the same time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Jeff Williams is the founder and CEO of Aspect Security, specializing in application security services. Jeff also serves as the volunteer Chair of the Open Web Application Security Project (OWASP). Jeff has made extensive contributions to the application security community through OWASP, including the Top Ten, WebGoat, Stinger, Secure Software Contract Annex, Enterprise Security API, and the local chapters program. Jeff holds advanced degrees in psychology, computer science, and human factors, and graduated cum laude from Georgetown Law.&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_Mega_Archive&amp;diff=106487</id>
		<title>Los Angeles Previous Presentations Mega Archive</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_Mega_Archive&amp;diff=106487"/>
				<updated>2011-03-08T22:13:13Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: moved Los Angeles Previous Presentations Mega Archive to Los Angeles Previous Presentations 2009, 2010&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Los Angeles Previous Presentations 2009, 2010]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_2009,_2010&amp;diff=106484</id>
		<title>Los Angeles Previous Presentations 2009, 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_2009,_2010&amp;diff=106484"/>
				<updated>2011-03-08T22:12:12Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: moved Los Angeles Previous Presentations to Los Angeles Previous Presentations Mega Archive: Breaking this down by year(i.e. 2009, 2010, 2011) due to the OWASP Wiki's lack of ability to deal with pages over 32 megs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &amp;amp;nbsp;Previous Presentations  =&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298059442687S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''Wednesday, January 26, 2011 7:00 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
*'''Evercookie: The Persistent Cookie'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&amp;amp;lt;span id=&amp;quot;fck_dom_range_temp_1298060072205_918&amp;quot; /&amp;amp;gt;&lt;br /&gt;
900&amp;amp;nbsp;Corporate Pointe&lt;br /&gt;
Culver City, CA&amp;amp;nbsp;90230&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
'''&amp;lt;br&amp;gt;Description:&amp;lt;br&amp;gt;'''Evercookie is a JavaScript API that produces extremely persistent cookies in a browser. Its goal is to identify a client even after they have removed standard cookies, Flash cookies Local Shared Objects or LSOs), and others. &lt;br /&gt;
&lt;br /&gt;
Evercookie accomplishes this by storing the cookie data in several types of storage mechanisms that are available on the local browser. Additionally, if evercookie has found the user has removed any of the types of cookies in question, it recreates them using each mechanism available. &lt;br /&gt;
&lt;br /&gt;
You can read more about Samy and Evercookie at [http://samy.pl/evercookie '''http://samy.pl/evercookie/'''] &lt;br /&gt;
&lt;br /&gt;
'''Speaker: &amp;lt;br&amp;gt;'''Samy Kamkar is best known for the Samy worm, the first XSS worm, infecting over one million users on MySpace in less than 24 hours. A co-founder of Fonality, Inc., an IP PBX company, Samy previously led the development of all toplevel domain name server software and systems for Global Domains International (.ws), and worked for Penn State University developing AI-based psychometric personality assessment software. In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in network security, reverse engineering, and network gaming. When not strapped behind the Matrix, Samy can be found stunt driving, getting involved in local community service projects, and continuing his focus on staying out of jail. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''Sponser:&amp;lt;br&amp;gt;'''IBM&amp;amp;nbsp;Rational Software&amp;lt;br&amp;gt;http://www-01.ibm.com/software/rational/&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298059442687S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''Wednesday, July 21, 2011 7:00 PM'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1281462225310S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''How I Met Your Girlfriend: Entirely New Classes of Web Attacks'''&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&lt;br /&gt;
900 Corporate Pointe&lt;br /&gt;
Culver City, CA 90230&amp;lt;/pre&amp;gt;&lt;br /&gt;
Description:&amp;lt;br&amp;gt;This includes using HTML5 client-side XSS (without XSS hitting the server!), and my newly discovered attacks on PHP session hijacking and random numbers (accurately guessing PHP session cookies), browser protocol confusion (turning a browser into an SMTP server), firewall and NAT penetration via Javascript (turning your router against you), remote iPhone Google Maps hijacking (iPhone penetration combined with HTTP man-in-the-middle), extracting extremely accurate geolocation information from a web browser (not using IP geolocation), and more. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Speaker: Samy Kamkar is best known for the Samy worm, the first XSS worm, infecting over one million users on MySpace in less than 24 hours. A co-founder of Fonality, Inc., an IP PBX company, Samy previously led the development of all top-level domain name server software and systems for Global Domains International (.ws), and worked for Penn State University developing AI-based psychometric personality assessment software. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in network security, reverse engineering, and network gaming. When not strapped behind the Matrix, Samy can be found stunt driving, getting involved in local community service projects, and continuing his focus on staying out of jail. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Dinner Sponser: Citrix Systems&amp;lt;br&amp;gt;[[Image:Citrix Picture.jpg|80x80px|http://lacitrix.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, June 09, 2010 7:30PM&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*Security Assertion Markup Language (SAML), Shibboleth Single SignOn System, and Shibboleth's role at University of Southern California&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&lt;br /&gt;
900 Corporate Pointe&lt;br /&gt;
Culver City, CA 90230&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Speaker: Brendan Bellina &amp;lt;br&amp;gt;Title: Identity Services Architect and Manager of Enterprise Middleware Identity Management at USC &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
NOTE: We are having this month meeting on the second Wednesday, instead of the regular third Wednesday, to avoid conflict with ISSA Summit scheduled on June 16. You can still register for the summit at the ISSA LA website (http://www.issa-la.org/Default.aspx?id=1088). &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, April 21st, 2010 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The intersection of social and technical attacks in Web 2.0 applications by Mike Bailey and Mike Murray&lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   Symantec Corporation&lt;br /&gt;
   900 Corporate Pointe&lt;br /&gt;
   Culver City, CA 90230&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Topic: The intersection of social and technical attacks in Web 2.0 applications &lt;br /&gt;
&lt;br /&gt;
Speakers: Mike Bailey and Mike Murray &lt;br /&gt;
&lt;br /&gt;
Mike Bailey is a senior security researcher at MAD Security and an application security specialist. While his research spans a wide variety of domains, it generally focuses on secure web application development, web application scanning and penetration testing, online privacy issues, network protocols and services, and how to break them. &lt;br /&gt;
&lt;br /&gt;
Mike has spoken throughout the country at different security conferences and shows, including Blackhat DC, Toorcon, Defcon and others. Aside from coming up with new and interesting ways to break web and client-side applications, he also puts those attacks into practice as a penetration tester. Currently, Mike is studying the intersection of social and technical attacks in Web 2.0 applications. He publishes his research on the MAD Security blog as well as at Skeptikal.org. &lt;br /&gt;
&lt;br /&gt;
Mike Murray has spent his entire career in information security and currently leads the delivery arm of MAD Security (MADSecInc.com). Mike is a co-founder of InfoSecLeaders.com where he writes and talks about the skills and strategies for building a long-term career in information security. Mike's on security careers have been seen at major conferences like RSA and Defcon. &lt;br /&gt;
&lt;br /&gt;
== Wednesday, March 17th, 2010 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Mike Schrenk, author of &amp;quot;Webbots, Spiders, and Screen Scrapers&amp;quot;&lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   Symantec Corporation&lt;br /&gt;
   900 Corporate Pointe&lt;br /&gt;
   Culver City, CA 90230&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
BOOK PREVIEW: Webbots, Spiders, and Screen Scrapers SECOND EDITION &lt;br /&gt;
&lt;br /&gt;
Michael Schrenk will provide a preview of the largely expanded second edition of his book &amp;quot;Webbots, Spiders, and Screen Scrapers&amp;quot;. This second edition describes how technologies like JavaScript, AJAX and Flash challenge webbot developers and how those challenges are met. He will also talk about defeating CAPTCHAs, scalability and other related topics. &lt;br /&gt;
&lt;br /&gt;
Michael Schrenk is a software developer, author and instructor, who specializes in automated web browsing agents known as webbots. Michael uses the Internet in new and innovative (odd?) ways to provide competitive advantages for his clients in The US, Europe and Asia. &lt;br /&gt;
&lt;br /&gt;
He also helps journalists more effectively use computers to conduct online research through automation and by describing where and how to find otherwise hidden online information. No stranger to Europe--he's lived and worked for clients in Moscow and Madrid, Mike taught at the 2008 European Investigative Journalism Conference (Brussels Belgium), twice in 2009 he lectured at The Center for Investigative Journalism (London England) and later in 2009, he lead several sessions at the VVOJ Journalism conference (Utrecht The Netherlands). &lt;br /&gt;
&lt;br /&gt;
Last August, Mike made his fourth speaking appearance at the DEFCON computer hacking conference. Mike lives in sunny Las Vegas, Nevada (USA). You can contact him at http://www.schrenk.com or follow him on Twitter [http://twitter.com/mgschrenk @mgschrenk]. &lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, February 24th, 2010 7:00PM  ==&lt;br /&gt;
&lt;br /&gt;
*Cloud Computing Security: Raining on the Trendy New Parade&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Slides can be found [https://docs.google.com/fileview?id=0By_clZjtpXPwMWM0YWIyZDgtZmRkZC00YTZlLWE1MDEtNmU0N2Y3MzQwMTJh&amp;amp;hl=en here on Google Docs]. &lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   AT&amp;amp;amp;T Interactive&lt;br /&gt;
   611 N. Brand Blvd., 5th Floor&lt;br /&gt;
   Glendale, CA&lt;br /&gt;
&lt;br /&gt;
Cloud computing is an unstoppable meme at the CIO level, and will dominate corporate IT planning for the next several years. Although they do offer the promise of cost savings for many organizations, the basic ideas behind abstracting out the corporate datacenter greatly complicates the tasks of securing and auditing these systems. While there has been excellent research into low-level hypervisor and virtualization bugs, there has been little public discussion of the “big picture” problems for cloud computing. These include virtualized network devices, browser same-origin issues, credential management and many interesting legal challenges. &lt;br /&gt;
&lt;br /&gt;
Our goal with this talk will be to explore the different attack scenarios that exist in the cloud computing world and to provide a comparison between the security models of the leading cloud computing platforms. We will discuss how current attacks against applications and infrastructure are changed with cloud computing, as well as introduce the audience to new types of vulnerabilities that are unique to cloud computing. Attendees will learn how to analyze the threat posed to them by cloud computing platforms as either providers or consumers of software built on these new platforms. Our platforms for discussion include Salesforce.com, Google Apps, Microsoft Office Live, Google AppEngine, Microsoft Azure, Amazon EC2, and Sun. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Alex Stamos is a founding partner of iSEC Partners, a strategic digital security organization. Alex is an experienced security engineer and consultant specializing in application security and securing large infrastructures, and has taught multiple classes in network and application security. &lt;br /&gt;
&lt;br /&gt;
He is a leading researcher in the field of web application and web services security and has been a featured speaker at top industry conferences such as Black Hat, CanSecWest, DefCon, SyScan, Microsoft BlueHat and OWASP App Sec. &lt;br /&gt;
&lt;br /&gt;
He holds a BS in Electrical Engineering and Computer Science from the University of California, Berkeley. &lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, January 20th, 2010 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Do VLANs allow for good application security?&lt;br /&gt;
&lt;br /&gt;
    Meeting Location&lt;br /&gt;
    [http://maps.google.com/maps?q=900+Corporate+Pointe,+90230&amp;amp;ie=UTF8&amp;amp;oe=UTF-8&amp;amp;ll=33.988385,-118.387041&amp;amp;spn=0.010284,0.014055&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=addr Symantec Corporation]&lt;br /&gt;
    900 Corporate Pointe&lt;br /&gt;
    Culver City, CA 90230&lt;br /&gt;
    Laguna Conference Room&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Virtual Local Area Networks (VLANs) are not a new concept, and can help any organization better control network access. I will present some of the previous issues identified, what was the root cause, and how these have been fixed in current technology. In addition we will talk about how this can help to enhance security in your environment, and what controls must be in place in order to implement such an environment. We will also touch on how this can complicate your application environment, but improve overall security. &lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when working with VMware, VLANs, and web applications, to ensure that these networks are secure, and what to look for to potentially pass audit criteria. I will also talk about where and how these controls have been implemented in order to protect thousands of users while accessing one of the most hostile networks in the world. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan, Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including, consulting, engineering and administration. He has performed security assessment projects for health care, nuclear, manufacturing, pharmaceutical, banking and educational sectors. As an active participant in the information security community, he volunteers at DEFCON where he designs and implements the Firewall and Network for what is said to be the most hostile network environment in the world. &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security groups both as a board member of OWASP MSP and DC612. His roots and experience come from working for a large enterprise banks, designing and managing enterprise security systems. In the more recent years he has been working as an Information Security Consultant to review the security and architecture of information computing environments. &lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, December 16th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/b/bc/Sutton_-_Pulling_The_Plug-Security_Risks_in_Next_Generation_Offline_Web_Apps_-_OWASP_LA_OC.pdf Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as Gears (formerly Google Gears) and the Database Storage &amp;amp;lt;http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage/&amp;amp;gt; functionality included in the emerging HTML 5 &amp;amp;lt;http://dev.w3.org/html5/spec/Overview.html&amp;amp;gt; specification. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications. &lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given web application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Michael Sutton,Vice President and security research at Zscaler, has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry. &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, November 18th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/b/bc/Watching_software_run_11.18.09.pptx Watching Software Run with Brian Chess, Fortify Founder and Chief Scientist]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Now more than ever before, computer systems are vulnerable because software is vulnerable. No matter how good programmers get at making secure software, it will never be perfect—we will always have to contend with incomplete or inadequate code. Most efforts at living with bad code have focused on shoring it up from the outside: limiting network access (firewalls) or watching for suspicious behavior (intrusion detection). This talk takes a different perspective: we’ll look at methods for identifying and blunting the effects of software shortcomings from the inside by watching the software run. &lt;br /&gt;
&lt;br /&gt;
Modern languages like Java and C# are good for more than just programmers. They also provide a wealth of structured information when they execute. We can apply many same techniques developed for outside-in security, but at a finer granularity and with much more context. Along the way there is a lot to talk about: Where web application firewalls excel and where they fall down. Fuzzing vs. static analysis. The disappointments of both aspect oriented programming and building security in. Why nobody uses the Java Security model. Taking your security with you into the cloud. The reason SQL injection won’t go away. Revenge of the reference monitor. Why was Twitter’s security so bad? &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Brian Chess is a founder of Fortify Software and serves as Fortify's Chief Scientist, where his work focuses on practical methods for creating secure systems. His book, Secure Programming with Static Analysis, shows how static source code analysis is an indispensable tool for getting security right. Brian holds a Ph.D. in computer engineering from the University of California at Santa Cruz, where he studied the application of static analysis to the problem of finding security-relevant defects in source code. Before settling on security, Brian spent a decade in Silicon Valley working at huge companies and small startups. He has done research on a broad set of topics, ranging from integrated circuit design all the way to delivering software as a service. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, October 21st, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/c/ca/ISO27001_OWASPLA_Shankar_10212009.pdf Enabling Compliance Requirements using Information Security Management System (ISMS) Framework (ISO27001)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Growing threats and complex regulatory requirements emphasize the need for an effective Information Security Management System (ISMS) framework for an organization. Comprehensive and globally accepted standards like ISO27001 can help in protecting information assets and in enabling compliance requirements. ISO27001 provides an Information Security framework based on best practices and controls to ensure the confidentiality, integrity and availability of information assets. This presentation analyzes the possible synergies between the goals of Information Security Management System (ISMS) and the various compliance requirements, thus making the compliance efforts less complex. &amp;lt;br&amp;gt;Following are the key objectives of this presentation&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
*Provide an introduction to ISO27001 and its controls &lt;br /&gt;
*Discuss the implementation approach for an Information Security Management System (ISMS) framework &lt;br /&gt;
*Familiarize the audience with some common challenges in implementation &lt;br /&gt;
*Outline synergy between ISO27001 controls and some compliance requirements( PCI , etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Attendees will learn about ISO27001 Information Security Standard, ISMS implementation approach and how ISO27001 can be used in meeting various regulatory/compliance requirements like Sox, PCI etc. It will also help the attendees to improve the information security posture of the organization and provide an effective and efficient approach for handling various information security/compliance audits with less effort. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Shankar Subramaniyan has over 11 years of experience as a technology consulting and project management executive in the areas of IT Governance, Risk and Compliance (GRC), Business Continuity Planning and Network Design &amp;amp;amp; Architecture. He has thorough expertise on setting up Information Security Framework and Policies on the basis of industry standards such as ISO 27001. He has worked extensively on industry standards and best practices like BS7799 and ITIL. He also has good understanding and knowledge of various compliance requirements like PCI, Sox etc. Shankar' s experience includes IT audit, SOX remediation, ISMS (ISO27001) implementation, PCI compliance assessment, disaster recovery solution, enterprise risk management, designing IT security architecture and implementing ITIL processes. Shankar has rich experience in handling large projects and managing client relationships across corporate and educational sectors. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, September 16th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;On August 5th of 2009, Federal prosecutors on Monday charged Albert Gonzales with the largest case of credit and debit card data theft ever in the United States: 130 million credit cards numbers by hacking into the systems of Heartland Payment Systems, the New Jersey-based card processing company, as well as Hannaford Brothers, 7-Eleven and two unnamed national retailers. Using a SQL-injection attack, the hackers installed malware on Hannaford Brothers. Hannaford was PCI compliant at the time they were compromise that lets question the validity of regulatory compliance frameworks, and specifically PCI standards as an effective method to reduce data breaches, identity theft, and the proliferation of credit card fraud. This presentation will further analyze how status quo security standards, such as PCI-DSS, as well as other policies, standards, and guidelines truly affect security risk mitigation efforts against cybercrime based threats. These traditional efforts will be compared to threat modeling workflows in order to demonstrate how real risk is mitigated under each scenario. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Cases for financial fraud will be anonymously presented to create a business case for application threat modeling as a viable methodology to drive improved application design and security risk mitigation. Threat modeling concepts will be elaborated in order to prove how application architecture walkthroughs via threat modeling improve the mitigation of cybercrime threats. Attacker motives and goals will be presented and incorporated into attack trees and it will show how attack libraries can be used to effectively identify application vulnerabilities and devise countermeasures in web application. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;From the risk analysis perspective, several attacks will be considered and highlighted, particularly attacks that represent a systemic impact to an organization or government (such as for example a distributed denial of service). &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Through the presentation of threat modeling scenarios, analyses and correlations will be drawn from the represented model(s) to attack patterns, associated and discovered security vulnerabilities, data sources, application topologies, and possible roles and permissions associated with the application environment. The purpose of the presentation is to demonstrate how application threat modeling can be used as part of a nouveau age form of security risk mitigation and overall application security. Data flow diagrams and application walkthroughs will enable audience members to witness how application threat modeling is an evolved form of security process engineering for improved application design and overall application security. The presentation will also demonstrate how threat modeling is capable of delivering critical business functions as well as in mitigating current and future cyber attacks, such as distributed denial of service, botnet driven-malware, spear phishing techniques, and more attacks that ultimately lead to identity and credit card fraud. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;From the point of view of current and future cybercrime risk mitigation, several different strategies for application threat modeling will be discussed as related to securing both the web application web and critical financial infrastructures, such as ATMs. Finally some emphasis will be given to countermeasures that provide for incident response, intelligence and forensics capabilities. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Presentation outline, defining all topics that will be covered: &lt;br /&gt;
&lt;br /&gt;
*Status quo of regulatory compliance in mitigating risk &lt;br /&gt;
*Threat modeling techniques for cybercrime threats &lt;br /&gt;
*Attack tree analysis for attack tree vectors &lt;br /&gt;
*Threat modeling for multi-channel fraud threat scenarios &lt;br /&gt;
*Cyber crime threats and application countermeasures via threat modeling &lt;br /&gt;
*Example of mitigation strategies for cybercrime and application of defense in depth for web applications&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Any supporting research/tools: &lt;br /&gt;
&lt;br /&gt;
*Threat models and attack trees &lt;br /&gt;
*Threat model are produced using the Microsoft™ threat modeling tool &lt;br /&gt;
*Public available cybercrime data will be presented and correlated&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Marco Morana serves as one of the leaders of OWASP (Open Web Application Security Project) organization where he is actively involved in evangelize on web application security through presentations at local chapter meetings in USA as well as internationally. Marco has recently been awarded a contract from Wiley Publishing to co-author a book on Application Threat Modeling. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Besides being the OWASP Cincinnati chapter lead, Marco is also active contributor to OWASP projects such as the application threat modeling methodology for secure coding guideline and the security testing guide (ver. 2 and 3). Besides contributing to OWASP, Marco works as Technology Information Security Officer for a large financial organization in North America with responsibilities in the definition of the organization web application security standards, management of application security assessments during the SDLC, threat-fraud analysis and training of software developers, project managers and architects on different topics related to application security. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In the past, Marco served as senior security consultant and independent consultant where his responsibilities included providing software security services for several clients in the financial and banking, telecommunications and commercial sector industry. Besides security consulting, Marco had a career as technologist in the security industry where he contributed to the design business critical security products currently being used by several FORTUNE 500 companies as well by the US Government. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Marco work on software security is referred in the 2007 State Of the Art report by the Information Assurance Technology Analysis Center (IATAC). Marco received the NASA’s Space Act Award in 1999 for the patenting the S/MIME SEP (Secure Email Plug-in) application. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Marco research work on application and software security is widely published on several magazines such as In-secure magazine, Secure Enterprise, ISSA Journal and the C/C++ Users journal. Marco’s ideas and strategies for writing secure software are posted on his blog: http://securesoftware.blogspot.com. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tony UcedaVelez has more than 10 years of hands-on security and technology experience and is a vocal advocate of security process engineering – a terminology that describes the design and development of secure processes and controls working symbiotically to a unique business workflow. Tony currenlty serves as Managing Director for an Atlanta based risk advisory firm that focuses on security strategy and delivering effective means for risk mitigation and security process engineering. He has worked and consulted for the Fortune 500, as well as federal agencies in the U.S on the topic of application security and security process engineering. His diverse background in software development, security architecture, and network security, coupled with his expertise in process engineering and security risk management has allowed Tony to be a recognized leader in developing strategic security solutions that are multi-faceted in their approach to addressing enterprise risk. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In the realm of application security, Tony is a threat modeling evangelist and has provided numerous talks domestically and globally on its many benefits and application. He has served as a guest mentor to teams participating in Kennesaw State University’s annual Cybercrime capture the flag event as well as a Cybercrime speaker for Southern Polytechnic University in Atlanta. He has also served as a guest speaker on the subject of application threat modeling during ISACA’s annual Geek Week event and has also served as a keynote speaker on the subject for ISACA’s Global Symposium web cast series. Additional articles include articles related to CoBIT and the ValIT model (ISACA’s Journal), application threat modeling within the SDLC (InSecureMagazine), and security process engineering for a ROSI (return on security investment) (Journal of Finance). He is currently finalizing a Wiley publishing book on Application Threat Modeling with Marco Morana. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Prior to VerSprite, Tony served as Sr. Director of Security Risk Management to a Fortune 50 organization where he led security assessments against global application environments. His work encompassed web application security testing, security architecture reviews, and analysis for business logic exploits. He applied effective ways to introduce the subject of application risk to information owners by effectively mapping them to causal factors for business. Previous to this role, he spent more than 5 years in the field of application security across other Fortune 500 organizations within the banking, telecom, and information service industry segments. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Tony currently leads the OWASP Atlanta Chapter, where he manages monthly workshops and events for the Atlanta web application security community. He also has developed a case study program for the Atlanta chapter in order to develop case studies with local Atlanta companies who are seeking to apply application threat modeling techniques within the SDLC and/ or incorporate the many OWASP produced tools and frameworks. Tony can be reached at tonyuv@versprite.com or tonyuv@owasp.org. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tuesday, August 25th, 2009 3:00PM  ==&lt;br /&gt;
&lt;br /&gt;
*OWASP Live CD Demo and Q&amp;amp;amp;A with Matt Tessauro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Matt Tesauro will be in visiting our LA chapter and providing a quick demo of [http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project OWASP Live CD] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP Live CD. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Thursday, August 20th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The Software Assurance Maturity Model (SAMM)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.opensamm.org/ The Software Assurance Maturity Model (SAMM)] is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. SAMM is an open and free project and has recently been added under the Open Web Application Security Project (OWASP) Foundation. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tuesday, July 21st, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Lock picks, BumpKeys, and Hackers oh my! How secure is your application?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;This talk will focus on physical security controls, weaknesses, and counter measures. I will present on what lock picking is, how bump keys work, and ways to subverting electronic locks. We will also go into what are good controls, and what is often overlooked when designing secure environments. Many of the topics covered apply to application security, as the methods for securing these devices is by using obscurity. In the application world with automated tools and scripts, this does not hold water for very long. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan, NetSPI has 10 years of computer security experience, including consulting, engineering, and administration. He has performed security assessment projects in the healthcare, nuclear, manufacturing, pharmaceutical, banking and educational sectors. &amp;lt;br&amp;gt;As an active participant in the information security community, he volunteers at DEFCON, where he designs and implements the firewall and network for what is said to be the most hostile network environment in the world. This network allows speakers, press, vendors, and others to gain access to the Internet, without being hacked. In his spare time he and his wife run the local DEFCON group, DC612 and participate in the Minneapolis OWASP chapter. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== June 24th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Information Warfare: Past, Present and Future&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Information warfare is the composite use of psychological operations (PYOPS), military deception (MILDEC), operational security (OPSEC), computer network operations (CNO), and electronic warfare (EW) to control and disrupt information flow. Recently, interest in information war technologies, techniques and policy issues have increased, especially in the domain of CNO. Increased scrutiny over network operations is both legitimate and valid, as global commerce and military powers are integrated and dependent on the Internet for critical operations. This presentation will describe the five domains of information warfare, the past use of information warfare in the Gulf war and recent Cyber attacks on the Eastern European countries of Georgia and Estonia. Information will be presented on possible new directions of information warfare. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Mikhael Felker, CISSP-ISSEP has worked in a variety of roles including instructor, engineer, and researcher. He is currently employed by The Aerospace Corporation in the Information Assurance Technology Department, supporting Information Assurance (IA) for satellite systems. He is also an Instructor within the Computer &amp;amp;amp; Information Systems Division at UCLA Extension, teaching a course in networking. Actively involved in the Los Angeles security community, he is the Education Director for Los Angeles Chapter of Information Systems Security Association (ISSA), member and speaker of Information Systems Audit and Control Association (ISACA), and former Defense Sector Coordinator for InfraGard. Mikhael has published articles in IEEE Security &amp;amp;amp; Privacy, the ISSA Journal, Information Systems Control Journal, and SecurityFocus. He is a recipient of the Scholarship for Service Program (SFS) Fellowship, sponsored by the National Science Foundation and Department of Homeland Security (DHS). Mikhael completed his graduate work at Carnegie Mellon University with a Master's in Information Security Policy &amp;amp;amp; Management and Bachelor's at UCLA in Computer Science. He holds over 10 certifications in IT and Security. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== May 20th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*[http://video.google.com/videoplay?docid=2875886330538461390 Top Ten Web Hacking Techniques of 2008: &amp;quot;What's possible, not probable&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The polls are closed, votes are in, and we have the winners making up the Top Ten Web Hacking Techniques of 2008! The competition was fierce with the newest and most innovative web hacking techniques to the test. This session will review the top ten hacks from 2008 - what they indicate about the security of the web, what they mean for businesses, and what might be used against us soon down the road. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Jeremiah Grossman is the founder and CTO of WhiteHat Security. He is considered a world-renowned expert in Web security, is a co- founder of the Web Application Security Consortium, and was named to InfoWorld's Top 25 CTOs for 2007. Grossman is a frequent speaker at industry events including the Black Hat Briefings, RSA, CSI, HiTB, OWASP, ISSA, and a number of large universities. He has authored dozens of articles and white papers; is credited with the discovery of many cutting-edge attack and defensive techniques and is a co-author of XSS Attacks. Grossman is often quoted in the the business and technical press. Prior to WhiteHat, Grossman was an information security officer at Yahoo! &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== April 15th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*Cross Site Scripting, Exploits and Defenses&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For a long time, the impact of XSS vulnerabilities has been grossly underestimated. Recent compromises, such as the pro-Hillary [http://cyberinsecure.com/hacked-obama-site-redirects-visitors-to-clintons-site/ defacement] of Barack Obama's website, and a [http://www.securescience.net/twoubledtwitter.html Viral XSS in Twitter] demonstrated the impact of XSS vulnerabilities to the masses. &lt;br /&gt;
&lt;br /&gt;
During this presentation, David Campbell will demonstrate exactly how effective XSS vulns can be, and show you what you can do to protect yourself and your sites. &lt;br /&gt;
&lt;br /&gt;
This presentation was originally delivered to OWASP Colorado in May of 2008, and has been updated for this session. &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:DC_ED_OWASP_XSS_MAY2008_v1.0.pdf Slide deck from May '08 talk] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;David Campbell is an infosec veteran, with experience ranging from penetration testing for Fortune 100's to architecting security solutions for large multinational financials to consulting for government agencies. DC is presently chapter leader of OWASP Denver and is Principal Consultant at Electric Alchemy. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== March 12th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*NETWORK SECURITY DINNER WITH ISSA - CISO'S Security Dashboard Panel!!&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This month will be joining forces with ISSA to create the biggest netowork event for security professionals in Los Angeles for this year. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Agenda &lt;br /&gt;
&lt;br /&gt;
*5:30 p.m., Networking and tours of the antivirus facility &lt;br /&gt;
*6:30 p.m., Dinner &lt;br /&gt;
*7:30 p.m., CISO Panel&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Panelists &lt;br /&gt;
&lt;br /&gt;
*Robert J. Brown, CISSP, CISO WestCorp Credit Union &lt;br /&gt;
*Steve Haydostian, CISSP, Former CISO, Healthnet &lt;br /&gt;
*David Lam, CISSP, CISO, Stephen S. Wise &lt;br /&gt;
*Edward G. Pagett II, CISSP, CISO, Lender Processing Services, Inc. &lt;br /&gt;
*Mike O. Villegas, CISA, CISSP, Director of Information Security, Newegg.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Dinner Fees: &lt;br /&gt;
&lt;br /&gt;
*ISSA-LA members &amp;amp;amp; OWASP members - Pre-Register and Pay online: $25 &lt;br /&gt;
*ISSA-LA members &amp;amp;amp; OWASP members - Pay at the door: $30 &lt;br /&gt;
*Non-members - Pre-Register and Pay online: $30 &lt;br /&gt;
*Non-members - Pay at the door: $35&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;''Thanks to David Lam and Stan Stahl for agreeing to have OWASP joining this ISSA LA event!'' &lt;br /&gt;
&lt;br /&gt;
== February 18th 2009  ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Cloud Computing and Security] &amp;lt;br&amp;gt;The Cloud Computing and Software as a Service models are driving many companies to build innovative, scalable and cost effective alternatives to the traditional IT computing model. Even with the potential cost and scalability benefits of cloud computing, its use by more traditional enterprises has been retarded by the concerns of their professional security and audit staffs. In our experience these concerns are legitimate, and although surveys have shown that security is the #1 factor preventing adoption of cloud computing, there has been very little reliable discussion of the technical security risks inherent in the model and how engineers, sys-admins and architects can deal with these risks. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In this session, we will explore the widely differing security models of the leading cloud computing providers, including Amazon, Google and Salesforce. We will also reveal the significant differences in operational and application security practices necessary to deal with a cloud computing environment. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Alex Stamos is a co-founder and Partner at iSEC Partners Inc., a strategic digital security organization. Alex is an experienced security engineer specializing in solving difficult problems in application security and is a leading researcher in the field of web application and mobile security. He has been a featured speaker at top industry conferences such as Black Hat, Web 2.0 Expo, CanSecWest, DefCon, SyScan, SD Best Practices, Microsoft BlueHat and OWASP App Sec. Alex is a contributing author to &amp;quot;Hacking Exposed: Web 2.0&amp;quot; and an author of the upcoming book &amp;quot;Mobile Application Security&amp;quot;, both from McGraw-Hill. He holds a BSEE from the University of California, Berkeley. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== January 28th 2009  ==&lt;br /&gt;
&lt;br /&gt;
Building Security into the Test Organization &amp;lt;br&amp;gt;The common approach to detecting web security issues is still the regular application of a post-release pen-test or tool based scan. These last minute examinations rarely live up to broader organizational goals; they can be difficult to repeat, measure, or optimize over time. Most of all they're expensive: they find bugs late in the lifecycle. This talk recommends moving security testing responsibility within the test team itself. The approach discussed will work with-or-without the existence of explicit security requirements. See how security testing has been applied at other organizations and how it might be customized for yours. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Ben Walther firmly believes testers have a wonderfully devious mindset, and has been promoting the idea of &amp;quot;security testing&amp;quot; at Cigital's clients, at OWASP events, and to any friends and relatives who will listen. To this end, with the aid of O'Reilly media, Ben Walther and Paco Hope recently published a book entitled the &amp;quot;Web Security Testing Cookbook.&amp;quot; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== December 10th 2008  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/7/79/OWASP-WASCAppSec2007SanJose_SamyWorm.ppt The MySpace Worm] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The most virulent worm in the history of the series of tubes known as the Internet. One of the most highly accessed websites ever [see comScore]. One of the most ostentatious hackers alive. Over one million victims. Less than 24 hours. Fueled only by Chipotle burritos. The MySpace Worm. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Samy will be recapping the story of the development, release and eventual future of the MySpace worm. The 24 hours that led up to over one million friends. The eventual downfall of the MySpace site for several hours. The non-malicious intent and humorous progression of the worm. The t-shirts. The copycats. The behind-the-scenes story of the Secret Service raid at Samy's home and office. The demise of Samy's legal use of computers, community service, restitution, high-risk offender probation, and rehabilitation. And where Samy is today.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar, software engineer and self-proclaimed playboy, is a meddler in the security and software realms. He is currently the Director of Engineering and co-founder of Fonality, Inc., an IP PBX startup located in Culver City. Previously, Samy led the development of all core top-level domain name server software and systems for Global Domains International (.ws). Prior to that, Samy worked with Penn State University developing psychometric personality assessment software with attention to artificial intelligence and bioinformatics. When not strapped behind the Matrix, Samy can be found performing parkour (free running), practicing urban escape artist maneuvers, or is found getting involved in local community service projects. In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in the areas of network security, reverse engineering, and network gaming, and continues his focus in staying out of jail.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== November 19th 2008  ==&lt;br /&gt;
&lt;br /&gt;
A new web attack vector: [http://www.eweek.com/c/a/Security/Security-Researcher-to-Reveal-New-Web-Attack-Vector/ Script Fragmentation]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce a new web-based attack vector which utilizes client-side scripting to fragment malicious web content.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This involves distributing web exploits in a asynchronous manner to evade signature detection. Similar to TCP fragmentation attacks, which are still an issue in current IDS/IPS products, This attack vector involves sending any web exploit in fragments and uses the already existing components within the web browser to reassemble and execute the exploit.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Our presentation will discuss this attack vector used to evade both gateway and client side detection. We will show several proof of concepts containing common readily available web exploits.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stephan Chenette is a Senior Security Researcher who helps lead Websense Security Labs working on malcode detection techniques. Mr. Chenette specializes in research tools ranging from kernel-land sandboxes, to static analysis scanners. He has released public analyses on various vulnerabilities and malware. Prior to joining Websense, Stephan was a security software engineer for 4 years working in research and product development at eEye Digital Security.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== October 29th 2008  ==&lt;br /&gt;
&lt;br /&gt;
Entitlements Management: Security and policies for SOA using XML appliances&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loosely coupled Web Services can be insecure as, by their very nature, are exposed to application consumers. Security built into XML appliances alleviates the developer with the burden of coding security and policies into their application, freeing the developer to concentrate on conding business processes. This evenings meeting will discuss SOA security challenges and introduce the Layer7 XML appliance that allows for dynamic policies to be configured on the fly using an intuitive user interface. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Jonathan Gershater’s career started at 3Com, managing servers and networks. His initial foray into Enterprise Software began in 1999 at enCommerce, which was later acquired by Entrust. He worked at Sun Microsystems from 2005 to 2008 architecting and deploying identity solutions for customers using Sun Java System Identity products. He recently joined Layer 7 Technologies as a senior solution architect. He can be reached at jgershater@layer7tech.com. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== September 17th 2008  ==&lt;br /&gt;
&lt;br /&gt;
The web hacking incident database (WHID) 2007 Report is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. The database classifies each reported attack by, among other criteria, the method used, the outcome of the attack and the industry and the country of the attacked organization. Based on the database Breach Labs which sponsors WHID issues a periodical report on trends in Web Application Security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
By providing answers to questions such as: &lt;br /&gt;
&lt;br /&gt;
*The drivers behind Web hacking. &lt;br /&gt;
*The technology hackers use. &lt;br /&gt;
*The types of organizations attacked most often. &lt;br /&gt;
*The common outcomes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The presentation will discuss WHID statistics, focusing on rising trends in Web Attacks in the 1st half of 2008. As the WHID enables research into the business model behind hacking, the presentation goes beyond discussing the technical aspects of attacks such as SQL injection crawlers and Web Site herding, to discussing the business model common to all of the attacks: Economy of scale. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is a recognized security thought leader and evangelist who frequently speaks with the media and industry groups. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;He is the director of application security at Breach Security. He is also a faculty member for the SANS Institute, where his duties include instructor/courseware developer for Apache Security/Building a Web Application Firewall Workshop, Top 20 Vulnerabilities Team Member and Local Mentor for the SANS Track 4, &amp;quot;Hacker Techniques, Exploits and Incident Handling&amp;quot; course. He holds six SANS Global Information Assurance Certifications (GIAC): Intrusion Analyst (GCIA), Systems and Network Auditor (GSNA), Forensic Analyst (GCFA), Incident Handler (GCIH), Unix Security Administrator (GCUX) and Security Essentials (GSEC). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Mr. Barnett also serves as the team lead for the Center for Internet Security Apache Benchmark Project and is a member of the Web Application Security Consortium. His web security book, &amp;quot;Preventing Web Attacks with Apache,” was published by Addison/Wesley in 2006. &lt;br /&gt;
&lt;br /&gt;
== August 19th 2008  ==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't Write Your Own Security Code&amp;quot; – Application security is arguably the most difficult IT challenge facing organizations today. There are over 600 different categories of vulnerabilities to avoid and they are all tricky. Most of these problems are related to the design, implementation, and use of a relatively small set of security controls. To solve this problem for developers, Jeff created the OWASP ESAPI project – a clean intuitive toolbox of the core security building blocks that every web developer needs. In this talk, Jeff will show you how to create an ESAPI for your organization that will solve the OWASP Top Ten vulnerabilities, increase assurance, and dramatically cut costs all at the same time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Jeff Williams is the founder and CEO of Aspect Security, specializing in application security services. Jeff also serves as the volunteer Chair of the Open Web Application Security Project (OWASP). Jeff has made extensive contributions to the application security community through OWASP, including the Top Ten, WebGoat, Stinger, Secure Software Contract Annex, Enterprise Security API, and the local chapters program. Jeff holds advanced degrees in psychology, computer science, and human factors, and graduated cum laude from Georgetown Law.&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations&amp;diff=106485</id>
		<title>Los Angeles Previous Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations&amp;diff=106485"/>
				<updated>2011-03-08T22:12:12Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: moved Los Angeles Previous Presentations to Los Angeles Previous Presentations Mega Archive: Breaking this down by year(i.e. 2009, 2010, 2011) due to the OWASP Wiki's lack of ability to deal with pages over 32 megs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Los Angeles Previous Presentations Mega Archive]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=105448</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=105448"/>
				<updated>2011-02-18T22:15:32Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: The &amp;quot;preview format&amp;quot; and actual format keep being out of sync.  Trying again.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;Feburary 23, 2011 7:00 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== '''Note New Meeting Day: 4th Wednesday of Each Month'''  ===&lt;br /&gt;
&lt;br /&gt;
We will be meeting at our usual place: Symantec Corporation in Culver City: &amp;lt;br&amp;gt;900 Corporate Pointe&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt;(424)750-7000 &lt;br /&gt;
&lt;br /&gt;
 Please RSVP: http://owasp-jan2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: When Databases Attack'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
== '''Speaker: Scott Sutherland'''[[Image:Scottsutherland.jpeg|left|112x168px|Scottsutherland.jpeg]]&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Scott Sutherland is a Senior Security Consultant responsible for the development and management of penetration test services at NetSPI, which is a security services company based in Minneapolis. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. Scott has ten years of IT consulting experience. Six of which have been focused on providing security services. Additionally, Scott presented at the National OWASP AppSec 2010 Conference and the local Security BSidesMSP conferences in the last year.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067122121S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067115834S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Abstract: Database Security in the Real World'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This presentation will provide an overview of the common threats and vectors that are leveraged by real world attackers to gain unauthorized access to high value databases. It is well understood that high value databases support critical applications and store sensitive information, but they can also be used to escalate privileges in Windows environments and propagate botnets across the internet. This presentation will provide developers and system administrators with a better understanding of how those attacks are conducted.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Sponsor:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Netspi logo.png|left|Netspi logo.png]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.netspi.com/ http://www.netspi.com/] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=105447</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=105447"/>
				<updated>2011-02-18T22:14:32Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Adding Netspi.com as sponser&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;Feburary 23, 2011 7:00 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== '''Note New Meeting Day: 4th Wednesday of Each Month'''  ===&lt;br /&gt;
&lt;br /&gt;
We will be meeting at our usual place: Symantec Corporation in Culver City: &amp;lt;br&amp;gt;900 Corporate Pointe&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt;(424)750-7000 &lt;br /&gt;
&lt;br /&gt;
 Please RSVP: http://owasp-jan2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: When Databases Attack'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
== '''Speaker: Scott Sutherland'''[[Image:Scottsutherland.jpeg|left|112x168px|Scottsutherland.jpeg]]&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Scott Sutherland is a Senior Security Consultant responsible for the development and management of penetration test services at NetSPI, which is a security services company based in Minneapolis. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. Scott has ten years of IT consulting experience. Six of which have been focused on providing security services. Additionally, Scott presented at the National OWASP AppSec 2010 Conference and the local Security BSidesMSP conferences in the last year.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067122121S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298067115834S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Abstract: Database Security in the Real World'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This presentation will provide an overview of the common threats and vectors that are leveraged by real world attackers to gain unauthorized access to high value databases. It is well understood that high value databases support critical applications and store sensitive information, but they can also be used to escalate privileges in Windows environments and propagate botnets across the internet. This presentation will provide developers and system administrators with a better understanding of how those attacks are conducted.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Sponsor:'''  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Netspi logo.png|thumb|left]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.netspi.com/ http://www.netspi.com/] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=105446</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=105446"/>
				<updated>2011-02-18T21:53:37Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Rescaling Photo again&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;Feburary 23, 2011 7:00 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== '''Note New Meeting Day: 4th Wednesday of Each Month'''  ===&lt;br /&gt;
&lt;br /&gt;
We will be meeting at our usual place: Symantec Corporation in Culver City: &amp;lt;br&amp;gt;900 Corporate Pointe&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt;(424)750-7000 &lt;br /&gt;
&lt;br /&gt;
 Please RSVP: http://owasp-jan2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: When Databases Attack'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
== '''Speaker: Scott Sutherland'''[[Image:Scottsutherland.jpeg|left|112x168px]]&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Scott Sutherland is a Senior Security Consultant responsible for the development and management of penetration test services at NetSPI, which is a security services company based in Minneapolis. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. Scott has ten years of IT consulting experience. Six of which have been focused on providing security services. Additionally, Scott presented at the National OWASP AppSec 2010 Conference and the local Security BSidesMSP conferences in the last year.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Abstract: Database Security in the Real World'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This presentation will provide an overview of the common threats and vectors that are leveraged by real world attackers to gain unauthorized access to high value databases. It is well understood that high value databases support critical applications and store sensitive information, but they can also be used to escalate privileges in Windows environments and propagate botnets across the internet. This presentation will provide developers and system administrators with a better understanding of how those attacks are conducted.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Sponsor:'''&amp;amp;nbsp;  ==&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=105445</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=105445"/>
				<updated>2011-02-18T21:52:07Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Rescaling the picture of Scott Sutherland&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;Feburary 23, 2011 7:00 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== '''Note New Meeting Day: 4th Wednesday of Each Month'''  ===&lt;br /&gt;
&lt;br /&gt;
We will be meeting at our usual place: Symantec Corporation in Culver City: &amp;lt;br&amp;gt;900 Corporate Pointe&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt;(424)750-7000 &lt;br /&gt;
&lt;br /&gt;
 Please RSVP: http://owasp-jan2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: When Databases Attack'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
== '''Speaker: Scott Sutherland'''[[Image:Scottsutherland.jpeg|thumb|left|112x168px|Scottsutherland.jpeg]]&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Scott Sutherland is a Senior Security Consultant responsible for the development and management of penetration test services at NetSPI, which is a security services company based in Minneapolis. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. Scott has ten years of IT consulting experience. Six of which have been focused on providing security services. Additionally, Scott presented at the National OWASP AppSec 2010 Conference and the local Security BSidesMSP conferences in the last year.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Abstract: Database Security in the Real World'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This presentation will provide an overview of the common threats and vectors that are leveraged by real world attackers to gain unauthorized access to high value databases. It is well understood that high value databases support critical applications and store sensitive information, but they can also be used to escalate privileges in Windows environments and propagate botnets across the internet. This presentation will provide developers and system administrators with a better understanding of how those attacks are conducted.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Sponsor:'''&amp;amp;nbsp;  ==&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=105444</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=105444"/>
				<updated>2011-02-18T21:49:46Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Adding Picture&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;Feburary 23, 2011 7:00 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== '''Note New Meeting Day: 4th Wednesday of Each Month'''  ===&lt;br /&gt;
&lt;br /&gt;
We will be meeting at our usual place: Symantec Corporation in Culver City: &amp;lt;br&amp;gt;900 Corporate Pointe&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt;(424)750-7000 &lt;br /&gt;
&lt;br /&gt;
 Please RSVP: http://owasp-jan2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: When Databases Attack'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
== '''Speaker: Scott Sutherland'''[[Image:Scottsutherland.jpeg|thumb|left|100x150px]]&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Scott Sutherland is a Senior Security Consultant responsible for the development and management of penetration test services at NetSPI, which is a security services company based in Minneapolis. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. Scott has ten years of IT consulting experience. Six of which have been focused on providing security services. Additionally, Scott presented at the National OWASP AppSec 2010 Conference and the local Security BSidesMSP conferences in the last year.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Abstract: Database Security in the Real World'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This presentation will provide an overview of the common threats and vectors that are leveraged by real world attackers to gain unauthorized access to high value databases. It is well understood that high value databases support critical applications and store sensitive information, but they can also be used to escalate privileges in Windows environments and propagate botnets across the internet. This presentation will provide developers and system administrators with a better understanding of how those attacks are conducted.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Sponsor:'''&amp;amp;nbsp;  ==&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Scottsutherland.jpeg&amp;diff=105443</id>
		<title>File:Scottsutherland.jpeg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Scottsutherland.jpeg&amp;diff=105443"/>
				<updated>2011-02-18T21:42:11Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: uploaded a new version of &amp;amp;quot;File:Scottsutherland.jpeg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Publicity Photo of Scott Sutherland&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Scottsutherland_low.jpeg&amp;diff=105442</id>
		<title>File:Scottsutherland low.jpeg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Scottsutherland_low.jpeg&amp;diff=105442"/>
				<updated>2011-02-18T21:38:07Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: uploaded a new version of &amp;amp;quot;File:Scottsutherland low.jpeg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Lower Res Publicity Photo of Scott Sutherland.&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Scottsutherland_low.jpg&amp;diff=105441</id>
		<title>File:Scottsutherland low.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Scottsutherland_low.jpg&amp;diff=105441"/>
				<updated>2011-02-18T21:32:45Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Scottsutherland_low.jpeg&amp;diff=105440</id>
		<title>File:Scottsutherland low.jpeg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Scottsutherland_low.jpeg&amp;diff=105440"/>
				<updated>2011-02-18T21:19:22Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Lower Res Publicity Photo of Scott Sutherland.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Lower Res Publicity Photo of Scott Sutherland.&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=105439</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=105439"/>
				<updated>2011-02-18T21:18:17Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Saving intermediate edit for Feb 2011.  Still need sponser info and picture.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
===== Sign up for OWASP Los Angeles mailing list, very low volume and spam free.  =====&lt;br /&gt;
&lt;br /&gt;
===== https://lists.owasp.org/mailman/listinfo/owasp-losangeles  =====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The AppSec USA 2010 conference received rave reviews. Thanks to all the volunteers and great speakers who helped make it a success! &lt;br /&gt;
&lt;br /&gt;
http://2010.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
Check out the videos: http://vimeo.com/user4863863/videos&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Logo.jpg|362x106px|AppSec Logo.jpg]] &lt;br /&gt;
&lt;br /&gt;
==  ==&lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting:&amp;amp;nbsp; Wednesday,&amp;amp;nbsp;Feburary 23, 2011 7:00 P.M. &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
=== '''Note New Meeting Day: 4th Wednesday of Each Month'''  ===&lt;br /&gt;
&lt;br /&gt;
We will be meeting at our usual place: Symantec Corporation in Culver City: &amp;lt;br&amp;gt;900 Corporate Pointe&amp;lt;br&amp;gt;Culver City, CA 90230&amp;lt;br&amp;gt;(424)750-7000 &lt;br /&gt;
&lt;br /&gt;
 Please RSVP: http://owasp-jan2011.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Los Angeles Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Los Angeles&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== '''Topic: When Databases Attack'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
== '''Speaker: Scott Sutherland'''&amp;amp;nbsp; &amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
Scott Sutherland is a Senior Security Consultant responsible for the development and management of penetration test services at NetSPI, which is a security services company based in Minneapolis. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. Scott has ten years of IT consulting experience. Six of which have been focused on providing security services. Additionally, Scott presented at the National OWASP AppSec 2010 Conference and the local Security BSidesMSP conferences in the last year.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Abstract: Database Security in the Real World'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
This presentation will provide an overview of the common threats and vectors that are leveraged by real world attackers to gain unauthorized access to high value databases. It is well understood that high value databases support critical applications and store sensitive information, but they can also be used to escalate privileges in Windows environments and propagate botnets across the internet. This presentation will provide developers and system administrators with a better understanding of how those attacks are conducted.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Sponsor:'''&amp;amp;nbsp;  ==&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Would you like to speak at an OWASP Los Angeles Meeting? &lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Scottsutherland.jpeg&amp;diff=105438</id>
		<title>File:Scottsutherland.jpeg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Scottsutherland.jpeg&amp;diff=105438"/>
				<updated>2011-02-18T21:08:10Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: uploaded a new version of &amp;amp;quot;File:Scottsutherland.jpeg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Publicity Photo of Scott Sutherland&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Scottsutherland.jpeg&amp;diff=105437</id>
		<title>File:Scottsutherland.jpeg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Scottsutherland.jpeg&amp;diff=105437"/>
				<updated>2011-02-18T21:07:26Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Publicity Photo of Scott Sutherland&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Publicity Photo of Scott Sutherland&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_2009,_2010&amp;diff=105436</id>
		<title>Los Angeles Previous Presentations 2009, 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_2009,_2010&amp;diff=105436"/>
				<updated>2011-02-18T20:25:27Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Adding Rational as the Dinner sponser.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &amp;amp;nbsp;Previous Presentations  =&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298059442687S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''Wednesday, January 26, 2011 7:00 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
*'''Evercookie: The Persistent Cookie'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&amp;amp;lt;span id=&amp;quot;fck_dom_range_temp_1298060072205_918&amp;quot; /&amp;amp;gt;&lt;br /&gt;
900&amp;amp;nbsp;Corporate Pointe&lt;br /&gt;
Culver City, CA&amp;amp;nbsp;90230&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
'''&amp;lt;br&amp;gt;Description:&amp;lt;br&amp;gt;'''Evercookie is a JavaScript API that produces extremely persistent cookies in a browser. Its goal is to identify a client even after they have removed standard cookies, Flash cookies Local Shared Objects or LSOs), and others. &lt;br /&gt;
&lt;br /&gt;
Evercookie accomplishes this by storing the cookie data in several types of storage mechanisms that are available on the local browser. Additionally, if evercookie has found the user has removed any of the types of cookies in question, it recreates them using each mechanism available. &lt;br /&gt;
&lt;br /&gt;
You can read more about Samy and Evercookie at [http://samy.pl/evercookie '''http://samy.pl/evercookie/'''] &lt;br /&gt;
&lt;br /&gt;
'''Speaker: &amp;lt;br&amp;gt;'''Samy Kamkar is best known for the Samy worm, the first XSS worm, infecting over one million users on MySpace in less than 24 hours. A co-founder of Fonality, Inc., an IP PBX company, Samy previously led the development of all toplevel domain name server software and systems for Global Domains International (.ws), and worked for Penn State University developing AI-based psychometric personality assessment software. In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in network security, reverse engineering, and network gaming. When not strapped behind the Matrix, Samy can be found stunt driving, getting involved in local community service projects, and continuing his focus on staying out of jail. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''Sponser:&amp;lt;br&amp;gt;'''IBM&amp;amp;nbsp;Rational Software&amp;lt;br&amp;gt;http://www-01.ibm.com/software/rational/&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298059442687S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''Wednesday, July 21, 2011 7:00 PM'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1281462225310S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''How I Met Your Girlfriend: Entirely New Classes of Web Attacks'''&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&lt;br /&gt;
900 Corporate Pointe&lt;br /&gt;
Culver City, CA 90230&amp;lt;/pre&amp;gt;&lt;br /&gt;
Description:&amp;lt;br&amp;gt;This includes using HTML5 client-side XSS (without XSS hitting the server!), and my newly discovered attacks on PHP session hijacking and random numbers (accurately guessing PHP session cookies), browser protocol confusion (turning a browser into an SMTP server), firewall and NAT penetration via Javascript (turning your router against you), remote iPhone Google Maps hijacking (iPhone penetration combined with HTTP man-in-the-middle), extracting extremely accurate geolocation information from a web browser (not using IP geolocation), and more. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Speaker: Samy Kamkar is best known for the Samy worm, the first XSS worm, infecting over one million users on MySpace in less than 24 hours. A co-founder of Fonality, Inc., an IP PBX company, Samy previously led the development of all top-level domain name server software and systems for Global Domains International (.ws), and worked for Penn State University developing AI-based psychometric personality assessment software. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in network security, reverse engineering, and network gaming. When not strapped behind the Matrix, Samy can be found stunt driving, getting involved in local community service projects, and continuing his focus on staying out of jail. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Dinner Sponser: Citrix Systems&amp;lt;br&amp;gt;[[Image:Citrix Picture.jpg|80x80px|http://lacitrix.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, June 09, 2010 7:30PM&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*Security Assertion Markup Language (SAML), Shibboleth Single SignOn System, and Shibboleth's role at University of Southern California&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&lt;br /&gt;
900 Corporate Pointe&lt;br /&gt;
Culver City, CA 90230&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Speaker: Brendan Bellina &amp;lt;br&amp;gt;Title: Identity Services Architect and Manager of Enterprise Middleware Identity Management at USC &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
NOTE: We are having this month meeting on the second Wednesday, instead of the regular third Wednesday, to avoid conflict with ISSA Summit scheduled on June 16. You can still register for the summit at the ISSA LA website (http://www.issa-la.org/Default.aspx?id=1088). &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, April 21st, 2010 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The intersection of social and technical attacks in Web 2.0 applications by Mike Bailey and Mike Murray&lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   Symantec Corporation&lt;br /&gt;
   900 Corporate Pointe&lt;br /&gt;
   Culver City, CA 90230&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Topic: The intersection of social and technical attacks in Web 2.0 applications &lt;br /&gt;
&lt;br /&gt;
Speakers: Mike Bailey and Mike Murray &lt;br /&gt;
&lt;br /&gt;
Mike Bailey is a senior security researcher at MAD Security and an application security specialist. While his research spans a wide variety of domains, it generally focuses on secure web application development, web application scanning and penetration testing, online privacy issues, network protocols and services, and how to break them. &lt;br /&gt;
&lt;br /&gt;
Mike has spoken throughout the country at different security conferences and shows, including Blackhat DC, Toorcon, Defcon and others. Aside from coming up with new and interesting ways to break web and client-side applications, he also puts those attacks into practice as a penetration tester. Currently, Mike is studying the intersection of social and technical attacks in Web 2.0 applications. He publishes his research on the MAD Security blog as well as at Skeptikal.org. &lt;br /&gt;
&lt;br /&gt;
Mike Murray has spent his entire career in information security and currently leads the delivery arm of MAD Security (MADSecInc.com). Mike is a co-founder of InfoSecLeaders.com where he writes and talks about the skills and strategies for building a long-term career in information security. Mike's on security careers have been seen at major conferences like RSA and Defcon. &lt;br /&gt;
&lt;br /&gt;
== Wednesday, March 17th, 2010 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Mike Schrenk, author of &amp;quot;Webbots, Spiders, and Screen Scrapers&amp;quot;&lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   Symantec Corporation&lt;br /&gt;
   900 Corporate Pointe&lt;br /&gt;
   Culver City, CA 90230&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
BOOK PREVIEW: Webbots, Spiders, and Screen Scrapers SECOND EDITION &lt;br /&gt;
&lt;br /&gt;
Michael Schrenk will provide a preview of the largely expanded second edition of his book &amp;quot;Webbots, Spiders, and Screen Scrapers&amp;quot;. This second edition describes how technologies like JavaScript, AJAX and Flash challenge webbot developers and how those challenges are met. He will also talk about defeating CAPTCHAs, scalability and other related topics. &lt;br /&gt;
&lt;br /&gt;
Michael Schrenk is a software developer, author and instructor, who specializes in automated web browsing agents known as webbots. Michael uses the Internet in new and innovative (odd?) ways to provide competitive advantages for his clients in The US, Europe and Asia. &lt;br /&gt;
&lt;br /&gt;
He also helps journalists more effectively use computers to conduct online research through automation and by describing where and how to find otherwise hidden online information. No stranger to Europe--he's lived and worked for clients in Moscow and Madrid, Mike taught at the 2008 European Investigative Journalism Conference (Brussels Belgium), twice in 2009 he lectured at The Center for Investigative Journalism (London England) and later in 2009, he lead several sessions at the VVOJ Journalism conference (Utrecht The Netherlands). &lt;br /&gt;
&lt;br /&gt;
Last August, Mike made his fourth speaking appearance at the DEFCON computer hacking conference. Mike lives in sunny Las Vegas, Nevada (USA). You can contact him at http://www.schrenk.com or follow him on Twitter [http://twitter.com/mgschrenk @mgschrenk]. &lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, February 24th, 2010 7:00PM  ==&lt;br /&gt;
&lt;br /&gt;
*Cloud Computing Security: Raining on the Trendy New Parade&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Slides can be found [https://docs.google.com/fileview?id=0By_clZjtpXPwMWM0YWIyZDgtZmRkZC00YTZlLWE1MDEtNmU0N2Y3MzQwMTJh&amp;amp;hl=en here on Google Docs]. &lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   AT&amp;amp;amp;T Interactive&lt;br /&gt;
   611 N. Brand Blvd., 5th Floor&lt;br /&gt;
   Glendale, CA&lt;br /&gt;
&lt;br /&gt;
Cloud computing is an unstoppable meme at the CIO level, and will dominate corporate IT planning for the next several years. Although they do offer the promise of cost savings for many organizations, the basic ideas behind abstracting out the corporate datacenter greatly complicates the tasks of securing and auditing these systems. While there has been excellent research into low-level hypervisor and virtualization bugs, there has been little public discussion of the “big picture” problems for cloud computing. These include virtualized network devices, browser same-origin issues, credential management and many interesting legal challenges. &lt;br /&gt;
&lt;br /&gt;
Our goal with this talk will be to explore the different attack scenarios that exist in the cloud computing world and to provide a comparison between the security models of the leading cloud computing platforms. We will discuss how current attacks against applications and infrastructure are changed with cloud computing, as well as introduce the audience to new types of vulnerabilities that are unique to cloud computing. Attendees will learn how to analyze the threat posed to them by cloud computing platforms as either providers or consumers of software built on these new platforms. Our platforms for discussion include Salesforce.com, Google Apps, Microsoft Office Live, Google AppEngine, Microsoft Azure, Amazon EC2, and Sun. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Alex Stamos is a founding partner of iSEC Partners, a strategic digital security organization. Alex is an experienced security engineer and consultant specializing in application security and securing large infrastructures, and has taught multiple classes in network and application security. &lt;br /&gt;
&lt;br /&gt;
He is a leading researcher in the field of web application and web services security and has been a featured speaker at top industry conferences such as Black Hat, CanSecWest, DefCon, SyScan, Microsoft BlueHat and OWASP App Sec. &lt;br /&gt;
&lt;br /&gt;
He holds a BS in Electrical Engineering and Computer Science from the University of California, Berkeley. &lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, January 20th, 2010 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Do VLANs allow for good application security?&lt;br /&gt;
&lt;br /&gt;
    Meeting Location&lt;br /&gt;
    [http://maps.google.com/maps?q=900+Corporate+Pointe,+90230&amp;amp;ie=UTF8&amp;amp;oe=UTF-8&amp;amp;ll=33.988385,-118.387041&amp;amp;spn=0.010284,0.014055&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=addr Symantec Corporation]&lt;br /&gt;
    900 Corporate Pointe&lt;br /&gt;
    Culver City, CA 90230&lt;br /&gt;
    Laguna Conference Room&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Virtual Local Area Networks (VLANs) are not a new concept, and can help any organization better control network access. I will present some of the previous issues identified, what was the root cause, and how these have been fixed in current technology. In addition we will talk about how this can help to enhance security in your environment, and what controls must be in place in order to implement such an environment. We will also touch on how this can complicate your application environment, but improve overall security. &lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when working with VMware, VLANs, and web applications, to ensure that these networks are secure, and what to look for to potentially pass audit criteria. I will also talk about where and how these controls have been implemented in order to protect thousands of users while accessing one of the most hostile networks in the world. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan, Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including, consulting, engineering and administration. He has performed security assessment projects for health care, nuclear, manufacturing, pharmaceutical, banking and educational sectors. As an active participant in the information security community, he volunteers at DEFCON where he designs and implements the Firewall and Network for what is said to be the most hostile network environment in the world. &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security groups both as a board member of OWASP MSP and DC612. His roots and experience come from working for a large enterprise banks, designing and managing enterprise security systems. In the more recent years he has been working as an Information Security Consultant to review the security and architecture of information computing environments. &lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, December 16th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/b/bc/Sutton_-_Pulling_The_Plug-Security_Risks_in_Next_Generation_Offline_Web_Apps_-_OWASP_LA_OC.pdf Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as Gears (formerly Google Gears) and the Database Storage &amp;amp;lt;http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage/&amp;amp;gt; functionality included in the emerging HTML 5 &amp;amp;lt;http://dev.w3.org/html5/spec/Overview.html&amp;amp;gt; specification. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications. &lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given web application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Michael Sutton,Vice President and security research at Zscaler, has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry. &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, November 18th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/b/bc/Watching_software_run_11.18.09.pptx Watching Software Run with Brian Chess, Fortify Founder and Chief Scientist]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Now more than ever before, computer systems are vulnerable because software is vulnerable. No matter how good programmers get at making secure software, it will never be perfect—we will always have to contend with incomplete or inadequate code. Most efforts at living with bad code have focused on shoring it up from the outside: limiting network access (firewalls) or watching for suspicious behavior (intrusion detection). This talk takes a different perspective: we’ll look at methods for identifying and blunting the effects of software shortcomings from the inside by watching the software run. &lt;br /&gt;
&lt;br /&gt;
Modern languages like Java and C# are good for more than just programmers. They also provide a wealth of structured information when they execute. We can apply many same techniques developed for outside-in security, but at a finer granularity and with much more context. Along the way there is a lot to talk about: Where web application firewalls excel and where they fall down. Fuzzing vs. static analysis. The disappointments of both aspect oriented programming and building security in. Why nobody uses the Java Security model. Taking your security with you into the cloud. The reason SQL injection won’t go away. Revenge of the reference monitor. Why was Twitter’s security so bad? &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Brian Chess is a founder of Fortify Software and serves as Fortify's Chief Scientist, where his work focuses on practical methods for creating secure systems. His book, Secure Programming with Static Analysis, shows how static source code analysis is an indispensable tool for getting security right. Brian holds a Ph.D. in computer engineering from the University of California at Santa Cruz, where he studied the application of static analysis to the problem of finding security-relevant defects in source code. Before settling on security, Brian spent a decade in Silicon Valley working at huge companies and small startups. He has done research on a broad set of topics, ranging from integrated circuit design all the way to delivering software as a service. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, October 21st, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/c/ca/ISO27001_OWASPLA_Shankar_10212009.pdf Enabling Compliance Requirements using Information Security Management System (ISMS) Framework (ISO27001)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Growing threats and complex regulatory requirements emphasize the need for an effective Information Security Management System (ISMS) framework for an organization. Comprehensive and globally accepted standards like ISO27001 can help in protecting information assets and in enabling compliance requirements. ISO27001 provides an Information Security framework based on best practices and controls to ensure the confidentiality, integrity and availability of information assets. This presentation analyzes the possible synergies between the goals of Information Security Management System (ISMS) and the various compliance requirements, thus making the compliance efforts less complex. &amp;lt;br&amp;gt;Following are the key objectives of this presentation&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
*Provide an introduction to ISO27001 and its controls &lt;br /&gt;
*Discuss the implementation approach for an Information Security Management System (ISMS) framework &lt;br /&gt;
*Familiarize the audience with some common challenges in implementation &lt;br /&gt;
*Outline synergy between ISO27001 controls and some compliance requirements( PCI , etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Attendees will learn about ISO27001 Information Security Standard, ISMS implementation approach and how ISO27001 can be used in meeting various regulatory/compliance requirements like Sox, PCI etc. It will also help the attendees to improve the information security posture of the organization and provide an effective and efficient approach for handling various information security/compliance audits with less effort. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Shankar Subramaniyan has over 11 years of experience as a technology consulting and project management executive in the areas of IT Governance, Risk and Compliance (GRC), Business Continuity Planning and Network Design &amp;amp;amp; Architecture. He has thorough expertise on setting up Information Security Framework and Policies on the basis of industry standards such as ISO 27001. He has worked extensively on industry standards and best practices like BS7799 and ITIL. He also has good understanding and knowledge of various compliance requirements like PCI, Sox etc. Shankar' s experience includes IT audit, SOX remediation, ISMS (ISO27001) implementation, PCI compliance assessment, disaster recovery solution, enterprise risk management, designing IT security architecture and implementing ITIL processes. Shankar has rich experience in handling large projects and managing client relationships across corporate and educational sectors. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, September 16th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;On August 5th of 2009, Federal prosecutors on Monday charged Albert Gonzales with the largest case of credit and debit card data theft ever in the United States: 130 million credit cards numbers by hacking into the systems of Heartland Payment Systems, the New Jersey-based card processing company, as well as Hannaford Brothers, 7-Eleven and two unnamed national retailers. Using a SQL-injection attack, the hackers installed malware on Hannaford Brothers. Hannaford was PCI compliant at the time they were compromise that lets question the validity of regulatory compliance frameworks, and specifically PCI standards as an effective method to reduce data breaches, identity theft, and the proliferation of credit card fraud. This presentation will further analyze how status quo security standards, such as PCI-DSS, as well as other policies, standards, and guidelines truly affect security risk mitigation efforts against cybercrime based threats. These traditional efforts will be compared to threat modeling workflows in order to demonstrate how real risk is mitigated under each scenario. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Cases for financial fraud will be anonymously presented to create a business case for application threat modeling as a viable methodology to drive improved application design and security risk mitigation. Threat modeling concepts will be elaborated in order to prove how application architecture walkthroughs via threat modeling improve the mitigation of cybercrime threats. Attacker motives and goals will be presented and incorporated into attack trees and it will show how attack libraries can be used to effectively identify application vulnerabilities and devise countermeasures in web application. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;From the risk analysis perspective, several attacks will be considered and highlighted, particularly attacks that represent a systemic impact to an organization or government (such as for example a distributed denial of service). &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Through the presentation of threat modeling scenarios, analyses and correlations will be drawn from the represented model(s) to attack patterns, associated and discovered security vulnerabilities, data sources, application topologies, and possible roles and permissions associated with the application environment. The purpose of the presentation is to demonstrate how application threat modeling can be used as part of a nouveau age form of security risk mitigation and overall application security. Data flow diagrams and application walkthroughs will enable audience members to witness how application threat modeling is an evolved form of security process engineering for improved application design and overall application security. The presentation will also demonstrate how threat modeling is capable of delivering critical business functions as well as in mitigating current and future cyber attacks, such as distributed denial of service, botnet driven-malware, spear phishing techniques, and more attacks that ultimately lead to identity and credit card fraud. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;From the point of view of current and future cybercrime risk mitigation, several different strategies for application threat modeling will be discussed as related to securing both the web application web and critical financial infrastructures, such as ATMs. Finally some emphasis will be given to countermeasures that provide for incident response, intelligence and forensics capabilities. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Presentation outline, defining all topics that will be covered: &lt;br /&gt;
&lt;br /&gt;
*Status quo of regulatory compliance in mitigating risk &lt;br /&gt;
*Threat modeling techniques for cybercrime threats &lt;br /&gt;
*Attack tree analysis for attack tree vectors &lt;br /&gt;
*Threat modeling for multi-channel fraud threat scenarios &lt;br /&gt;
*Cyber crime threats and application countermeasures via threat modeling &lt;br /&gt;
*Example of mitigation strategies for cybercrime and application of defense in depth for web applications&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Any supporting research/tools: &lt;br /&gt;
&lt;br /&gt;
*Threat models and attack trees &lt;br /&gt;
*Threat model are produced using the Microsoft™ threat modeling tool &lt;br /&gt;
*Public available cybercrime data will be presented and correlated&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Marco Morana serves as one of the leaders of OWASP (Open Web Application Security Project) organization where he is actively involved in evangelize on web application security through presentations at local chapter meetings in USA as well as internationally. Marco has recently been awarded a contract from Wiley Publishing to co-author a book on Application Threat Modeling. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Besides being the OWASP Cincinnati chapter lead, Marco is also active contributor to OWASP projects such as the application threat modeling methodology for secure coding guideline and the security testing guide (ver. 2 and 3). Besides contributing to OWASP, Marco works as Technology Information Security Officer for a large financial organization in North America with responsibilities in the definition of the organization web application security standards, management of application security assessments during the SDLC, threat-fraud analysis and training of software developers, project managers and architects on different topics related to application security. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In the past, Marco served as senior security consultant and independent consultant where his responsibilities included providing software security services for several clients in the financial and banking, telecommunications and commercial sector industry. Besides security consulting, Marco had a career as technologist in the security industry where he contributed to the design business critical security products currently being used by several FORTUNE 500 companies as well by the US Government. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Marco work on software security is referred in the 2007 State Of the Art report by the Information Assurance Technology Analysis Center (IATAC). Marco received the NASA’s Space Act Award in 1999 for the patenting the S/MIME SEP (Secure Email Plug-in) application. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Marco research work on application and software security is widely published on several magazines such as In-secure magazine, Secure Enterprise, ISSA Journal and the C/C++ Users journal. Marco’s ideas and strategies for writing secure software are posted on his blog: http://securesoftware.blogspot.com. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tony UcedaVelez has more than 10 years of hands-on security and technology experience and is a vocal advocate of security process engineering – a terminology that describes the design and development of secure processes and controls working symbiotically to a unique business workflow. Tony currenlty serves as Managing Director for an Atlanta based risk advisory firm that focuses on security strategy and delivering effective means for risk mitigation and security process engineering. He has worked and consulted for the Fortune 500, as well as federal agencies in the U.S on the topic of application security and security process engineering. His diverse background in software development, security architecture, and network security, coupled with his expertise in process engineering and security risk management has allowed Tony to be a recognized leader in developing strategic security solutions that are multi-faceted in their approach to addressing enterprise risk. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In the realm of application security, Tony is a threat modeling evangelist and has provided numerous talks domestically and globally on its many benefits and application. He has served as a guest mentor to teams participating in Kennesaw State University’s annual Cybercrime capture the flag event as well as a Cybercrime speaker for Southern Polytechnic University in Atlanta. He has also served as a guest speaker on the subject of application threat modeling during ISACA’s annual Geek Week event and has also served as a keynote speaker on the subject for ISACA’s Global Symposium web cast series. Additional articles include articles related to CoBIT and the ValIT model (ISACA’s Journal), application threat modeling within the SDLC (InSecureMagazine), and security process engineering for a ROSI (return on security investment) (Journal of Finance). He is currently finalizing a Wiley publishing book on Application Threat Modeling with Marco Morana. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Prior to VerSprite, Tony served as Sr. Director of Security Risk Management to a Fortune 50 organization where he led security assessments against global application environments. His work encompassed web application security testing, security architecture reviews, and analysis for business logic exploits. He applied effective ways to introduce the subject of application risk to information owners by effectively mapping them to causal factors for business. Previous to this role, he spent more than 5 years in the field of application security across other Fortune 500 organizations within the banking, telecom, and information service industry segments. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Tony currently leads the OWASP Atlanta Chapter, where he manages monthly workshops and events for the Atlanta web application security community. He also has developed a case study program for the Atlanta chapter in order to develop case studies with local Atlanta companies who are seeking to apply application threat modeling techniques within the SDLC and/ or incorporate the many OWASP produced tools and frameworks. Tony can be reached at tonyuv@versprite.com or tonyuv@owasp.org. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tuesday, August 25th, 2009 3:00PM  ==&lt;br /&gt;
&lt;br /&gt;
*OWASP Live CD Demo and Q&amp;amp;amp;A with Matt Tessauro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Matt Tesauro will be in visiting our LA chapter and providing a quick demo of [http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project OWASP Live CD] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP Live CD. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Thursday, August 20th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The Software Assurance Maturity Model (SAMM)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.opensamm.org/ The Software Assurance Maturity Model (SAMM)] is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. SAMM is an open and free project and has recently been added under the Open Web Application Security Project (OWASP) Foundation. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tuesday, July 21st, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Lock picks, BumpKeys, and Hackers oh my! How secure is your application?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;This talk will focus on physical security controls, weaknesses, and counter measures. I will present on what lock picking is, how bump keys work, and ways to subverting electronic locks. We will also go into what are good controls, and what is often overlooked when designing secure environments. Many of the topics covered apply to application security, as the methods for securing these devices is by using obscurity. In the application world with automated tools and scripts, this does not hold water for very long. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan, NetSPI has 10 years of computer security experience, including consulting, engineering, and administration. He has performed security assessment projects in the healthcare, nuclear, manufacturing, pharmaceutical, banking and educational sectors. &amp;lt;br&amp;gt;As an active participant in the information security community, he volunteers at DEFCON, where he designs and implements the firewall and network for what is said to be the most hostile network environment in the world. This network allows speakers, press, vendors, and others to gain access to the Internet, without being hacked. In his spare time he and his wife run the local DEFCON group, DC612 and participate in the Minneapolis OWASP chapter. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== June 24th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Information Warfare: Past, Present and Future&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Information warfare is the composite use of psychological operations (PYOPS), military deception (MILDEC), operational security (OPSEC), computer network operations (CNO), and electronic warfare (EW) to control and disrupt information flow. Recently, interest in information war technologies, techniques and policy issues have increased, especially in the domain of CNO. Increased scrutiny over network operations is both legitimate and valid, as global commerce and military powers are integrated and dependent on the Internet for critical operations. This presentation will describe the five domains of information warfare, the past use of information warfare in the Gulf war and recent Cyber attacks on the Eastern European countries of Georgia and Estonia. Information will be presented on possible new directions of information warfare. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Mikhael Felker, CISSP-ISSEP has worked in a variety of roles including instructor, engineer, and researcher. He is currently employed by The Aerospace Corporation in the Information Assurance Technology Department, supporting Information Assurance (IA) for satellite systems. He is also an Instructor within the Computer &amp;amp;amp; Information Systems Division at UCLA Extension, teaching a course in networking. Actively involved in the Los Angeles security community, he is the Education Director for Los Angeles Chapter of Information Systems Security Association (ISSA), member and speaker of Information Systems Audit and Control Association (ISACA), and former Defense Sector Coordinator for InfraGard. Mikhael has published articles in IEEE Security &amp;amp;amp; Privacy, the ISSA Journal, Information Systems Control Journal, and SecurityFocus. He is a recipient of the Scholarship for Service Program (SFS) Fellowship, sponsored by the National Science Foundation and Department of Homeland Security (DHS). Mikhael completed his graduate work at Carnegie Mellon University with a Master's in Information Security Policy &amp;amp;amp; Management and Bachelor's at UCLA in Computer Science. He holds over 10 certifications in IT and Security. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== May 20th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*[http://video.google.com/videoplay?docid=2875886330538461390 Top Ten Web Hacking Techniques of 2008: &amp;quot;What's possible, not probable&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The polls are closed, votes are in, and we have the winners making up the Top Ten Web Hacking Techniques of 2008! The competition was fierce with the newest and most innovative web hacking techniques to the test. This session will review the top ten hacks from 2008 - what they indicate about the security of the web, what they mean for businesses, and what might be used against us soon down the road. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Jeremiah Grossman is the founder and CTO of WhiteHat Security. He is considered a world-renowned expert in Web security, is a co- founder of the Web Application Security Consortium, and was named to InfoWorld's Top 25 CTOs for 2007. Grossman is a frequent speaker at industry events including the Black Hat Briefings, RSA, CSI, HiTB, OWASP, ISSA, and a number of large universities. He has authored dozens of articles and white papers; is credited with the discovery of many cutting-edge attack and defensive techniques and is a co-author of XSS Attacks. Grossman is often quoted in the the business and technical press. Prior to WhiteHat, Grossman was an information security officer at Yahoo! &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== April 15th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*Cross Site Scripting, Exploits and Defenses&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For a long time, the impact of XSS vulnerabilities has been grossly underestimated. Recent compromises, such as the pro-Hillary [http://cyberinsecure.com/hacked-obama-site-redirects-visitors-to-clintons-site/ defacement] of Barack Obama's website, and a [http://www.securescience.net/twoubledtwitter.html Viral XSS in Twitter] demonstrated the impact of XSS vulnerabilities to the masses. &lt;br /&gt;
&lt;br /&gt;
During this presentation, David Campbell will demonstrate exactly how effective XSS vulns can be, and show you what you can do to protect yourself and your sites. &lt;br /&gt;
&lt;br /&gt;
This presentation was originally delivered to OWASP Colorado in May of 2008, and has been updated for this session. &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:DC_ED_OWASP_XSS_MAY2008_v1.0.pdf Slide deck from May '08 talk] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;David Campbell is an infosec veteran, with experience ranging from penetration testing for Fortune 100's to architecting security solutions for large multinational financials to consulting for government agencies. DC is presently chapter leader of OWASP Denver and is Principal Consultant at Electric Alchemy. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== March 12th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*NETWORK SECURITY DINNER WITH ISSA - CISO'S Security Dashboard Panel!!&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This month will be joining forces with ISSA to create the biggest netowork event for security professionals in Los Angeles for this year. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Agenda &lt;br /&gt;
&lt;br /&gt;
*5:30 p.m., Networking and tours of the antivirus facility &lt;br /&gt;
*6:30 p.m., Dinner &lt;br /&gt;
*7:30 p.m., CISO Panel&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Panelists &lt;br /&gt;
&lt;br /&gt;
*Robert J. Brown, CISSP, CISO WestCorp Credit Union &lt;br /&gt;
*Steve Haydostian, CISSP, Former CISO, Healthnet &lt;br /&gt;
*David Lam, CISSP, CISO, Stephen S. Wise &lt;br /&gt;
*Edward G. Pagett II, CISSP, CISO, Lender Processing Services, Inc. &lt;br /&gt;
*Mike O. Villegas, CISA, CISSP, Director of Information Security, Newegg.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Dinner Fees: &lt;br /&gt;
&lt;br /&gt;
*ISSA-LA members &amp;amp;amp; OWASP members - Pre-Register and Pay online: $25 &lt;br /&gt;
*ISSA-LA members &amp;amp;amp; OWASP members - Pay at the door: $30 &lt;br /&gt;
*Non-members - Pre-Register and Pay online: $30 &lt;br /&gt;
*Non-members - Pay at the door: $35&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;''Thanks to David Lam and Stan Stahl for agreeing to have OWASP joining this ISSA LA event!'' &lt;br /&gt;
&lt;br /&gt;
== February 18th 2009  ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Cloud Computing and Security] &amp;lt;br&amp;gt;The Cloud Computing and Software as a Service models are driving many companies to build innovative, scalable and cost effective alternatives to the traditional IT computing model. Even with the potential cost and scalability benefits of cloud computing, its use by more traditional enterprises has been retarded by the concerns of their professional security and audit staffs. In our experience these concerns are legitimate, and although surveys have shown that security is the #1 factor preventing adoption of cloud computing, there has been very little reliable discussion of the technical security risks inherent in the model and how engineers, sys-admins and architects can deal with these risks. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In this session, we will explore the widely differing security models of the leading cloud computing providers, including Amazon, Google and Salesforce. We will also reveal the significant differences in operational and application security practices necessary to deal with a cloud computing environment. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Alex Stamos is a co-founder and Partner at iSEC Partners Inc., a strategic digital security organization. Alex is an experienced security engineer specializing in solving difficult problems in application security and is a leading researcher in the field of web application and mobile security. He has been a featured speaker at top industry conferences such as Black Hat, Web 2.0 Expo, CanSecWest, DefCon, SyScan, SD Best Practices, Microsoft BlueHat and OWASP App Sec. Alex is a contributing author to &amp;quot;Hacking Exposed: Web 2.0&amp;quot; and an author of the upcoming book &amp;quot;Mobile Application Security&amp;quot;, both from McGraw-Hill. He holds a BSEE from the University of California, Berkeley. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== January 28th 2009  ==&lt;br /&gt;
&lt;br /&gt;
Building Security into the Test Organization &amp;lt;br&amp;gt;The common approach to detecting web security issues is still the regular application of a post-release pen-test or tool based scan. These last minute examinations rarely live up to broader organizational goals; they can be difficult to repeat, measure, or optimize over time. Most of all they're expensive: they find bugs late in the lifecycle. This talk recommends moving security testing responsibility within the test team itself. The approach discussed will work with-or-without the existence of explicit security requirements. See how security testing has been applied at other organizations and how it might be customized for yours. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Ben Walther firmly believes testers have a wonderfully devious mindset, and has been promoting the idea of &amp;quot;security testing&amp;quot; at Cigital's clients, at OWASP events, and to any friends and relatives who will listen. To this end, with the aid of O'Reilly media, Ben Walther and Paco Hope recently published a book entitled the &amp;quot;Web Security Testing Cookbook.&amp;quot; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== December 10th 2008  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/7/79/OWASP-WASCAppSec2007SanJose_SamyWorm.ppt The MySpace Worm] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The most virulent worm in the history of the series of tubes known as the Internet. One of the most highly accessed websites ever [see comScore]. One of the most ostentatious hackers alive. Over one million victims. Less than 24 hours. Fueled only by Chipotle burritos. The MySpace Worm. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Samy will be recapping the story of the development, release and eventual future of the MySpace worm. The 24 hours that led up to over one million friends. The eventual downfall of the MySpace site for several hours. The non-malicious intent and humorous progression of the worm. The t-shirts. The copycats. The behind-the-scenes story of the Secret Service raid at Samy's home and office. The demise of Samy's legal use of computers, community service, restitution, high-risk offender probation, and rehabilitation. And where Samy is today.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar, software engineer and self-proclaimed playboy, is a meddler in the security and software realms. He is currently the Director of Engineering and co-founder of Fonality, Inc., an IP PBX startup located in Culver City. Previously, Samy led the development of all core top-level domain name server software and systems for Global Domains International (.ws). Prior to that, Samy worked with Penn State University developing psychometric personality assessment software with attention to artificial intelligence and bioinformatics. When not strapped behind the Matrix, Samy can be found performing parkour (free running), practicing urban escape artist maneuvers, or is found getting involved in local community service projects. In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in the areas of network security, reverse engineering, and network gaming, and continues his focus in staying out of jail.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== November 19th 2008  ==&lt;br /&gt;
&lt;br /&gt;
A new web attack vector: [http://www.eweek.com/c/a/Security/Security-Researcher-to-Reveal-New-Web-Attack-Vector/ Script Fragmentation]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce a new web-based attack vector which utilizes client-side scripting to fragment malicious web content.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This involves distributing web exploits in a asynchronous manner to evade signature detection. Similar to TCP fragmentation attacks, which are still an issue in current IDS/IPS products, This attack vector involves sending any web exploit in fragments and uses the already existing components within the web browser to reassemble and execute the exploit.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Our presentation will discuss this attack vector used to evade both gateway and client side detection. We will show several proof of concepts containing common readily available web exploits.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stephan Chenette is a Senior Security Researcher who helps lead Websense Security Labs working on malcode detection techniques. Mr. Chenette specializes in research tools ranging from kernel-land sandboxes, to static analysis scanners. He has released public analyses on various vulnerabilities and malware. Prior to joining Websense, Stephan was a security software engineer for 4 years working in research and product development at eEye Digital Security.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== October 29th 2008  ==&lt;br /&gt;
&lt;br /&gt;
Entitlements Management: Security and policies for SOA using XML appliances&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loosely coupled Web Services can be insecure as, by their very nature, are exposed to application consumers. Security built into XML appliances alleviates the developer with the burden of coding security and policies into their application, freeing the developer to concentrate on conding business processes. This evenings meeting will discuss SOA security challenges and introduce the Layer7 XML appliance that allows for dynamic policies to be configured on the fly using an intuitive user interface. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Jonathan Gershater’s career started at 3Com, managing servers and networks. His initial foray into Enterprise Software began in 1999 at enCommerce, which was later acquired by Entrust. He worked at Sun Microsystems from 2005 to 2008 architecting and deploying identity solutions for customers using Sun Java System Identity products. He recently joined Layer 7 Technologies as a senior solution architect. He can be reached at jgershater@layer7tech.com. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== September 17th 2008  ==&lt;br /&gt;
&lt;br /&gt;
The web hacking incident database (WHID) 2007 Report is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. The database classifies each reported attack by, among other criteria, the method used, the outcome of the attack and the industry and the country of the attacked organization. Based on the database Breach Labs which sponsors WHID issues a periodical report on trends in Web Application Security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
By providing answers to questions such as: &lt;br /&gt;
&lt;br /&gt;
*The drivers behind Web hacking. &lt;br /&gt;
*The technology hackers use. &lt;br /&gt;
*The types of organizations attacked most often. &lt;br /&gt;
*The common outcomes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The presentation will discuss WHID statistics, focusing on rising trends in Web Attacks in the 1st half of 2008. As the WHID enables research into the business model behind hacking, the presentation goes beyond discussing the technical aspects of attacks such as SQL injection crawlers and Web Site herding, to discussing the business model common to all of the attacks: Economy of scale. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is a recognized security thought leader and evangelist who frequently speaks with the media and industry groups. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;He is the director of application security at Breach Security. He is also a faculty member for the SANS Institute, where his duties include instructor/courseware developer for Apache Security/Building a Web Application Firewall Workshop, Top 20 Vulnerabilities Team Member and Local Mentor for the SANS Track 4, &amp;quot;Hacker Techniques, Exploits and Incident Handling&amp;quot; course. He holds six SANS Global Information Assurance Certifications (GIAC): Intrusion Analyst (GCIA), Systems and Network Auditor (GSNA), Forensic Analyst (GCFA), Incident Handler (GCIH), Unix Security Administrator (GCUX) and Security Essentials (GSEC). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Mr. Barnett also serves as the team lead for the Center for Internet Security Apache Benchmark Project and is a member of the Web Application Security Consortium. His web security book, &amp;quot;Preventing Web Attacks with Apache,” was published by Addison/Wesley in 2006. &lt;br /&gt;
&lt;br /&gt;
== August 19th 2008  ==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't Write Your Own Security Code&amp;quot; – Application security is arguably the most difficult IT challenge facing organizations today. There are over 600 different categories of vulnerabilities to avoid and they are all tricky. Most of these problems are related to the design, implementation, and use of a relatively small set of security controls. To solve this problem for developers, Jeff created the OWASP ESAPI project – a clean intuitive toolbox of the core security building blocks that every web developer needs. In this talk, Jeff will show you how to create an ESAPI for your organization that will solve the OWASP Top Ten vulnerabilities, increase assurance, and dramatically cut costs all at the same time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Jeff Williams is the founder and CEO of Aspect Security, specializing in application security services. Jeff also serves as the volunteer Chair of the Open Web Application Security Project (OWASP). Jeff has made extensive contributions to the application security community through OWASP, including the Top Ten, WebGoat, Stinger, Secure Software Contract Annex, Enterprise Security API, and the local chapters program. Jeff holds advanced degrees in psychology, computer science, and human factors, and graduated cum laude from Georgetown Law.&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_2009,_2010&amp;diff=105435</id>
		<title>Los Angeles Previous Presentations 2009, 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_2009,_2010&amp;diff=105435"/>
				<updated>2011-02-18T20:23:19Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Adding the January talk.  The wiki editor is having major problems with the size of this file.  We need to find a better way to reduce page size.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &amp;amp;nbsp;Previous Presentations  =&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298059442687S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''Wednesday, January 26, 2011 7:00 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
*'''Evercookie: The Persistent Cookie'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&amp;amp;lt;span id=&amp;quot;fck_dom_range_temp_1298060072205_918&amp;quot; /&amp;amp;gt;&lt;br /&gt;
900&amp;amp;nbsp;Corporate Pointe&lt;br /&gt;
Culver City, CA&amp;amp;nbsp;90230&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
'''&amp;lt;br&amp;gt;Description:&amp;lt;br&amp;gt;'''Evercookie is a JavaScript API that produces extremely persistent cookies in a browser. Its goal is to identify a client even after they have removed standard cookies, Flash cookies Local Shared Objects or LSOs), and others. &lt;br /&gt;
&lt;br /&gt;
Evercookie accomplishes this by storing the cookie data in several types of storage mechanisms that are available on the local browser. Additionally, if evercookie has found the user has removed any of the types of cookies in question, it recreates them using each mechanism available. &lt;br /&gt;
&lt;br /&gt;
You can read more about Samy and Evercookie at[http://samy.pl/evercookie '''http://samy.pl/evercookie/'''] &lt;br /&gt;
&lt;br /&gt;
'''Speaker: &amp;lt;br&amp;gt;'''Samy Kamkar is best known for the Samy worm, the first XSS worm, infecting over one million users on MySpace in less than 24 hours. A co-founder of Fonality, Inc., an IP PBX company, Samy previously led the development of all toplevel domain name server software and systems for Global Domains International (.ws), and worked for Penn State University developing AI-based psychometric personality assessment software. In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in network security, reverse engineering, and network gaming. When not strapped behind the Matrix, Samy can be found stunt driving, getting involved in local community service projects, and continuing his focus on staying out of jail. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1298059442687S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''Wednesday, July 21, 2011 7:00 PM'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1281462225310S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;'''How I Met Your Girlfriend: Entirely New Classes of Web Attacks'''&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&lt;br /&gt;
900 Corporate Pointe&lt;br /&gt;
Culver City, CA 90230&amp;lt;/pre&amp;gt;&lt;br /&gt;
Description:&amp;lt;br&amp;gt;This includes using HTML5 client-side XSS (without XSS hitting the server!), and my newly discovered attacks on PHP session hijacking and random numbers (accurately guessing PHP session cookies), browser protocol confusion (turning a browser into an SMTP server), firewall and NAT penetration via Javascript (turning your router against you), remote iPhone Google Maps hijacking (iPhone penetration combined with HTTP man-in-the-middle), extracting extremely accurate geolocation information from a web browser (not using IP geolocation), and more. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Speaker: Samy Kamkar is best known for the Samy worm, the first XSS worm, infecting over one million users on MySpace in less than 24 hours. A co-founder of Fonality, Inc., an IP PBX company, Samy previously led the development of all top-level domain name server software and systems for Global Domains International (.ws), and worked for Penn State University developing AI-based psychometric personality assessment software. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in network security, reverse engineering, and network gaming. When not strapped behind the Matrix, Samy can be found stunt driving, getting involved in local community service projects, and continuing his focus on staying out of jail. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Dinner Sponser: Citrix Systems&amp;lt;br&amp;gt;[[Image:Citrix Picture.jpg|80x80px|http://lacitrix.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, June 09, 2010 7:30PM&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*Security Assertion Markup Language (SAML), Shibboleth Single SignOn System, and Shibboleth's role at University of Southern California&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&lt;br /&gt;
900 Corporate Pointe&lt;br /&gt;
Culver City, CA 90230&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Speaker: Brendan Bellina &amp;lt;br&amp;gt;Title: Identity Services Architect and Manager of Enterprise Middleware Identity Management at USC &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
NOTE: We are having this month meeting on the second Wednesday, instead of the regular third Wednesday, to avoid conflict with ISSA Summit scheduled on June 16. You can still register for the summit at the ISSA LA website (http://www.issa-la.org/Default.aspx?id=1088). &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, April 21st, 2010 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The intersection of social and technical attacks in Web 2.0 applications by Mike Bailey and Mike Murray&lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   Symantec Corporation&lt;br /&gt;
   900 Corporate Pointe&lt;br /&gt;
   Culver City, CA 90230&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Topic: The intersection of social and technical attacks in Web 2.0 applications &lt;br /&gt;
&lt;br /&gt;
Speakers: Mike Bailey and Mike Murray &lt;br /&gt;
&lt;br /&gt;
Mike Bailey is a senior security researcher at MAD Security and an application security specialist. While his research spans a wide variety of domains, it generally focuses on secure web application development, web application scanning and penetration testing, online privacy issues, network protocols and services, and how to break them. &lt;br /&gt;
&lt;br /&gt;
Mike has spoken throughout the country at different security conferences and shows, including Blackhat DC, Toorcon, Defcon and others. Aside from coming up with new and interesting ways to break web and client-side applications, he also puts those attacks into practice as a penetration tester. Currently, Mike is studying the intersection of social and technical attacks in Web 2.0 applications. He publishes his research on the MAD Security blog as well as at Skeptikal.org. &lt;br /&gt;
&lt;br /&gt;
Mike Murray has spent his entire career in information security and currently leads the delivery arm of MAD Security (MADSecInc.com). Mike is a co-founder of InfoSecLeaders.com where he writes and talks about the skills and strategies for building a long-term career in information security. Mike's on security careers have been seen at major conferences like RSA and Defcon. &lt;br /&gt;
&lt;br /&gt;
== Wednesday, March 17th, 2010 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Mike Schrenk, author of &amp;quot;Webbots, Spiders, and Screen Scrapers&amp;quot;&lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   Symantec Corporation&lt;br /&gt;
   900 Corporate Pointe&lt;br /&gt;
   Culver City, CA 90230&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
BOOK PREVIEW: Webbots, Spiders, and Screen Scrapers SECOND EDITION &lt;br /&gt;
&lt;br /&gt;
Michael Schrenk will provide a preview of the largely expanded second edition of his book &amp;quot;Webbots, Spiders, and Screen Scrapers&amp;quot;. This second edition describes how technologies like JavaScript, AJAX and Flash challenge webbot developers and how those challenges are met. He will also talk about defeating CAPTCHAs, scalability and other related topics. &lt;br /&gt;
&lt;br /&gt;
Michael Schrenk is a software developer, author and instructor, who specializes in automated web browsing agents known as webbots. Michael uses the Internet in new and innovative (odd?) ways to provide competitive advantages for his clients in The US, Europe and Asia. &lt;br /&gt;
&lt;br /&gt;
He also helps journalists more effectively use computers to conduct online research through automation and by describing where and how to find otherwise hidden online information. No stranger to Europe--he's lived and worked for clients in Moscow and Madrid, Mike taught at the 2008 European Investigative Journalism Conference (Brussels Belgium), twice in 2009 he lectured at The Center for Investigative Journalism (London England) and later in 2009, he lead several sessions at the VVOJ Journalism conference (Utrecht The Netherlands). &lt;br /&gt;
&lt;br /&gt;
Last August, Mike made his fourth speaking appearance at the DEFCON computer hacking conference. Mike lives in sunny Las Vegas, Nevada (USA). You can contact him at http://www.schrenk.com or follow him on Twitter [http://twitter.com/mgschrenk @mgschrenk]. &lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, February 24th, 2010 7:00PM  ==&lt;br /&gt;
&lt;br /&gt;
*Cloud Computing Security: Raining on the Trendy New Parade&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Slides can be found [https://docs.google.com/fileview?id=0By_clZjtpXPwMWM0YWIyZDgtZmRkZC00YTZlLWE1MDEtNmU0N2Y3MzQwMTJh&amp;amp;hl=en here on Google Docs]. &lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   AT&amp;amp;amp;T Interactive&lt;br /&gt;
   611 N. Brand Blvd., 5th Floor&lt;br /&gt;
   Glendale, CA&lt;br /&gt;
&lt;br /&gt;
Cloud computing is an unstoppable meme at the CIO level, and will dominate corporate IT planning for the next several years. Although they do offer the promise of cost savings for many organizations, the basic ideas behind abstracting out the corporate datacenter greatly complicates the tasks of securing and auditing these systems. While there has been excellent research into low-level hypervisor and virtualization bugs, there has been little public discussion of the “big picture” problems for cloud computing. These include virtualized network devices, browser same-origin issues, credential management and many interesting legal challenges. &lt;br /&gt;
&lt;br /&gt;
Our goal with this talk will be to explore the different attack scenarios that exist in the cloud computing world and to provide a comparison between the security models of the leading cloud computing platforms. We will discuss how current attacks against applications and infrastructure are changed with cloud computing, as well as introduce the audience to new types of vulnerabilities that are unique to cloud computing. Attendees will learn how to analyze the threat posed to them by cloud computing platforms as either providers or consumers of software built on these new platforms. Our platforms for discussion include Salesforce.com, Google Apps, Microsoft Office Live, Google AppEngine, Microsoft Azure, Amazon EC2, and Sun. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Alex Stamos is a founding partner of iSEC Partners, a strategic digital security organization. Alex is an experienced security engineer and consultant specializing in application security and securing large infrastructures, and has taught multiple classes in network and application security. &lt;br /&gt;
&lt;br /&gt;
He is a leading researcher in the field of web application and web services security and has been a featured speaker at top industry conferences such as Black Hat, CanSecWest, DefCon, SyScan, Microsoft BlueHat and OWASP App Sec. &lt;br /&gt;
&lt;br /&gt;
He holds a BS in Electrical Engineering and Computer Science from the University of California, Berkeley. &lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, January 20th, 2010 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Do VLANs allow for good application security?&lt;br /&gt;
&lt;br /&gt;
    Meeting Location&lt;br /&gt;
    [http://maps.google.com/maps?q=900+Corporate+Pointe,+90230&amp;amp;ie=UTF8&amp;amp;oe=UTF-8&amp;amp;ll=33.988385,-118.387041&amp;amp;spn=0.010284,0.014055&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=addr Symantec Corporation]&lt;br /&gt;
    900 Corporate Pointe&lt;br /&gt;
    Culver City, CA 90230&lt;br /&gt;
    Laguna Conference Room&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Virtual Local Area Networks (VLANs) are not a new concept, and can help any organization better control network access. I will present some of the previous issues identified, what was the root cause, and how these have been fixed in current technology. In addition we will talk about how this can help to enhance security in your environment, and what controls must be in place in order to implement such an environment. We will also touch on how this can complicate your application environment, but improve overall security. &lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when working with VMware, VLANs, and web applications, to ensure that these networks are secure, and what to look for to potentially pass audit criteria. I will also talk about where and how these controls have been implemented in order to protect thousands of users while accessing one of the most hostile networks in the world. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan, Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including, consulting, engineering and administration. He has performed security assessment projects for health care, nuclear, manufacturing, pharmaceutical, banking and educational sectors. As an active participant in the information security community, he volunteers at DEFCON where he designs and implements the Firewall and Network for what is said to be the most hostile network environment in the world. &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security groups both as a board member of OWASP MSP and DC612. His roots and experience come from working for a large enterprise banks, designing and managing enterprise security systems. In the more recent years he has been working as an Information Security Consultant to review the security and architecture of information computing environments. &lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, December 16th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/b/bc/Sutton_-_Pulling_The_Plug-Security_Risks_in_Next_Generation_Offline_Web_Apps_-_OWASP_LA_OC.pdf Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as Gears (formerly Google Gears) and the Database Storage &amp;amp;lt;http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage/&amp;amp;gt; functionality included in the emerging HTML 5 &amp;amp;lt;http://dev.w3.org/html5/spec/Overview.html&amp;amp;gt; specification. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications. &lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given web application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Michael Sutton,Vice President and security research at Zscaler, has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry. &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; Wednesday, November 18th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/b/bc/Watching_software_run_11.18.09.pptx Watching Software Run with Brian Chess, Fortify Founder and Chief Scientist]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Now more than ever before, computer systems are vulnerable because software is vulnerable. No matter how good programmers get at making secure software, it will never be perfect—we will always have to contend with incomplete or inadequate code. Most efforts at living with bad code have focused on shoring it up from the outside: limiting network access (firewalls) or watching for suspicious behavior (intrusion detection). This talk takes a different perspective: we’ll look at methods for identifying and blunting the effects of software shortcomings from the inside by watching the software run. &lt;br /&gt;
&lt;br /&gt;
Modern languages like Java and C# are good for more than just programmers. They also provide a wealth of structured information when they execute. We can apply many same techniques developed for outside-in security, but at a finer granularity and with much more context. Along the way there is a lot to talk about: Where web application firewalls excel and where they fall down. Fuzzing vs. static analysis. The disappointments of both aspect oriented programming and building security in. Why nobody uses the Java Security model. Taking your security with you into the cloud. The reason SQL injection won’t go away. Revenge of the reference monitor. Why was Twitter’s security so bad? &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Brian Chess is a founder of Fortify Software and serves as Fortify's Chief Scientist, where his work focuses on practical methods for creating secure systems. His book, Secure Programming with Static Analysis, shows how static source code analysis is an indispensable tool for getting security right. Brian holds a Ph.D. in computer engineering from the University of California at Santa Cruz, where he studied the application of static analysis to the problem of finding security-relevant defects in source code. Before settling on security, Brian spent a decade in Silicon Valley working at huge companies and small startups. He has done research on a broad set of topics, ranging from integrated circuit design all the way to delivering software as a service. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, October 21st, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/c/ca/ISO27001_OWASPLA_Shankar_10212009.pdf Enabling Compliance Requirements using Information Security Management System (ISMS) Framework (ISO27001)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Growing threats and complex regulatory requirements emphasize the need for an effective Information Security Management System (ISMS) framework for an organization. Comprehensive and globally accepted standards like ISO27001 can help in protecting information assets and in enabling compliance requirements. ISO27001 provides an Information Security framework based on best practices and controls to ensure the confidentiality, integrity and availability of information assets. This presentation analyzes the possible synergies between the goals of Information Security Management System (ISMS) and the various compliance requirements, thus making the compliance efforts less complex. &amp;lt;br&amp;gt;Following are the key objectives of this presentation&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
*Provide an introduction to ISO27001 and its controls &lt;br /&gt;
*Discuss the implementation approach for an Information Security Management System (ISMS) framework &lt;br /&gt;
*Familiarize the audience with some common challenges in implementation &lt;br /&gt;
*Outline synergy between ISO27001 controls and some compliance requirements( PCI , etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Attendees will learn about ISO27001 Information Security Standard, ISMS implementation approach and how ISO27001 can be used in meeting various regulatory/compliance requirements like Sox, PCI etc. It will also help the attendees to improve the information security posture of the organization and provide an effective and efficient approach for handling various information security/compliance audits with less effort. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Shankar Subramaniyan has over 11 years of experience as a technology consulting and project management executive in the areas of IT Governance, Risk and Compliance (GRC), Business Continuity Planning and Network Design &amp;amp;amp; Architecture. He has thorough expertise on setting up Information Security Framework and Policies on the basis of industry standards such as ISO 27001. He has worked extensively on industry standards and best practices like BS7799 and ITIL. He also has good understanding and knowledge of various compliance requirements like PCI, Sox etc. Shankar' s experience includes IT audit, SOX remediation, ISMS (ISO27001) implementation, PCI compliance assessment, disaster recovery solution, enterprise risk management, designing IT security architecture and implementing ITIL processes. Shankar has rich experience in handling large projects and managing client relationships across corporate and educational sectors. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, September 16th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;On August 5th of 2009, Federal prosecutors on Monday charged Albert Gonzales with the largest case of credit and debit card data theft ever in the United States: 130 million credit cards numbers by hacking into the systems of Heartland Payment Systems, the New Jersey-based card processing company, as well as Hannaford Brothers, 7-Eleven and two unnamed national retailers. Using a SQL-injection attack, the hackers installed malware on Hannaford Brothers. Hannaford was PCI compliant at the time they were compromise that lets question the validity of regulatory compliance frameworks, and specifically PCI standards as an effective method to reduce data breaches, identity theft, and the proliferation of credit card fraud. This presentation will further analyze how status quo security standards, such as PCI-DSS, as well as other policies, standards, and guidelines truly affect security risk mitigation efforts against cybercrime based threats. These traditional efforts will be compared to threat modeling workflows in order to demonstrate how real risk is mitigated under each scenario. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Cases for financial fraud will be anonymously presented to create a business case for application threat modeling as a viable methodology to drive improved application design and security risk mitigation. Threat modeling concepts will be elaborated in order to prove how application architecture walkthroughs via threat modeling improve the mitigation of cybercrime threats. Attacker motives and goals will be presented and incorporated into attack trees and it will show how attack libraries can be used to effectively identify application vulnerabilities and devise countermeasures in web application. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;From the risk analysis perspective, several attacks will be considered and highlighted, particularly attacks that represent a systemic impact to an organization or government (such as for example a distributed denial of service). &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Through the presentation of threat modeling scenarios, analyses and correlations will be drawn from the represented model(s) to attack patterns, associated and discovered security vulnerabilities, data sources, application topologies, and possible roles and permissions associated with the application environment. The purpose of the presentation is to demonstrate how application threat modeling can be used as part of a nouveau age form of security risk mitigation and overall application security. Data flow diagrams and application walkthroughs will enable audience members to witness how application threat modeling is an evolved form of security process engineering for improved application design and overall application security. The presentation will also demonstrate how threat modeling is capable of delivering critical business functions as well as in mitigating current and future cyber attacks, such as distributed denial of service, botnet driven-malware, spear phishing techniques, and more attacks that ultimately lead to identity and credit card fraud. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;From the point of view of current and future cybercrime risk mitigation, several different strategies for application threat modeling will be discussed as related to securing both the web application web and critical financial infrastructures, such as ATMs. Finally some emphasis will be given to countermeasures that provide for incident response, intelligence and forensics capabilities. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Presentation outline, defining all topics that will be covered: &lt;br /&gt;
&lt;br /&gt;
*Status quo of regulatory compliance in mitigating risk &lt;br /&gt;
*Threat modeling techniques for cybercrime threats &lt;br /&gt;
*Attack tree analysis for attack tree vectors &lt;br /&gt;
*Threat modeling for multi-channel fraud threat scenarios &lt;br /&gt;
*Cyber crime threats and application countermeasures via threat modeling &lt;br /&gt;
*Example of mitigation strategies for cybercrime and application of defense in depth for web applications&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Any supporting research/tools: &lt;br /&gt;
&lt;br /&gt;
*Threat models and attack trees &lt;br /&gt;
*Threat model are produced using the Microsoft™ threat modeling tool &lt;br /&gt;
*Public available cybercrime data will be presented and correlated&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Marco Morana serves as one of the leaders of OWASP (Open Web Application Security Project) organization where he is actively involved in evangelize on web application security through presentations at local chapter meetings in USA as well as internationally. Marco has recently been awarded a contract from Wiley Publishing to co-author a book on Application Threat Modeling. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Besides being the OWASP Cincinnati chapter lead, Marco is also active contributor to OWASP projects such as the application threat modeling methodology for secure coding guideline and the security testing guide (ver. 2 and 3). Besides contributing to OWASP, Marco works as Technology Information Security Officer for a large financial organization in North America with responsibilities in the definition of the organization web application security standards, management of application security assessments during the SDLC, threat-fraud analysis and training of software developers, project managers and architects on different topics related to application security. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In the past, Marco served as senior security consultant and independent consultant where his responsibilities included providing software security services for several clients in the financial and banking, telecommunications and commercial sector industry. Besides security consulting, Marco had a career as technologist in the security industry where he contributed to the design business critical security products currently being used by several FORTUNE 500 companies as well by the US Government. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Marco work on software security is referred in the 2007 State Of the Art report by the Information Assurance Technology Analysis Center (IATAC). Marco received the NASA’s Space Act Award in 1999 for the patenting the S/MIME SEP (Secure Email Plug-in) application. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Marco research work on application and software security is widely published on several magazines such as In-secure magazine, Secure Enterprise, ISSA Journal and the C/C++ Users journal. Marco’s ideas and strategies for writing secure software are posted on his blog: http://securesoftware.blogspot.com. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tony UcedaVelez has more than 10 years of hands-on security and technology experience and is a vocal advocate of security process engineering – a terminology that describes the design and development of secure processes and controls working symbiotically to a unique business workflow. Tony currenlty serves as Managing Director for an Atlanta based risk advisory firm that focuses on security strategy and delivering effective means for risk mitigation and security process engineering. He has worked and consulted for the Fortune 500, as well as federal agencies in the U.S on the topic of application security and security process engineering. His diverse background in software development, security architecture, and network security, coupled with his expertise in process engineering and security risk management has allowed Tony to be a recognized leader in developing strategic security solutions that are multi-faceted in their approach to addressing enterprise risk. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In the realm of application security, Tony is a threat modeling evangelist and has provided numerous talks domestically and globally on its many benefits and application. He has served as a guest mentor to teams participating in Kennesaw State University’s annual Cybercrime capture the flag event as well as a Cybercrime speaker for Southern Polytechnic University in Atlanta. He has also served as a guest speaker on the subject of application threat modeling during ISACA’s annual Geek Week event and has also served as a keynote speaker on the subject for ISACA’s Global Symposium web cast series. Additional articles include articles related to CoBIT and the ValIT model (ISACA’s Journal), application threat modeling within the SDLC (InSecureMagazine), and security process engineering for a ROSI (return on security investment) (Journal of Finance). He is currently finalizing a Wiley publishing book on Application Threat Modeling with Marco Morana. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Prior to VerSprite, Tony served as Sr. Director of Security Risk Management to a Fortune 50 organization where he led security assessments against global application environments. His work encompassed web application security testing, security architecture reviews, and analysis for business logic exploits. He applied effective ways to introduce the subject of application risk to information owners by effectively mapping them to causal factors for business. Previous to this role, he spent more than 5 years in the field of application security across other Fortune 500 organizations within the banking, telecom, and information service industry segments. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Tony currently leads the OWASP Atlanta Chapter, where he manages monthly workshops and events for the Atlanta web application security community. He also has developed a case study program for the Atlanta chapter in order to develop case studies with local Atlanta companies who are seeking to apply application threat modeling techniques within the SDLC and/ or incorporate the many OWASP produced tools and frameworks. Tony can be reached at tonyuv@versprite.com or tonyuv@owasp.org. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tuesday, August 25th, 2009 3:00PM  ==&lt;br /&gt;
&lt;br /&gt;
*OWASP Live CD Demo and Q&amp;amp;amp;A with Matt Tessauro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Matt Tesauro will be in visiting our LA chapter and providing a quick demo of [http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project OWASP Live CD] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP Live CD. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Thursday, August 20th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The Software Assurance Maturity Model (SAMM)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.opensamm.org/ The Software Assurance Maturity Model (SAMM)] is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. SAMM is an open and free project and has recently been added under the Open Web Application Security Project (OWASP) Foundation. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tuesday, July 21st, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Lock picks, BumpKeys, and Hackers oh my! How secure is your application?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;This talk will focus on physical security controls, weaknesses, and counter measures. I will present on what lock picking is, how bump keys work, and ways to subverting electronic locks. We will also go into what are good controls, and what is often overlooked when designing secure environments. Many of the topics covered apply to application security, as the methods for securing these devices is by using obscurity. In the application world with automated tools and scripts, this does not hold water for very long. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan, NetSPI has 10 years of computer security experience, including consulting, engineering, and administration. He has performed security assessment projects in the healthcare, nuclear, manufacturing, pharmaceutical, banking and educational sectors. &amp;lt;br&amp;gt;As an active participant in the information security community, he volunteers at DEFCON, where he designs and implements the firewall and network for what is said to be the most hostile network environment in the world. This network allows speakers, press, vendors, and others to gain access to the Internet, without being hacked. In his spare time he and his wife run the local DEFCON group, DC612 and participate in the Minneapolis OWASP chapter. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== June 24th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Information Warfare: Past, Present and Future&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Information warfare is the composite use of psychological operations (PYOPS), military deception (MILDEC), operational security (OPSEC), computer network operations (CNO), and electronic warfare (EW) to control and disrupt information flow. Recently, interest in information war technologies, techniques and policy issues have increased, especially in the domain of CNO. Increased scrutiny over network operations is both legitimate and valid, as global commerce and military powers are integrated and dependent on the Internet for critical operations. This presentation will describe the five domains of information warfare, the past use of information warfare in the Gulf war and recent Cyber attacks on the Eastern European countries of Georgia and Estonia. Information will be presented on possible new directions of information warfare. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Mikhael Felker, CISSP-ISSEP has worked in a variety of roles including instructor, engineer, and researcher. He is currently employed by The Aerospace Corporation in the Information Assurance Technology Department, supporting Information Assurance (IA) for satellite systems. He is also an Instructor within the Computer &amp;amp;amp; Information Systems Division at UCLA Extension, teaching a course in networking. Actively involved in the Los Angeles security community, he is the Education Director for Los Angeles Chapter of Information Systems Security Association (ISSA), member and speaker of Information Systems Audit and Control Association (ISACA), and former Defense Sector Coordinator for InfraGard. Mikhael has published articles in IEEE Security &amp;amp;amp; Privacy, the ISSA Journal, Information Systems Control Journal, and SecurityFocus. He is a recipient of the Scholarship for Service Program (SFS) Fellowship, sponsored by the National Science Foundation and Department of Homeland Security (DHS). Mikhael completed his graduate work at Carnegie Mellon University with a Master's in Information Security Policy &amp;amp;amp; Management and Bachelor's at UCLA in Computer Science. He holds over 10 certifications in IT and Security. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== May 20th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*[http://video.google.com/videoplay?docid=2875886330538461390 Top Ten Web Hacking Techniques of 2008: &amp;quot;What's possible, not probable&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The polls are closed, votes are in, and we have the winners making up the Top Ten Web Hacking Techniques of 2008! The competition was fierce with the newest and most innovative web hacking techniques to the test. This session will review the top ten hacks from 2008 - what they indicate about the security of the web, what they mean for businesses, and what might be used against us soon down the road. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Jeremiah Grossman is the founder and CTO of WhiteHat Security. He is considered a world-renowned expert in Web security, is a co- founder of the Web Application Security Consortium, and was named to InfoWorld's Top 25 CTOs for 2007. Grossman is a frequent speaker at industry events including the Black Hat Briefings, RSA, CSI, HiTB, OWASP, ISSA, and a number of large universities. He has authored dozens of articles and white papers; is credited with the discovery of many cutting-edge attack and defensive techniques and is a co-author of XSS Attacks. Grossman is often quoted in the the business and technical press. Prior to WhiteHat, Grossman was an information security officer at Yahoo! &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== April 15th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*Cross Site Scripting, Exploits and Defenses&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For a long time, the impact of XSS vulnerabilities has been grossly underestimated. Recent compromises, such as the pro-Hillary [http://cyberinsecure.com/hacked-obama-site-redirects-visitors-to-clintons-site/ defacement] of Barack Obama's website, and a [http://www.securescience.net/twoubledtwitter.html Viral XSS in Twitter] demonstrated the impact of XSS vulnerabilities to the masses. &lt;br /&gt;
&lt;br /&gt;
During this presentation, David Campbell will demonstrate exactly how effective XSS vulns can be, and show you what you can do to protect yourself and your sites. &lt;br /&gt;
&lt;br /&gt;
This presentation was originally delivered to OWASP Colorado in May of 2008, and has been updated for this session. &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:DC_ED_OWASP_XSS_MAY2008_v1.0.pdf Slide deck from May '08 talk] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;David Campbell is an infosec veteran, with experience ranging from penetration testing for Fortune 100's to architecting security solutions for large multinational financials to consulting for government agencies. DC is presently chapter leader of OWASP Denver and is Principal Consultant at Electric Alchemy. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== March 12th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*NETWORK SECURITY DINNER WITH ISSA - CISO'S Security Dashboard Panel!!&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This month will be joining forces with ISSA to create the biggest netowork event for security professionals in Los Angeles for this year. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Agenda &lt;br /&gt;
&lt;br /&gt;
*5:30 p.m., Networking and tours of the antivirus facility &lt;br /&gt;
*6:30 p.m., Dinner &lt;br /&gt;
*7:30 p.m., CISO Panel&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Panelists &lt;br /&gt;
&lt;br /&gt;
*Robert J. Brown, CISSP, CISO WestCorp Credit Union &lt;br /&gt;
*Steve Haydostian, CISSP, Former CISO, Healthnet &lt;br /&gt;
*David Lam, CISSP, CISO, Stephen S. Wise &lt;br /&gt;
*Edward G. Pagett II, CISSP, CISO, Lender Processing Services, Inc. &lt;br /&gt;
*Mike O. Villegas, CISA, CISSP, Director of Information Security, Newegg.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Dinner Fees: &lt;br /&gt;
&lt;br /&gt;
*ISSA-LA members &amp;amp;amp; OWASP members - Pre-Register and Pay online: $25 &lt;br /&gt;
*ISSA-LA members &amp;amp;amp; OWASP members - Pay at the door: $30 &lt;br /&gt;
*Non-members - Pre-Register and Pay online: $30 &lt;br /&gt;
*Non-members - Pay at the door: $35&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;''Thanks to David Lam and Stan Stahl for agreeing to have OWASP joining this ISSA LA event!'' &lt;br /&gt;
&lt;br /&gt;
== February 18th 2009  ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Cloud Computing and Security] &amp;lt;br&amp;gt;The Cloud Computing and Software as a Service models are driving many companies to build innovative, scalable and cost effective alternatives to the traditional IT computing model. Even with the potential cost and scalability benefits of cloud computing, its use by more traditional enterprises has been retarded by the concerns of their professional security and audit staffs. In our experience these concerns are legitimate, and although surveys have shown that security is the #1 factor preventing adoption of cloud computing, there has been very little reliable discussion of the technical security risks inherent in the model and how engineers, sys-admins and architects can deal with these risks. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In this session, we will explore the widely differing security models of the leading cloud computing providers, including Amazon, Google and Salesforce. We will also reveal the significant differences in operational and application security practices necessary to deal with a cloud computing environment. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Alex Stamos is a co-founder and Partner at iSEC Partners Inc., a strategic digital security organization. Alex is an experienced security engineer specializing in solving difficult problems in application security and is a leading researcher in the field of web application and mobile security. He has been a featured speaker at top industry conferences such as Black Hat, Web 2.0 Expo, CanSecWest, DefCon, SyScan, SD Best Practices, Microsoft BlueHat and OWASP App Sec. Alex is a contributing author to &amp;quot;Hacking Exposed: Web 2.0&amp;quot; and an author of the upcoming book &amp;quot;Mobile Application Security&amp;quot;, both from McGraw-Hill. He holds a BSEE from the University of California, Berkeley. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== January 28th 2009  ==&lt;br /&gt;
&lt;br /&gt;
Building Security into the Test Organization &amp;lt;br&amp;gt;The common approach to detecting web security issues is still the regular application of a post-release pen-test or tool based scan. These last minute examinations rarely live up to broader organizational goals; they can be difficult to repeat, measure, or optimize over time. Most of all they're expensive: they find bugs late in the lifecycle. This talk recommends moving security testing responsibility within the test team itself. The approach discussed will work with-or-without the existence of explicit security requirements. See how security testing has been applied at other organizations and how it might be customized for yours. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Ben Walther firmly believes testers have a wonderfully devious mindset, and has been promoting the idea of &amp;quot;security testing&amp;quot; at Cigital's clients, at OWASP events, and to any friends and relatives who will listen. To this end, with the aid of O'Reilly media, Ben Walther and Paco Hope recently published a book entitled the &amp;quot;Web Security Testing Cookbook.&amp;quot; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== December 10th 2008  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/7/79/OWASP-WASCAppSec2007SanJose_SamyWorm.ppt The MySpace Worm] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The most virulent worm in the history of the series of tubes known as the Internet. One of the most highly accessed websites ever [see comScore]. One of the most ostentatious hackers alive. Over one million victims. Less than 24 hours. Fueled only by Chipotle burritos. The MySpace Worm. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Samy will be recapping the story of the development, release and eventual future of the MySpace worm. The 24 hours that led up to over one million friends. The eventual downfall of the MySpace site for several hours. The non-malicious intent and humorous progression of the worm. The t-shirts. The copycats. The behind-the-scenes story of the Secret Service raid at Samy's home and office. The demise of Samy's legal use of computers, community service, restitution, high-risk offender probation, and rehabilitation. And where Samy is today.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar, software engineer and self-proclaimed playboy, is a meddler in the security and software realms. He is currently the Director of Engineering and co-founder of Fonality, Inc., an IP PBX startup located in Culver City. Previously, Samy led the development of all core top-level domain name server software and systems for Global Domains International (.ws). Prior to that, Samy worked with Penn State University developing psychometric personality assessment software with attention to artificial intelligence and bioinformatics. When not strapped behind the Matrix, Samy can be found performing parkour (free running), practicing urban escape artist maneuvers, or is found getting involved in local community service projects. In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in the areas of network security, reverse engineering, and network gaming, and continues his focus in staying out of jail.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== November 19th 2008  ==&lt;br /&gt;
&lt;br /&gt;
A new web attack vector: [http://www.eweek.com/c/a/Security/Security-Researcher-to-Reveal-New-Web-Attack-Vector/ Script Fragmentation]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce a new web-based attack vector which utilizes client-side scripting to fragment malicious web content.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This involves distributing web exploits in a asynchronous manner to evade signature detection. Similar to TCP fragmentation attacks, which are still an issue in current IDS/IPS products, This attack vector involves sending any web exploit in fragments and uses the already existing components within the web browser to reassemble and execute the exploit.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Our presentation will discuss this attack vector used to evade both gateway and client side detection. We will show several proof of concepts containing common readily available web exploits.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stephan Chenette is a Senior Security Researcher who helps lead Websense Security Labs working on malcode detection techniques. Mr. Chenette specializes in research tools ranging from kernel-land sandboxes, to static analysis scanners. He has released public analyses on various vulnerabilities and malware. Prior to joining Websense, Stephan was a security software engineer for 4 years working in research and product development at eEye Digital Security.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== October 29th 2008  ==&lt;br /&gt;
&lt;br /&gt;
Entitlements Management: Security and policies for SOA using XML appliances&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loosely coupled Web Services can be insecure as, by their very nature, are exposed to application consumers. Security built into XML appliances alleviates the developer with the burden of coding security and policies into their application, freeing the developer to concentrate on conding business processes. This evenings meeting will discuss SOA security challenges and introduce the Layer7 XML appliance that allows for dynamic policies to be configured on the fly using an intuitive user interface. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Jonathan Gershater’s career started at 3Com, managing servers and networks. His initial foray into Enterprise Software began in 1999 at enCommerce, which was later acquired by Entrust. He worked at Sun Microsystems from 2005 to 2008 architecting and deploying identity solutions for customers using Sun Java System Identity products. He recently joined Layer 7 Technologies as a senior solution architect. He can be reached at jgershater@layer7tech.com. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== September 17th 2008  ==&lt;br /&gt;
&lt;br /&gt;
The web hacking incident database (WHID) 2007 Report is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. The database classifies each reported attack by, among other criteria, the method used, the outcome of the attack and the industry and the country of the attacked organization. Based on the database Breach Labs which sponsors WHID issues a periodical report on trends in Web Application Security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
By providing answers to questions such as: &lt;br /&gt;
&lt;br /&gt;
*The drivers behind Web hacking. &lt;br /&gt;
*The technology hackers use. &lt;br /&gt;
*The types of organizations attacked most often. &lt;br /&gt;
*The common outcomes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The presentation will discuss WHID statistics, focusing on rising trends in Web Attacks in the 1st half of 2008. As the WHID enables research into the business model behind hacking, the presentation goes beyond discussing the technical aspects of attacks such as SQL injection crawlers and Web Site herding, to discussing the business model common to all of the attacks: Economy of scale. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is a recognized security thought leader and evangelist who frequently speaks with the media and industry groups. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;He is the director of application security at Breach Security. He is also a faculty member for the SANS Institute, where his duties include instructor/courseware developer for Apache Security/Building a Web Application Firewall Workshop, Top 20 Vulnerabilities Team Member and Local Mentor for the SANS Track 4, &amp;quot;Hacker Techniques, Exploits and Incident Handling&amp;quot; course. He holds six SANS Global Information Assurance Certifications (GIAC): Intrusion Analyst (GCIA), Systems and Network Auditor (GSNA), Forensic Analyst (GCFA), Incident Handler (GCIH), Unix Security Administrator (GCUX) and Security Essentials (GSEC). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Mr. Barnett also serves as the team lead for the Center for Internet Security Apache Benchmark Project and is a member of the Web Application Security Consortium. His web security book, &amp;quot;Preventing Web Attacks with Apache,” was published by Addison/Wesley in 2006. &lt;br /&gt;
&lt;br /&gt;
== August 19th 2008  ==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't Write Your Own Security Code&amp;quot; – Application security is arguably the most difficult IT challenge facing organizations today. There are over 600 different categories of vulnerabilities to avoid and they are all tricky. Most of these problems are related to the design, implementation, and use of a relatively small set of security controls. To solve this problem for developers, Jeff created the OWASP ESAPI project – a clean intuitive toolbox of the core security building blocks that every web developer needs. In this talk, Jeff will show you how to create an ESAPI for your organization that will solve the OWASP Top Ten vulnerabilities, increase assurance, and dramatically cut costs all at the same time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Jeff Williams is the founder and CEO of Aspect Security, specializing in application security services. Jeff also serves as the volunteer Chair of the Open Web Application Security Project (OWASP). Jeff has made extensive contributions to the application security community through OWASP, including the Top Ten, WebGoat, Stinger, Secure Software Contract Annex, Enterprise Security API, and the local chapters program. Jeff holds advanced degrees in psychology, computer science, and human factors, and graduated cum laude from Georgetown Law.&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88131</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=88131"/>
				<updated>2010-08-27T22:51:27Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Edited the blurb for Justin Searle&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|468x60px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(238,235,226); color: black&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;width: 100%; background: none transparent scroll repeat 0% 0%; -moz-background-inline-policy: continuous&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang.'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border-bottom: rgb(204,204,204) 0px solid; border-left: rgb(204,204,204) 0px solid; width: 100%; color: rgb(0,0,0); font-size: 95%; border-top: rgb(204,204,204) 0px solid; border-right: rgb(204,204,204) 0px solid&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0,0,0); font-size: 95%&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Dave Wichers: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn how to use the latest Samurai-WTF open source tools and the be shown the latest techniques to perform web application assessments. After a quick overview of pen testing methodology, the instructor will lead you through the penetration and exploitation of three different web applications, and the browsers connecting to them. Different sets of open source tools will be used on each web application, allow you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a fourth web application that contains keys you must find and collect. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence necessary to perform web application assessments and expose you to the wealth of freely available open source tools.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
Instructor: Justin Searle: InGuardians [[Image:InGuardians.png|36x39px]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Jeff Williams: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This class will will cover the full range of tools and documentation that OWASP provides under free and open licenses. When the class is complete, students will be familiar with a wide range of tools and techniques to test web applications. &lt;br /&gt;
The class will include a DVD of OWASP tools and documentation for testing web applications. Additionally, the DVD will include the OWASP Web Testing Environment. OWASP WTE is a collection of tools and documentation for testing web applications available both as a bootable Live CD and virtual machines. Attendees to this class will receive a customized version of OWASP WTE. It will be provided as a virtual machine which includes the tools, documentation and the applications tested during class. It is a self-contained environment to learn web application testing the students can take from class to further hone their testing skills. &lt;br /&gt;
&lt;br /&gt;
Students are encouraged to bring a laptop to class. The virtualization software for OWASP WTE runs on Windows, OS X and Linux. Students with a laptop can follow along with the in class demonstrations to get hands on testing experience &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Instructors: Matt Tesauro and Charles Henderson: [[Image:TrustwaveLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 07:30-08:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:30-08:45 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:45-9:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 9:30-10:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:15-10:35 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF kick-off (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:35-11:20 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | TBD&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:20-11:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:30-12:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:15-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:30-14:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:15-14:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:25-15:10 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs &amp;amp;amp; Michael Anderson, NetSPI''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:30-16:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | OWASP State of the Union, ''Tom Brennan, OWASP''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:15-16:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:25-17:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen, TBD...Moderator: Stuart Schwartz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:00-09:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:00-09:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:15-10:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:00-10:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:10-10:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:55-11:15 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:15-12:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:00-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:15-14:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:05-14:50 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | ''Symantec – Edward Bonver''&amp;lt;br&amp;gt;''Principal Software Engineer (moderator)&amp;lt;br&amp;gt;Symantec – Kelly FitzGerald&amp;lt;br&amp;gt;Senior Vulnerability Analyst&amp;lt;br&amp;gt;Microsoft – Katie Moussouris&amp;lt;br&amp;gt;Senior Security Strategist&amp;lt;br&amp;gt;Cigital – John Stephen&amp;lt;br&amp;gt;Senior Director&amp;lt;br&amp;gt;HP, TippingPoint -Daniel Holden&amp;lt;br&amp;gt;Director, DVLabs'' &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:50-15:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Defining the Identiy Management Framework, ''Richard Tychansky, Jim Molini, Hord Tipton, and Mike Kilroy''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:55-16:05 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:05-16:50 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Ibmneg blurgb.jpg]] [[Image:Fortify logo AppSec Research 2010.png]] &amp;amp;nbsp; &amp;amp;nbsp;[[Image:TrustwaveLogo.jpg]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Fishnet Logo AppSec.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Acunetix logo 200.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Barracuda Color Logo.jpg]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Cenziclogo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Cigital-hor-color.JPG|120x65px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fujitsu-red-opt-b-150x56.gif|150x56px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Netspi logo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Whitehat security logo.gif]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Imperva Logo.gif]]&amp;lt;br&amp;gt;[[Image:Aspect logo owasp.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:AppSecDC2009-Sponsor-aod.gif]]&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Mavituna.jpg]] &amp;lt;br&amp;gt;[[Image:Sponsors-radware.jpg]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:Denim Group Logo.gif]] &lt;br /&gt;
&lt;br /&gt;
== Organizational Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Eccouncil.jpg]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:ISSA-LA icon.jpg]] &lt;br /&gt;
&lt;br /&gt;
=== Reception Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
=== Coffee Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=87879</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=87879"/>
				<updated>2010-08-23T19:29:43Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: updated for updating Vuln Management Panel.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|468x60px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(238,235,226); color: black&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;width: 100%; background: none transparent scroll repeat 0% 0%; -moz-background-inline-policy: continuous&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang.'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border-bottom: rgb(204,204,204) 0px solid; border-left: rgb(204,204,204) 0px solid; width: 100%; color: rgb(0,0,0); font-size: 95%; border-top: rgb(204,204,204) 0px solid; border-right: rgb(204,204,204) 0px solid&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0,0,0); font-size: 95%&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Dave Wichers: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
This course will focus on using open source tools to perform web application assessments.&amp;amp;nbsp; The course will take attendees through the process of application assessment using the open source tools included in the Samurai Web Testing Framework Live CD (Samurai-­‐WTF).&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Day one will take students through the steps and open source tools used to assess application for vulnerabilities.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Day two will focus on the exploitation of web app vulnerabilities, spending half the day on server side attacks and the other half of the day on client side attacks.&amp;amp;nbsp; The latest tools and techniques will be used throughout the course, including several tools developed by the trainers themselves&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
Instructor: Jason Searle: InGuardians [[Image:InGuardians.png|36x39px]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Jeff Williams: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This class will will cover the full range of tools and documentation that OWASP provides under free and open licenses. When the class is complete, students will be familiar with a wide range of tools and techniques to test web applications. &lt;br /&gt;
The class will include a DVD of OWASP tools and documentation for testing web applications. Additionally, the DVD will include the OWASP Web Testing Environment. OWASP WTE is a collection of tools and documentation for testing web applications available both as a bootable Live CD and virtual machines. Attendees to this class will receive a customized version of OWASP WTE. It will be provided as a virtual machine which includes the tools, documentation and the applications tested during class. It is a self-contained environment to learn web application testing the students can take from class to further hone their testing skills. &lt;br /&gt;
&lt;br /&gt;
Students are encouraged to bring a laptop to class. The virtualization software for OWASP WTE runs on Windows, OS X and Linux. Students with a laptop can follow along with the in class demonstrations to get hands on testing experience &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Instructors: Matt Tesauro and Charles Henderson: [[Image:TrustwaveLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 07:30-08:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:30-08:45 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:45-9:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 9:30-10:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:15-10:35 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF kick-off (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:35-11:20 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | TBD&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:20-11:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:30-12:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:15-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:30-14:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:15-14:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:25-15:10 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:30-16:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | OWASP State of the Union, ''Tom Brennan, OWASP''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:15-16:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:25-17:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen, TBD...Moderator: Stuart Schwartz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:00-09:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:00-09:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:15-10:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:00-10:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:10-10:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:55-11:15 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:15-12:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:00-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:15-14:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:05-14:50 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | ''Symantec – Edward Bonver''&amp;lt;br&amp;gt;''Principal Software Engineer (moderator)&amp;lt;br&amp;gt;Symantec – Kelly FitzGerald&amp;lt;br&amp;gt;Senior Vulnerability Analyst&amp;lt;br&amp;gt;Microsoft – Katie Moussouris&amp;lt;br&amp;gt;Senior Security Strategist&amp;lt;br&amp;gt;Cigital – John Stephen&amp;lt;br&amp;gt;Senior Director&amp;lt;br&amp;gt;HP, TippingPoint -Daniel Holden&amp;lt;br&amp;gt;Director, DVLabs''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:50-15:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Defining the Identiy Management Framework, ''Richard Tychansky, Jim Molini, Hord Tipton, and Mike Kilroy''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:55-16:05 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:05-16:50 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Ibmneg blurgb.jpg]] [[Image:Fortify logo AppSec Research 2010.png]] &amp;amp;nbsp; &amp;amp;nbsp;[[Image:TrustwaveLogo.jpg]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Fishnet Logo AppSec.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Acunetix logo 200.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Barracuda Color Logo.jpg]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Cenziclogo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Cigital-hor-color.JPG|120x65px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fujitsu-red-opt-b-150x56.gif|150x56px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Netspi logo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Whitehat security logo.gif]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Imperva Logo.gif]]&amp;lt;br&amp;gt;[[Image:Aspect logo owasp.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:AppSecDC2009-Sponsor-aod.gif]]&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Mavituna.jpg]] &amp;lt;br&amp;gt;[[Image:Sponsors-radware.jpg]] &lt;br /&gt;
&lt;br /&gt;
== Organizational Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Eccouncil.jpg]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:ISSA-LA icon.jpg]] &lt;br /&gt;
&lt;br /&gt;
=== Reception Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
=== Coffee Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=87878</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=87878"/>
				<updated>2010-08-23T19:26:08Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: removed an extra CR from doc.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|468x60px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(238,235,226); color: black&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;width: 100%; background: none transparent scroll repeat 0% 0%; -moz-background-inline-policy: continuous&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang.'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border-bottom: rgb(204,204,204) 0px solid; border-left: rgb(204,204,204) 0px solid; width: 100%; color: rgb(0,0,0); font-size: 95%; border-top: rgb(204,204,204) 0px solid; border-right: rgb(204,204,204) 0px solid&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0,0,0); font-size: 95%&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Dave Wichers: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
This course will focus on using open source tools to perform web application assessments.&amp;amp;nbsp; The course will take attendees through the process of application assessment using the open source tools included in the Samurai Web Testing Framework Live CD (Samurai-­‐WTF).&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Day one will take students through the steps and open source tools used to assess application for vulnerabilities.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Day two will focus on the exploitation of web app vulnerabilities, spending half the day on server side attacks and the other half of the day on client side attacks.&amp;amp;nbsp; The latest tools and techniques will be used throughout the course, including several tools developed by the trainers themselves&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
Instructor: Jason Searle: InGuardians [[Image:InGuardians.png|36x39px]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Jeff Williams: [[Image:Aspect logo.gif]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This class will will cover the full range of tools and documentation that OWASP provides under free and open licenses. When the class is complete, students will be familiar with a wide range of tools and techniques to test web applications. &lt;br /&gt;
The class will include a DVD of OWASP tools and documentation for testing web applications. Additionally, the DVD will include the OWASP Web Testing Environment. OWASP WTE is a collection of tools and documentation for testing web applications available both as a bootable Live CD and virtual machines. Attendees to this class will receive a customized version of OWASP WTE. It will be provided as a virtual machine which includes the tools, documentation and the applications tested during class. It is a self-contained environment to learn web application testing the students can take from class to further hone their testing skills. &lt;br /&gt;
&lt;br /&gt;
Students are encouraged to bring a laptop to class. The virtualization software for OWASP WTE runs on Windows, OS X and Linux. Students with a laptop can follow along with the in class demonstrations to get hands on testing experience &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Instructors: Matt Tesauro and Charles Henderson: [[Image:TrustwaveLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 07:30-08:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:30-08:45 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:45-9:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 9:30-10:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:15-10:35 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF kick-off (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:35-11:20 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | TBD&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:20-11:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:30-12:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:15-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:30-14:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:15-14:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:25-15:10 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:30-16:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | OWASP State of the Union, ''Tom Brennan, OWASP''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:15-16:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:25-17:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen, TBD...Moderator: Stuart Schwartz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:00-09:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:00-09:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:15-10:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:00-10:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:10-10:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:55-11:15 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:15-12:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:00-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:15-14:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:05-14:50 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Panel Discussion: Vulnerability Lifecycle for Software Vendors, ''Kelly FitzGerald (Symantec), (US CERT), (Cigital), (Tipping Point) Moderator: Edward Bonver''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:50-15:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Defining the Identiy Management Framework, ''Richard Tychansky, Jim Molini, Hord Tipton, and Mike Kilroy''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:55-16:05 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:05-16:50 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Ibmneg blurgb.jpg]] [[Image:Fortify logo AppSec Research 2010.png]] &amp;amp;nbsp; &amp;amp;nbsp;[[Image:TrustwaveLogo.jpg]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Fishnet Logo AppSec.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Acunetix logo 200.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Barracuda Color Logo.jpg]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Cenziclogo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Cigital-hor-color.JPG|120x65px]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fujitsu-red-opt-b-150x56.gif|150x56px]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt;[[Image:Netspi logo.png]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Whitehat security logo.gif]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Imperva Logo.gif]]&amp;lt;br&amp;gt;[[Image:Aspect logo owasp.jpg]] &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; [[Image:AppSecDC2009-Sponsor-aod.gif]]&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:Mavituna.jpg]] &amp;lt;br&amp;gt;[[Image:Sponsors-radware.jpg]] &lt;br /&gt;
&lt;br /&gt;
== Organizational Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Eccouncil.jpg]] &amp;amp;nbsp; &amp;amp;nbsp;&amp;amp;nbsp; [[Image:ISSA-LA icon.jpg]] &lt;br /&gt;
&lt;br /&gt;
=== Reception Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
=== Coffee Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=87479</id>
		<title>Los Angeles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles&amp;diff=87479"/>
				<updated>2010-08-10T19:14:29Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: adding the august 2010 project&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Local News  ==&lt;br /&gt;
&lt;br /&gt;
Please follow [http://twitter.com/appsec2010 @appsec2010]for the latest updates on AppSec USA 2010 conference. &lt;br /&gt;
&lt;br /&gt;
http://www.AppSecUSA.org &lt;br /&gt;
&lt;br /&gt;
== Next&amp;amp;nbsp;Chapter Meeting: Wednesday, August 18th, 2010 from 7:30 PM - 9:30 PM (PT)  ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;br&amp;gt;DETER Project: Scientific, Safe and Simple&amp;amp;nbsp;CyberSecurity Research ===&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&lt;br /&gt;
900 Corporate Pointe&lt;br /&gt;
Culver City, CA 90230&amp;lt;/pre&amp;gt;&lt;br /&gt;
Please RSVP via Eventbrite ([http://owaspla.eventbrite.com/ http://owaspla.eventbrite.com/]) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Description:'''&amp;lt;br&amp;gt;As the Internet has become pervasive and our critical infrastructures inextricably tied to information systems, the risk for economic, social, and physical disruption due to the insecurities of information systems has increased immeasurably.&amp;amp;nbsp; Over the past 10 years there has been increased investment in research on cyber security technologies by U.S. government agencies and industry.&amp;amp;nbsp; However, a large-scale deployment of effective security technology is lacking. One important reason for this deficiency is the lack of an experimental infrastructure and rigorous scientific methodologies for development and testing next-generation cyber security technologies.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To address these shortcomings, the DETER project is creating the necessary infrastructure - testbeds, tools, and supporting processes - for national-scale experimentation on emerging security research and advanced development technologies for cyber defense.&amp;amp;nbsp; The DETER testbed, funded by the US Department of Homeland Security and the National Science Foundation has been operational since 2004. Today it hosts 400+ nodes at USC/ISI and UC Berkeley, and serves more than 1,200 users and 150 projects from all over the world. It is used for academic research and teaching, and for testing commercial products. It is accompanied by a set of experimentation tools and products that make experiment setup, monitoring and control easy even at large scales. The DETER project has further made advances in supporting very large scale experiments via testbed federations, and in supporting safe experimentation with risky&amp;lt;br&amp;gt;code.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The next generation of the DETER project plans major improvements in experimental processes to guarantee experimental validity, repeteabiiity and portability. It further plans improvements in operations to support an order of magnitude larger experiments than today. Finally, it plans to build effective community tools for exchange of code, data and ideas between its users which fosters closer collaborations. This talk will describe the current state of the DETER testbed, and our new efforts aimed at advancing the science of cyber security experimentation.. &lt;br /&gt;
&lt;br /&gt;
'''Speaker: &amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Dr. Jelena Mirkovic''' is a Computer Scientist at the USC Information Sciences Institute, which she joined in 2007. Prior to this she was an Assistant Professor at the Computer and Information Sciences Department, University of Delaware, 2003-2007. &amp;lt;br&amp;gt;She received her M.S. and Ph.D. from UCLA, and her B.S. in Computer Science and Engineering from the School of Electrical Engineering, University of Belgrade, Serbia.&amp;lt;br&amp;gt;Her current research is focused on scientific cyber security experimentation, safe sharing of network data, denial-of-service attacks and IP spoofing. Her research is funded by the National Science Foundation, the Department of Homeland Security and the Infosys Corporation.&lt;br /&gt;
&lt;br /&gt;
= Would you like to speak at an OWASP Los Angeles Meeting?  =&lt;br /&gt;
&lt;br /&gt;
Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Los Angeles meetings please submit your BIO and talk abstract via email to [mailto:tin.zaw@owasp.org Tin Zaw]. When we accept your talk, it will be required to use the Powerpoint [http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template]. &lt;br /&gt;
&lt;br /&gt;
= Archives of Previous Meetings  =&lt;br /&gt;
&lt;br /&gt;
A list of previous presentations conducted at the Los Angeles Chapter can be found [https://www.owasp.org/index.php/Los_Angeles_Previous_Presentations here]. &lt;br /&gt;
&lt;br /&gt;
= Los Angeles Chapter  =&lt;br /&gt;
&lt;br /&gt;
*[mailto:tin.zaw@owasp.org Tin Zaw] -- Chapter Leader and Chair &lt;br /&gt;
*[mailto:cassio@owasp.org Cassio Goldschmidt] -- Board Member &lt;br /&gt;
*[mailto:richard.greenberg@owasp.org Richard Greenberg] -- Board Member&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_2009,_2010&amp;diff=87478</id>
		<title>Los Angeles Previous Presentations 2009, 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Los_Angeles_Previous_Presentations_2009,_2010&amp;diff=87478"/>
				<updated>2010-08-10T19:03:44Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Adding Samy to the list of archives&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &amp;amp;nbsp;Previous Presentations  =&lt;br /&gt;
&lt;br /&gt;
== '''Wednesday, July 21, 2010 7:30PM'''  ==&lt;br /&gt;
&lt;br /&gt;
*'''&amp;lt;span style=&amp;quot;display: none&amp;quot; id=&amp;quot;1281462225310S&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/span&amp;gt;How I Met Your Girlfriend: Entirely New Classes of Web Attacks'''&lt;br /&gt;
&amp;lt;pre&amp;gt;'''Meeting Location&lt;br /&gt;
Symantec Corporation&lt;br /&gt;
900 Corporate Pointe&lt;br /&gt;
Culver City, CA 90230&amp;lt;/pre&amp;gt;&lt;br /&gt;
'''Description:&amp;lt;br&amp;gt;'''This includes using HTML5 client-side XSS (without XSS hitting the server!), and my newly discovered attacks on PHP session hijacking and random numbers (accurately guessing PHP session cookies), browser protocol confusion (turning a browser into an SMTP server), firewall and NAT penetration via Javascript (turning your router against you), remote iPhone Google Maps hijacking (iPhone penetration combined with HTTP man-in-the-middle), extracting extremely accurate geolocation information from a web browser (not using IP geolocation), and more. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Speaker: '''Samy Kamkar is best known for the Samy worm, the first XSS worm, infecting over one million users on MySpace in less than 24 hours. A co-founder of Fonality, Inc., an IP PBX company, Samy previously led the development of all top-level domain name server software and systems for Global Domains International (.ws), and worked for Penn State University developing AI-based psychometric personality assessment software. &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in network security, reverse engineering, and network gaming. When not strapped behind the Matrix, Samy can be found stunt driving, getting involved in local community service projects, and continuing his focus on staying out of jail. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Dinner Sponser: Citrix Systems&amp;lt;br&amp;gt;[[Image:Citrix Picture.jpg|80x80px|http://lacitrix.com]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''&amp;amp;nbsp; Wednesday, June 09, 2010 7:30PM'''&amp;lt;br&amp;gt; ==&lt;br /&gt;
&lt;br /&gt;
*Security Assertion Markup Language (SAML), Shibboleth Single SignOn System, and Shibboleth's role at University of Southern California&lt;br /&gt;
&amp;lt;pre&amp;gt;Meeting Location&lt;br /&gt;
Symantec Corporation&lt;br /&gt;
900 Corporate Pointe&lt;br /&gt;
Culver City, CA 90230&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Speaker: Brendan Bellina &amp;lt;br&amp;gt;Title: Identity Services Architect and Manager of Enterprise Middleware Identity Management at USC &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
NOTE: We are having this month meeting on the second Wednesday, instead of the regular third Wednesday, to avoid conflict with ISSA Summit scheduled on June 16. You can still register for the summit at the ISSA LA website (http://www.issa-la.org/Default.aspx?id=1088). &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Wednesday, April 21st, 2010 7:30PM''' ==&lt;br /&gt;
&lt;br /&gt;
*The intersection of social and technical attacks in Web 2.0 applications by Mike Bailey and Mike Murray&lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   Symantec Corporation&lt;br /&gt;
   900 Corporate Pointe&lt;br /&gt;
   Culver City, CA 90230&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Topic: The intersection of social and technical attacks in Web 2.0 applications &lt;br /&gt;
&lt;br /&gt;
Speakers: Mike Bailey and Mike Murray &lt;br /&gt;
&lt;br /&gt;
Mike Bailey is a senior security researcher at MAD Security and an application security specialist. While his research spans a wide variety of domains, it generally focuses on secure web application development, web application scanning and penetration testing, online privacy issues, network protocols and services, and how to break them. &lt;br /&gt;
&lt;br /&gt;
Mike has spoken throughout the country at different security conferences and shows, including Blackhat DC, Toorcon, Defcon and others. Aside from coming up with new and interesting ways to break web and client-side applications, he also puts those attacks into practice as a penetration tester. Currently, Mike is studying the intersection of social and technical attacks in Web 2.0 applications. He publishes his research on the MAD Security blog as well as at Skeptikal.org. &lt;br /&gt;
&lt;br /&gt;
Mike Murray has spent his entire career in information security and currently leads the delivery arm of MAD Security (MADSecInc.com). Mike is a co-founder of InfoSecLeaders.com where he writes and talks about the skills and strategies for building a long-term career in information security. Mike's on security careers have been seen at major conferences like RSA and Defcon. &lt;br /&gt;
&lt;br /&gt;
== '''Wednesday, March 17th, 2010 7:30PM''' ==&lt;br /&gt;
&lt;br /&gt;
*Mike Schrenk, author of &amp;quot;Webbots, Spiders, and Screen Scrapers&amp;quot;&lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   Symantec Corporation&lt;br /&gt;
   900 Corporate Pointe&lt;br /&gt;
   Culver City, CA 90230&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
BOOK PREVIEW: Webbots, Spiders, and Screen Scrapers SECOND EDITION &lt;br /&gt;
&lt;br /&gt;
Michael Schrenk will provide a preview of the largely expanded second edition of his book &amp;quot;Webbots, Spiders, and Screen Scrapers&amp;quot;. This second edition describes how technologies like JavaScript, AJAX and Flash challenge webbot developers and how those challenges are met. He will also talk about defeating CAPTCHAs, scalability and other related topics. &lt;br /&gt;
&lt;br /&gt;
Michael Schrenk is a software developer, author and instructor, who specializes in automated web browsing agents known as webbots. Michael uses the Internet in new and innovative (odd?) ways to provide competitive advantages for his clients in The US, Europe and Asia. &lt;br /&gt;
&lt;br /&gt;
He also helps journalists more effectively use computers to conduct online research through automation and by describing where and how to find otherwise hidden online information. No stranger to Europe--he's lived and worked for clients in Moscow and Madrid, Mike taught at the 2008 European Investigative Journalism Conference (Brussels Belgium), twice in 2009 he lectured at The Center for Investigative Journalism (London England) and later in 2009, he lead several sessions at the VVOJ Journalism conference (Utrecht The Netherlands). &lt;br /&gt;
&lt;br /&gt;
Last August, Mike made his fourth speaking appearance at the DEFCON computer hacking conference. Mike lives in sunny Las Vegas, Nevada (USA). You can contact him at http://www.schrenk.com or follow him on Twitter [http://twitter.com/mgschrenk @mgschrenk]. &lt;br /&gt;
&lt;br /&gt;
== '''&amp;amp;nbsp; Wednesday, February 24th, 2010 7:00PM''' ==&lt;br /&gt;
&lt;br /&gt;
*Cloud Computing Security: Raining on the Trendy New Parade&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Slides can be found [https://docs.google.com/fileview?id=0By_clZjtpXPwMWM0YWIyZDgtZmRkZC00YTZlLWE1MDEtNmU0N2Y3MzQwMTJh&amp;amp;hl=en here on Google Docs]. &lt;br /&gt;
&lt;br /&gt;
   Meeting Location&lt;br /&gt;
   AT&amp;amp;amp;T Interactive&lt;br /&gt;
   611 N. Brand Blvd., 5th Floor&lt;br /&gt;
   Glendale, CA&lt;br /&gt;
&lt;br /&gt;
Cloud computing is an unstoppable meme at the CIO level, and will dominate corporate IT planning for the next several years. Although they do offer the promise of cost savings for many organizations, the basic ideas behind abstracting out the corporate datacenter greatly complicates the tasks of securing and auditing these systems. While there has been excellent research into low-level hypervisor and virtualization bugs, there has been little public discussion of the “big picture” problems for cloud computing. These include virtualized network devices, browser same-origin issues, credential management and many interesting legal challenges. &lt;br /&gt;
&lt;br /&gt;
Our goal with this talk will be to explore the different attack scenarios that exist in the cloud computing world and to provide a comparison between the security models of the leading cloud computing platforms. We will discuss how current attacks against applications and infrastructure are changed with cloud computing, as well as introduce the audience to new types of vulnerabilities that are unique to cloud computing. Attendees will learn how to analyze the threat posed to them by cloud computing platforms as either providers or consumers of software built on these new platforms. Our platforms for discussion include Salesforce.com, Google Apps, Microsoft Office Live, Google AppEngine, Microsoft Azure, Amazon EC2, and Sun. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Alex Stamos is a founding partner of iSEC Partners, a strategic digital security organization. Alex is an experienced security engineer and consultant specializing in application security and securing large infrastructures, and has taught multiple classes in network and application security. &lt;br /&gt;
&lt;br /&gt;
He is a leading researcher in the field of web application and web services security and has been a featured speaker at top industry conferences such as Black Hat, CanSecWest, DefCon, SyScan, Microsoft BlueHat and OWASP App Sec. &lt;br /&gt;
&lt;br /&gt;
He holds a BS in Electrical Engineering and Computer Science from the University of California, Berkeley. &lt;br /&gt;
&lt;br /&gt;
== &amp;amp;nbsp; '''Wednesday, January 20th, 2010 7:30PM''' ==&lt;br /&gt;
&lt;br /&gt;
*Do VLANs allow for good application security?&lt;br /&gt;
&lt;br /&gt;
    Meeting Location&lt;br /&gt;
    [http://maps.google.com/maps?q=900+Corporate+Pointe,+90230&amp;amp;ie=UTF8&amp;amp;oe=UTF-8&amp;amp;ll=33.988385,-118.387041&amp;amp;spn=0.010284,0.014055&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=addr Symantec Corporation]&lt;br /&gt;
    900 Corporate Pointe&lt;br /&gt;
    Culver City, CA 90230&lt;br /&gt;
    Laguna Conference Room&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Virtual Local Area Networks (VLANs) are not a new concept, and can help any organization better control network access. I will present some of the previous issues identified, what was the root cause, and how these have been fixed in current technology. In addition we will talk about how this can help to enhance security in your environment, and what controls must be in place in order to implement such an environment. We will also touch on how this can complicate your application environment, but improve overall security. &lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when working with VMware, VLANs, and web applications, to ensure that these networks are secure, and what to look for to potentially pass audit criteria. I will also talk about where and how these controls have been implemented in order to protect thousands of users while accessing one of the most hostile networks in the world. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan, Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including, consulting, engineering and administration. He has performed security assessment projects for health care, nuclear, manufacturing, pharmaceutical, banking and educational sectors. As an active participant in the information security community, he volunteers at DEFCON where he designs and implements the Firewall and Network for what is said to be the most hostile network environment in the world. &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security groups both as a board member of OWASP MSP and DC612. His roots and experience come from working for a large enterprise banks, designing and managing enterprise security systems. In the more recent years he has been working as an Information Security Consultant to review the security and architecture of information computing environments. &lt;br /&gt;
&lt;br /&gt;
== '''&amp;amp;nbsp; Wednesday, December 16th, 2009 7:30PM''' ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/b/bc/Sutton_-_Pulling_The_Plug-Security_Risks_in_Next_Generation_Offline_Web_Apps_-_OWASP_LA_OC.pdf Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as Gears (formerly Google Gears) and the Database Storage &amp;amp;lt;http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage/&amp;amp;gt; functionality included in the emerging HTML 5 &amp;amp;lt;http://dev.w3.org/html5/spec/Overview.html&amp;amp;gt; specification. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications. &lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given web application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Michael Sutton,Vice President and security research at Zscaler, has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry. &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''&amp;amp;nbsp; Wednesday, November 18th, 2009 7:30PM''' ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/b/bc/Watching_software_run_11.18.09.pptx Watching Software Run with Brian Chess, Fortify Founder and Chief Scientist]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Now more than ever before, computer systems are vulnerable because software is vulnerable. No matter how good programmers get at making secure software, it will never be perfect—we will always have to contend with incomplete or inadequate code. Most efforts at living with bad code have focused on shoring it up from the outside: limiting network access (firewalls) or watching for suspicious behavior (intrusion detection). This talk takes a different perspective: we’ll look at methods for identifying and blunting the effects of software shortcomings from the inside by watching the software run. &lt;br /&gt;
&lt;br /&gt;
Modern languages like Java and C# are good for more than just programmers. They also provide a wealth of structured information when they execute. We can apply many same techniques developed for outside-in security, but at a finer granularity and with much more context. Along the way there is a lot to talk about: Where web application firewalls excel and where they fall down. Fuzzing vs. static analysis. The disappointments of both aspect oriented programming and building security in. Why nobody uses the Java Security model. Taking your security with you into the cloud. The reason SQL injection won’t go away. Revenge of the reference monitor. Why was Twitter’s security so bad? &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Brian Chess is a founder of Fortify Software and serves as Fortify's Chief Scientist, where his work focuses on practical methods for creating secure systems. His book, Secure Programming with Static Analysis, shows how static source code analysis is an indispensable tool for getting security right. Brian holds a Ph.D. in computer engineering from the University of California at Santa Cruz, where he studied the application of static analysis to the problem of finding security-relevant defects in source code. Before settling on security, Brian spent a decade in Silicon Valley working at huge companies and small startups. He has done research on a broad set of topics, ranging from integrated circuit design all the way to delivering software as a service. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, October 21st, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/c/ca/ISO27001_OWASPLA_Shankar_10212009.pdf Enabling Compliance Requirements using Information Security Management System (ISMS) Framework (ISO27001)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Growing threats and complex regulatory requirements emphasize the need for an effective Information Security Management System (ISMS) framework for an organization. Comprehensive and globally accepted standards like ISO27001 can help in protecting information assets and in enabling compliance requirements. ISO27001 provides an Information Security framework based on best practices and controls to ensure the confidentiality, integrity and availability of information assets. This presentation analyzes the possible synergies between the goals of Information Security Management System (ISMS) and the various compliance requirements, thus making the compliance efforts less complex. &amp;lt;br&amp;gt;Following are the key objectives of this presentation&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
*Provide an introduction to ISO27001 and its controls &lt;br /&gt;
*Discuss the implementation approach for an Information Security Management System (ISMS) framework &lt;br /&gt;
*Familiarize the audience with some common challenges in implementation &lt;br /&gt;
*Outline synergy between ISO27001 controls and some compliance requirements( PCI , etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Attendees will learn about ISO27001 Information Security Standard, ISMS implementation approach and how ISO27001 can be used in meeting various regulatory/compliance requirements like Sox, PCI etc. It will also help the attendees to improve the information security posture of the organization and provide an effective and efficient approach for handling various information security/compliance audits with less effort. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Shankar Subramaniyan has over 11 years of experience as a technology consulting and project management executive in the areas of IT Governance, Risk and Compliance (GRC), Business Continuity Planning and Network Design &amp;amp;amp; Architecture. He has thorough expertise on setting up Information Security Framework and Policies on the basis of industry standards such as ISO 27001. He has worked extensively on industry standards and best practices like BS7799 and ITIL. He also has good understanding and knowledge of various compliance requirements like PCI, Sox etc. Shankar' s experience includes IT audit, SOX remediation, ISMS (ISO27001) implementation, PCI compliance assessment, disaster recovery solution, enterprise risk management, designing IT security architecture and implementing ITIL processes. Shankar has rich experience in handling large projects and managing client relationships across corporate and educational sectors. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Wednesday, September 16th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;On August 5th of 2009, Federal prosecutors on Monday charged Albert Gonzales with the largest case of credit and debit card data theft ever in the United States: 130 million credit cards numbers by hacking into the systems of Heartland Payment Systems, the New Jersey-based card processing company, as well as Hannaford Brothers, 7-Eleven and two unnamed national retailers. Using a SQL-injection attack, the hackers installed malware on Hannaford Brothers. Hannaford was PCI compliant at the time they were compromise that lets question the validity of regulatory compliance frameworks, and specifically PCI standards as an effective method to reduce data breaches, identity theft, and the proliferation of credit card fraud. This presentation will further analyze how status quo security standards, such as PCI-DSS, as well as other policies, standards, and guidelines truly affect security risk mitigation efforts against cybercrime based threats. These traditional efforts will be compared to threat modeling workflows in order to demonstrate how real risk is mitigated under each scenario. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Cases for financial fraud will be anonymously presented to create a business case for application threat modeling as a viable methodology to drive improved application design and security risk mitigation. Threat modeling concepts will be elaborated in order to prove how application architecture walkthroughs via threat modeling improve the mitigation of cybercrime threats. Attacker motives and goals will be presented and incorporated into attack trees and it will show how attack libraries can be used to effectively identify application vulnerabilities and devise countermeasures in web application. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;From the risk analysis perspective, several attacks will be considered and highlighted, particularly attacks that represent a systemic impact to an organization or government (such as for example a distributed denial of service). &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Through the presentation of threat modeling scenarios, analyses and correlations will be drawn from the represented model(s) to attack patterns, associated and discovered security vulnerabilities, data sources, application topologies, and possible roles and permissions associated with the application environment. The purpose of the presentation is to demonstrate how application threat modeling can be used as part of a nouveau age form of security risk mitigation and overall application security. Data flow diagrams and application walkthroughs will enable audience members to witness how application threat modeling is an evolved form of security process engineering for improved application design and overall application security. The presentation will also demonstrate how threat modeling is capable of delivering critical business functions as well as in mitigating current and future cyber attacks, such as distributed denial of service, botnet driven-malware, spear phishing techniques, and more attacks that ultimately lead to identity and credit card fraud. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;From the point of view of current and future cybercrime risk mitigation, several different strategies for application threat modeling will be discussed as related to securing both the web application web and critical financial infrastructures, such as ATMs. Finally some emphasis will be given to countermeasures that provide for incident response, intelligence and forensics capabilities. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Presentation outline, defining all topics that will be covered: &lt;br /&gt;
&lt;br /&gt;
*Status quo of regulatory compliance in mitigating risk &lt;br /&gt;
*Threat modeling techniques for cybercrime threats &lt;br /&gt;
*Attack tree analysis for attack tree vectors &lt;br /&gt;
*Threat modeling for multi-channel fraud threat scenarios &lt;br /&gt;
*Cyber crime threats and application countermeasures via threat modeling &lt;br /&gt;
*Example of mitigation strategies for cybercrime and application of defense in depth for web applications&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Any supporting research/tools: &lt;br /&gt;
&lt;br /&gt;
*Threat models and attack trees &lt;br /&gt;
*Threat model are produced using the Microsoft™ threat modeling tool &lt;br /&gt;
*Public available cybercrime data will be presented and correlated&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Marco Morana serves as one of the leaders of OWASP (Open Web Application Security Project) organization where he is actively involved in evangelize on web application security through presentations at local chapter meetings in USA as well as internationally. Marco has recently been awarded a contract from Wiley Publishing to co-author a book on Application Threat Modeling. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Besides being the OWASP Cincinnati chapter lead, Marco is also active contributor to OWASP projects such as the application threat modeling methodology for secure coding guideline and the security testing guide (ver. 2 and 3). Besides contributing to OWASP, Marco works as Technology Information Security Officer for a large financial organization in North America with responsibilities in the definition of the organization web application security standards, management of application security assessments during the SDLC, threat-fraud analysis and training of software developers, project managers and architects on different topics related to application security. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In the past, Marco served as senior security consultant and independent consultant where his responsibilities included providing software security services for several clients in the financial and banking, telecommunications and commercial sector industry. Besides security consulting, Marco had a career as technologist in the security industry where he contributed to the design business critical security products currently being used by several FORTUNE 500 companies as well by the US Government. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Marco work on software security is referred in the 2007 State Of the Art report by the Information Assurance Technology Analysis Center (IATAC). Marco received the NASA’s Space Act Award in 1999 for the patenting the S/MIME SEP (Secure Email Plug-in) application. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Marco research work on application and software security is widely published on several magazines such as In-secure magazine, Secure Enterprise, ISSA Journal and the C/C++ Users journal. Marco’s ideas and strategies for writing secure software are posted on his blog: http://securesoftware.blogspot.com. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tony UcedaVelez has more than 10 years of hands-on security and technology experience and is a vocal advocate of security process engineering – a terminology that describes the design and development of secure processes and controls working symbiotically to a unique business workflow. Tony currenlty serves as Managing Director for an Atlanta based risk advisory firm that focuses on security strategy and delivering effective means for risk mitigation and security process engineering. He has worked and consulted for the Fortune 500, as well as federal agencies in the U.S on the topic of application security and security process engineering. His diverse background in software development, security architecture, and network security, coupled with his expertise in process engineering and security risk management has allowed Tony to be a recognized leader in developing strategic security solutions that are multi-faceted in their approach to addressing enterprise risk. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In the realm of application security, Tony is a threat modeling evangelist and has provided numerous talks domestically and globally on its many benefits and application. He has served as a guest mentor to teams participating in Kennesaw State University’s annual Cybercrime capture the flag event as well as a Cybercrime speaker for Southern Polytechnic University in Atlanta. He has also served as a guest speaker on the subject of application threat modeling during ISACA’s annual Geek Week event and has also served as a keynote speaker on the subject for ISACA’s Global Symposium web cast series. Additional articles include articles related to CoBIT and the ValIT model (ISACA’s Journal), application threat modeling within the SDLC (InSecureMagazine), and security process engineering for a ROSI (return on security investment) (Journal of Finance). He is currently finalizing a Wiley publishing book on Application Threat Modeling with Marco Morana. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Prior to VerSprite, Tony served as Sr. Director of Security Risk Management to a Fortune 50 organization where he led security assessments against global application environments. His work encompassed web application security testing, security architecture reviews, and analysis for business logic exploits. He applied effective ways to introduce the subject of application risk to information owners by effectively mapping them to causal factors for business. Previous to this role, he spent more than 5 years in the field of application security across other Fortune 500 organizations within the banking, telecom, and information service industry segments. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Tony currently leads the OWASP Atlanta Chapter, where he manages monthly workshops and events for the Atlanta web application security community. He also has developed a case study program for the Atlanta chapter in order to develop case studies with local Atlanta companies who are seeking to apply application threat modeling techniques within the SDLC and/ or incorporate the many OWASP produced tools and frameworks. Tony can be reached at tonyuv@versprite.com or tonyuv@owasp.org. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tuesday, August 25th, 2009 3:00PM  ==&lt;br /&gt;
&lt;br /&gt;
*OWASP Live CD Demo and Q&amp;amp;amp;A with Matt Tessauro&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Matt Tesauro will be in visiting our LA chapter and providing a quick demo of [http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project OWASP Live CD] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP Live CD. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Thursday, August 20th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*The Software Assurance Maturity Model (SAMM)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.opensamm.org/ The Software Assurance Maturity Model (SAMM)] is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. SAMM is an open and free project and has recently been added under the Open Web Application Security Project (OWASP) Foundation. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tuesday, July 21st, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Lock picks, BumpKeys, and Hackers oh my! How secure is your application?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;This talk will focus on physical security controls, weaknesses, and counter measures. I will present on what lock picking is, how bump keys work, and ways to subverting electronic locks. We will also go into what are good controls, and what is often overlooked when designing secure environments. Many of the topics covered apply to application security, as the methods for securing these devices is by using obscurity. In the application world with automated tools and scripts, this does not hold water for very long. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan, NetSPI has 10 years of computer security experience, including consulting, engineering, and administration. He has performed security assessment projects in the healthcare, nuclear, manufacturing, pharmaceutical, banking and educational sectors. &amp;lt;br&amp;gt;As an active participant in the information security community, he volunteers at DEFCON, where he designs and implements the firewall and network for what is said to be the most hostile network environment in the world. This network allows speakers, press, vendors, and others to gain access to the Internet, without being hacked. In his spare time he and his wife run the local DEFCON group, DC612 and participate in the Minneapolis OWASP chapter. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== June 24th, 2009 7:30PM  ==&lt;br /&gt;
&lt;br /&gt;
*Information Warfare: Past, Present and Future&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Information warfare is the composite use of psychological operations (PYOPS), military deception (MILDEC), operational security (OPSEC), computer network operations (CNO), and electronic warfare (EW) to control and disrupt information flow. Recently, interest in information war technologies, techniques and policy issues have increased, especially in the domain of CNO. Increased scrutiny over network operations is both legitimate and valid, as global commerce and military powers are integrated and dependent on the Internet for critical operations. This presentation will describe the five domains of information warfare, the past use of information warfare in the Gulf war and recent Cyber attacks on the Eastern European countries of Georgia and Estonia. Information will be presented on possible new directions of information warfare. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Mikhael Felker, CISSP-ISSEP has worked in a variety of roles including instructor, engineer, and researcher. He is currently employed by The Aerospace Corporation in the Information Assurance Technology Department, supporting Information Assurance (IA) for satellite systems. He is also an Instructor within the Computer &amp;amp;amp; Information Systems Division at UCLA Extension, teaching a course in networking. Actively involved in the Los Angeles security community, he is the Education Director for Los Angeles Chapter of Information Systems Security Association (ISSA), member and speaker of Information Systems Audit and Control Association (ISACA), and former Defense Sector Coordinator for InfraGard. Mikhael has published articles in IEEE Security &amp;amp;amp; Privacy, the ISSA Journal, Information Systems Control Journal, and SecurityFocus. He is a recipient of the Scholarship for Service Program (SFS) Fellowship, sponsored by the National Science Foundation and Department of Homeland Security (DHS). Mikhael completed his graduate work at Carnegie Mellon University with a Master's in Information Security Policy &amp;amp;amp; Management and Bachelor's at UCLA in Computer Science. He holds over 10 certifications in IT and Security. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== May 20th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*[http://video.google.com/videoplay?docid=2875886330538461390 Top Ten Web Hacking Techniques of 2008: &amp;quot;What's possible, not probable&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The polls are closed, votes are in, and we have the winners making up the Top Ten Web Hacking Techniques of 2008! The competition was fierce with the newest and most innovative web hacking techniques to the test. This session will review the top ten hacks from 2008 - what they indicate about the security of the web, what they mean for businesses, and what might be used against us soon down the road. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Jeremiah Grossman is the founder and CTO of WhiteHat Security. He is considered a world-renowned expert in Web security, is a co- founder of the Web Application Security Consortium, and was named to InfoWorld's Top 25 CTOs for 2007. Grossman is a frequent speaker at industry events including the Black Hat Briefings, RSA, CSI, HiTB, OWASP, ISSA, and a number of large universities. He has authored dozens of articles and white papers; is credited with the discovery of many cutting-edge attack and defensive techniques and is a co-author of XSS Attacks. Grossman is often quoted in the the business and technical press. Prior to WhiteHat, Grossman was an information security officer at Yahoo! &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== April 15th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*Cross Site Scripting, Exploits and Defenses&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For a long time, the impact of XSS vulnerabilities has been grossly underestimated. Recent compromises, such as the pro-Hillary [http://cyberinsecure.com/hacked-obama-site-redirects-visitors-to-clintons-site/ defacement] of Barack Obama's website, and a [http://www.securescience.net/twoubledtwitter.html Viral XSS in Twitter] demonstrated the impact of XSS vulnerabilities to the masses. &lt;br /&gt;
&lt;br /&gt;
During this presentation, David Campbell will demonstrate exactly how effective XSS vulns can be, and show you what you can do to protect yourself and your sites. &lt;br /&gt;
&lt;br /&gt;
This presentation was originally delivered to OWASP Colorado in May of 2008, and has been updated for this session. &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Image:DC_ED_OWASP_XSS_MAY2008_v1.0.pdf Slide deck from May '08 talk] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;David Campbell is an infosec veteran, with experience ranging from penetration testing for Fortune 100's to architecting security solutions for large multinational financials to consulting for government agencies. DC is presently chapter leader of OWASP Denver and is Principal Consultant at Electric Alchemy. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== March 12th, 2009  ==&lt;br /&gt;
&lt;br /&gt;
*NETWORK SECURITY DINNER WITH ISSA - CISO'S Security Dashboard Panel!!&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This month will be joining forces with ISSA to create the biggest netowork event for security professionals in Los Angeles for this year. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Agenda &lt;br /&gt;
&lt;br /&gt;
*5:30 p.m., Networking and tours of the antivirus facility &lt;br /&gt;
*6:30 p.m., Dinner &lt;br /&gt;
*7:30 p.m., CISO Panel&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Panelists &lt;br /&gt;
&lt;br /&gt;
*Robert J. Brown, CISSP, CISO WestCorp Credit Union &lt;br /&gt;
*Steve Haydostian, CISSP, Former CISO, Healthnet &lt;br /&gt;
*David Lam, CISSP, CISO, Stephen S. Wise &lt;br /&gt;
*Edward G. Pagett II, CISSP, CISO, Lender Processing Services, Inc. &lt;br /&gt;
*Mike O. Villegas, CISA, CISSP, Director of Information Security, Newegg.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Dinner Fees: &lt;br /&gt;
&lt;br /&gt;
*ISSA-LA members &amp;amp;amp; OWASP members - Pre-Register and Pay online: $25 &lt;br /&gt;
*ISSA-LA members &amp;amp;amp; OWASP members - Pay at the door: $30 &lt;br /&gt;
*Non-members - Pre-Register and Pay online: $30 &lt;br /&gt;
*Non-members - Pay at the door: $35&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;''Thanks to David Lam and Stan Stahl for agreeing to have OWASP joining this ISSA LA event!'' &lt;br /&gt;
&lt;br /&gt;
== February 18th 2009  ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Cloud Computing and Security] &amp;lt;br&amp;gt;The Cloud Computing and Software as a Service models are driving many companies to build innovative, scalable and cost effective alternatives to the traditional IT computing model. Even with the potential cost and scalability benefits of cloud computing, its use by more traditional enterprises has been retarded by the concerns of their professional security and audit staffs. In our experience these concerns are legitimate, and although surveys have shown that security is the #1 factor preventing adoption of cloud computing, there has been very little reliable discussion of the technical security risks inherent in the model and how engineers, sys-admins and architects can deal with these risks. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;In this session, we will explore the widely differing security models of the leading cloud computing providers, including Amazon, Google and Salesforce. We will also reveal the significant differences in operational and application security practices necessary to deal with a cloud computing environment. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Alex Stamos is a co-founder and Partner at iSEC Partners Inc., a strategic digital security organization. Alex is an experienced security engineer specializing in solving difficult problems in application security and is a leading researcher in the field of web application and mobile security. He has been a featured speaker at top industry conferences such as Black Hat, Web 2.0 Expo, CanSecWest, DefCon, SyScan, SD Best Practices, Microsoft BlueHat and OWASP App Sec. Alex is a contributing author to &amp;quot;Hacking Exposed: Web 2.0&amp;quot; and an author of the upcoming book &amp;quot;Mobile Application Security&amp;quot;, both from McGraw-Hill. He holds a BSEE from the University of California, Berkeley. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== January 28th 2009  ==&lt;br /&gt;
&lt;br /&gt;
Building Security into the Test Organization &amp;lt;br&amp;gt;The common approach to detecting web security issues is still the regular application of a post-release pen-test or tool based scan. These last minute examinations rarely live up to broader organizational goals; they can be difficult to repeat, measure, or optimize over time. Most of all they're expensive: they find bugs late in the lifecycle. This talk recommends moving security testing responsibility within the test team itself. The approach discussed will work with-or-without the existence of explicit security requirements. See how security testing has been applied at other organizations and how it might be customized for yours. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Ben Walther firmly believes testers have a wonderfully devious mindset, and has been promoting the idea of &amp;quot;security testing&amp;quot; at Cigital's clients, at OWASP events, and to any friends and relatives who will listen. To this end, with the aid of O'Reilly media, Ben Walther and Paco Hope recently published a book entitled the &amp;quot;Web Security Testing Cookbook.&amp;quot; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== December 10th 2008  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/7/79/OWASP-WASCAppSec2007SanJose_SamyWorm.ppt The MySpace Worm] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The most virulent worm in the history of the series of tubes known as the Internet. One of the most highly accessed websites ever [see comScore]. One of the most ostentatious hackers alive. Over one million victims. Less than 24 hours. Fueled only by Chipotle burritos. The MySpace Worm. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Samy will be recapping the story of the development, release and eventual future of the MySpace worm. The 24 hours that led up to over one million friends. The eventual downfall of the MySpace site for several hours. The non-malicious intent and humorous progression of the worm. The t-shirts. The copycats. The behind-the-scenes story of the Secret Service raid at Samy's home and office. The demise of Samy's legal use of computers, community service, restitution, high-risk offender probation, and rehabilitation. And where Samy is today.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar, software engineer and self-proclaimed playboy, is a meddler in the security and software realms. He is currently the Director of Engineering and co-founder of Fonality, Inc., an IP PBX startup located in Culver City. Previously, Samy led the development of all core top-level domain name server software and systems for Global Domains International (.ws). Prior to that, Samy worked with Penn State University developing psychometric personality assessment software with attention to artificial intelligence and bioinformatics. When not strapped behind the Matrix, Samy can be found performing parkour (free running), practicing urban escape artist maneuvers, or is found getting involved in local community service projects. In the past 10 years, Samy has focused on evolutionary and genetic algorithmic software development, Voice over IP software development, automated security and vulnerability research in the areas of network security, reverse engineering, and network gaming, and continues his focus in staying out of jail.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== November 19th 2008  ==&lt;br /&gt;
&lt;br /&gt;
A new web attack vector: [http://www.eweek.com/c/a/Security/Security-Researcher-to-Reveal-New-Web-Attack-Vector/ Script Fragmentation]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce a new web-based attack vector which utilizes client-side scripting to fragment malicious web content.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This involves distributing web exploits in a asynchronous manner to evade signature detection. Similar to TCP fragmentation attacks, which are still an issue in current IDS/IPS products, This attack vector involves sending any web exploit in fragments and uses the already existing components within the web browser to reassemble and execute the exploit.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Our presentation will discuss this attack vector used to evade both gateway and client side detection. We will show several proof of concepts containing common readily available web exploits.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Stephan Chenette is a Senior Security Researcher who helps lead Websense Security Labs working on malcode detection techniques. Mr. Chenette specializes in research tools ranging from kernel-land sandboxes, to static analysis scanners. He has released public analyses on various vulnerabilities and malware. Prior to joining Websense, Stephan was a security software engineer for 4 years working in research and product development at eEye Digital Security.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== October 29th 2008  ==&lt;br /&gt;
&lt;br /&gt;
Entitlements Management: Security and policies for SOA using XML appliances&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loosely coupled Web Services can be insecure as, by their very nature, are exposed to application consumers. Security built into XML appliances alleviates the developer with the burden of coding security and policies into their application, freeing the developer to concentrate on conding business processes. This evenings meeting will discuss SOA security challenges and introduce the Layer7 XML appliance that allows for dynamic policies to be configured on the fly using an intuitive user interface. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Jonathan Gershater’s career started at 3Com, managing servers and networks. His initial foray into Enterprise Software began in 1999 at enCommerce, which was later acquired by Entrust. He worked at Sun Microsystems from 2005 to 2008 architecting and deploying identity solutions for customers using Sun Java System Identity products. He recently joined Layer 7 Technologies as a senior solution architect. He can be reached at jgershater@layer7tech.com. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== September 17th 2008  ==&lt;br /&gt;
&lt;br /&gt;
The web hacking incident database (WHID) 2007 Report is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. The database classifies each reported attack by, among other criteria, the method used, the outcome of the attack and the industry and the country of the attacked organization. Based on the database Breach Labs which sponsors WHID issues a periodical report on trends in Web Application Security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
By providing answers to questions such as: &lt;br /&gt;
&lt;br /&gt;
*The drivers behind Web hacking. &lt;br /&gt;
*The technology hackers use. &lt;br /&gt;
*The types of organizations attacked most often. &lt;br /&gt;
*The common outcomes&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The presentation will discuss WHID statistics, focusing on rising trends in Web Attacks in the 1st half of 2008. As the WHID enables research into the business model behind hacking, the presentation goes beyond discussing the technical aspects of attacks such as SQL injection crawlers and Web Site herding, to discussing the business model common to all of the attacks: Economy of scale. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is a recognized security thought leader and evangelist who frequently speaks with the media and industry groups. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;He is the director of application security at Breach Security. He is also a faculty member for the SANS Institute, where his duties include instructor/courseware developer for Apache Security/Building a Web Application Firewall Workshop, Top 20 Vulnerabilities Team Member and Local Mentor for the SANS Track 4, &amp;quot;Hacker Techniques, Exploits and Incident Handling&amp;quot; course. He holds six SANS Global Information Assurance Certifications (GIAC): Intrusion Analyst (GCIA), Systems and Network Auditor (GSNA), Forensic Analyst (GCFA), Incident Handler (GCIH), Unix Security Administrator (GCUX) and Security Essentials (GSEC). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Mr. Barnett also serves as the team lead for the Center for Internet Security Apache Benchmark Project and is a member of the Web Application Security Consortium. His web security book, &amp;quot;Preventing Web Attacks with Apache,” was published by Addison/Wesley in 2006. &lt;br /&gt;
&lt;br /&gt;
== August 19th 2008  ==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Don't Write Your Own Security Code&amp;quot; – Application security is arguably the most difficult IT challenge facing organizations today. There are over 600 different categories of vulnerabilities to avoid and they are all tricky. Most of these problems are related to the design, implementation, and use of a relatively small set of security controls. To solve this problem for developers, Jeff created the OWASP ESAPI project – a clean intuitive toolbox of the core security building blocks that every web developer needs. In this talk, Jeff will show you how to create an ESAPI for your organization that will solve the OWASP Top Ten vulnerabilities, increase assurance, and dramatically cut costs all at the same time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Jeff Williams is the founder and CEO of Aspect Security, specializing in application security services. Jeff also serves as the volunteer Chair of the Open Web Application Security Project (OWASP). Jeff has made extensive contributions to the application security community through OWASP, including the Top Ten, WebGoat, Stinger, Secure Software Contract Annex, Enterprise Security API, and the local chapters program. Jeff holds advanced degrees in psychology, computer science, and human factors, and graduated cum laude from Georgetown Law.&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=87467</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=87467"/>
				<updated>2010-08-10T01:57:24Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: added a break.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|468x60px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
Register by August 15 midnight (Pacific time) and be eligible for drawing of 3 iPads.&amp;lt;br&amp;gt;You must be a paid attendee, must register via website (no POs) and must be present at end of the conference to win. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Apple-ipad-tablet.jpg|thumb|left]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(238,235,226); color: black&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;width: 100%; background: none transparent scroll repeat 0% 0%; -moz-background-inline-policy: continuous&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang. &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border-bottom: rgb(204,204,204) 0px solid; border-left: rgb(204,204,204) 0px solid; width: 100%; color: rgb(0,0,0); font-size: 95%; border-top: rgb(204,204,204) 0px solid; border-right: rgb(204,204,204) 0px solid&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0,0,0); font-size: 95%&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Dave Wichers: [http://www.aspectsecurity.com [[Image:&amp;amp;#124;Aspect_logo.gif]]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
This course will focus on using open source tools to perform web application assessments.&amp;amp;nbsp; The course will take attendees through the process of application assessment using the open source tools included in the Samurai Web Testing Framework Live CD (Samurai-­‐WTF).&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Day one will take students through the steps and open source tools used to assess application for vulnerabilities.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Day two will focus on the exploitation of web app vulnerabilities, spending half the day on server side attacks and the other half of the day on client side attacks.&amp;amp;nbsp; The latest tools and techniques will be used throughout the course, including several tools developed by the trainers themselves&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
Instructor: Jason Searle: InGuardians [[Image:InGuardians.png|36x39px]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Jeff Williams: [http://www.aspectsecurity.com [[Image:&amp;amp;#124;Aspect_logo.gif]]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Summary &lt;br /&gt;
Instructor: Matt Tesauro: [[Image:TrustwaveLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 07:30-08:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:30-08:45 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:45-9:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 9:30-10:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:15-10:35 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF kick-off (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:35-11:20 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | TBD&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:20-11:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:30-12:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:15-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:30-14:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:15-14:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:25-15:10 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:30-16:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | OWASP State of the Union, ''Tom Brennan, OWASP''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:15-16:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:25-17:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen, TBD...Moderator: Stuart Schwartz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:00-09:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:00-09:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:15-10:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:00-10:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:10-10:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:55-11:15 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:15-12:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:00-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:15-14:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:05-14:50 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Panel Discussion: Vulnerability Lifecycle for Software Vendors, ''Kelly FitzGerald (Symantec), (US CERT), (Cigital), (Tipping Point) Moderator: Edward Bonver''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:50-15:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Defining the Identiy Management Framework, ''Richard Tychansky, Jim Molini, Hord Tipton, and Mike Kilroy''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:55-16:05 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:05-16:50 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background: none transparent scroll repeat 0% 0%; color: white; -moz-background-inline-policy: continuous&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Platinum Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
| [File:Qualys-468-60.png] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| [[Image:Ibmneg blurgb.jpg]] &lt;br /&gt;
| [[Image:Fortify logo AppSec Research 2010.png]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| [[Image:Fishnet Logo AppSec.jpg]] &lt;br /&gt;
| [[Image:Acunetix logo 200.png]] &lt;br /&gt;
| [[Image:Barracuda Color Logo.jpg]] &lt;br /&gt;
| [[Image:Cenziclogo.png]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Cigital-hor-color.JPG|120px]] &lt;br /&gt;
| [[Image:Fujitsu-red-opt-b-150x56.gif]] &lt;br /&gt;
| [[Image:Netspi logo.png]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| [[Image:Isc2 logo.gif|120px]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=87466</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=87466"/>
				<updated>2010-08-10T01:56:32Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Adding Announcement of FREE IPADS!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|468x60px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
= Welcome to AppSec&amp;amp;nbsp;USA 2010  =&lt;br /&gt;
&lt;br /&gt;
Register by August 15 midnight (Pacific time) and be eligible for drawing of 3 iPads.&amp;lt;br&amp;gt;You must be a paid attendee, must register via website (no POs) and must be present at end of the conference to win. [[Image:Apple-ipad-tablet.jpg|thumb|left]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(238,235,226); color: black&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now! &lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes] &lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;width: 100%; background: none transparent scroll repeat 0% 0%; -moz-background-inline-policy: continuous&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang. &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border-bottom: rgb(204,204,204) 0px solid; border-left: rgb(204,204,204) 0px solid; width: 100%; color: rgb(0,0,0); font-size: 95%; border-top: rgb(204,204,204) 0px solid; border-right: rgb(204,204,204) 0px solid&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0,0,0); font-size: 95%&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Dave Wichers: [http://www.aspectsecurity.com [[Image:&amp;amp;#124;Aspect_logo.gif]]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
This course will focus on using open source tools to perform web application assessments.&amp;amp;nbsp; The course will take attendees through the process of application assessment using the open source tools included in the Samurai Web Testing Framework Live CD (Samurai-­‐WTF).&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Day one will take students through the steps and open source tools used to assess application for vulnerabilities.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Day two will focus on the exploitation of web app vulnerabilities, spending half the day on server side attacks and the other half of the day on client side attacks.&amp;amp;nbsp; The latest tools and techniques will be used throughout the course, including several tools developed by the trainers themselves&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
Instructor: Jason Searle: InGuardians [[Image:InGuardians.png|36x39px]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Jeff Williams: [http://www.aspectsecurity.com [[Image:&amp;amp;#124;Aspect_logo.gif]]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Summary &lt;br /&gt;
Instructor: Matt Tesauro: [[Image:TrustwaveLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 07:30-08:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:30-08:45 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:45-9:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 9:30-10:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:15-10:35 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF kick-off (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:35-11:20 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | TBD&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:20-11:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:30-12:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:15-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:30-14:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:15-14:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:25-15:10 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:30-16:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | OWASP State of the Union, ''Tom Brennan, OWASP''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:15-16:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:25-17:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen, TBD...Moderator: Stuart Schwartz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:00-09:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:00-09:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:15-10:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:00-10:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:10-10:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:55-11:15 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:15-12:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:00-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:15-14:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:05-14:50 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Panel Discussion: Vulnerability Lifecycle for Software Vendors, ''Kelly FitzGerald (Symantec), (US CERT), (Cigital), (Tipping Point) Moderator: Edward Bonver''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:50-15:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Defining the Identiy Management Framework, ''Richard Tychansky, Jim Molini, Hord Tipton, and Mike Kilroy''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:55-16:05 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:05-16:50 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background: none transparent scroll repeat 0% 0%; color: white; -moz-background-inline-policy: continuous&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Platinum Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
| [File:Qualys-468-60.png] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| [[Image:Ibmneg blurgb.jpg]] &lt;br /&gt;
| [[Image:Fortify logo AppSec Research 2010.png]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| [[Image:Fishnet Logo AppSec.jpg]] &lt;br /&gt;
| [[Image:Acunetix logo 200.png]] &lt;br /&gt;
| [[Image:Barracuda Color Logo.jpg]] &lt;br /&gt;
| [[Image:Cenziclogo.png]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Cigital-hor-color.JPG|120px]] &lt;br /&gt;
| [[Image:Fujitsu-red-opt-b-150x56.gif]] &lt;br /&gt;
| [[Image:Netspi logo.png]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| [[Image:Isc2 logo.gif|120px]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Apple-ipad-tablet.jpg&amp;diff=87465</id>
		<title>File:Apple-ipad-tablet.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Apple-ipad-tablet.jpg&amp;diff=87465"/>
				<updated>2010-08-10T01:51:40Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=87464</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=87464"/>
				<updated>2010-08-10T01:39:10Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Removing table of contents to make format like AppSec Brazil&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;[[Image:Appsec banner.png|468x60px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(238,235,226); color: black&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now!&lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes]&lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;width: 100%; background: none transparent scroll repeat 0% 0%; -moz-background-inline-policy: continuous&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang. &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border-bottom: rgb(204,204,204) 0px solid; border-left: rgb(204,204,204) 0px solid; width: 100%; color: rgb(0,0,0); font-size: 95%; border-top: rgb(204,204,204) 0px solid; border-right: rgb(204,204,204) 0px solid&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0,0,0); font-size: 95%&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Dave Wichers: [http://www.aspectsecurity.com [[Image:|Aspect_logo.gif]]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
This course will focus on using open source tools to perform web application assessments.&amp;amp;nbsp; The course will take attendees through the process of application assessment using the open source tools included in the Samurai Web Testing Framework Live CD (Samurai-­‐WTF).&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Day one will take students through the steps and open source tools used to assess application for vulnerabilities.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Day two will focus on the exploitation of web app vulnerabilities, spending half the day on server side attacks and the other half of the day on client side attacks.&amp;amp;nbsp; The latest tools and techniques will be used throughout the course, including several tools developed by the trainers themselves&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
Instructor: Jason Searle: InGuardians [[Image:InGuardians.png|36x39px]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Jeff Williams: [http://www.aspectsecurity.com [[Image:|Aspect_logo.gif]]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Summary &lt;br /&gt;
Instructor: Matt Tesauro: [[Image:TrustwaveLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 07:30-08:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:30-08:45 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:45-9:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 9:30-10:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:15-10:35 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF kick-off (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:35-11:20 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | TBD&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:20-11:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:30-12:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:15-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:30-14:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:15-14:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:25-15:10 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:30-16:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | OWASP State of the Union, ''Tom Brennan, OWASP''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:15-16:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:25-17:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen, TBD...Moderator: Stuart Schwartz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:00-09:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:00-09:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:15-10:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:00-10:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:10-10:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:55-11:15 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:15-12:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:00-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:15-14:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:05-14:50 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Panel Discussion: Vulnerability Lifecycle for Software Vendors, ''Kelly FitzGerald (Symantec), (US CERT), (Cigital), (Tipping Point) Moderator: Edward Bonver''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:50-15:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Defining the Identiy Management Framework, ''Richard Tychansky, Jim Molini, Hord Tipton, and Mike Kilroy''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:55-16:05 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:05-16:50 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background: none transparent scroll repeat 0% 0%; color: white; -moz-background-inline-policy: continuous&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Platinum Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
| [File:Qualys-468-60.png] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| [[Image:Ibmneg blurgb.jpg]] &lt;br /&gt;
| [[Image:Fortify logo AppSec Research 2010.png]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| [[Image:Fishnet Logo AppSec.jpg]] &lt;br /&gt;
| [[Image:Acunetix logo 200.png]] &lt;br /&gt;
| [[Image:Barracuda Color Logo.jpg]] &lt;br /&gt;
| [[Image:Cenziclogo.png]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Cigital-hor-color.JPG|120px]] &lt;br /&gt;
| [[Image:Fujitsu-red-opt-b-150x56.gif]] &lt;br /&gt;
| [[Image:Netspi logo.png]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| [[Image:Isc2 logo.gif|120px]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=87461</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=87461"/>
				<updated>2010-08-10T01:16:59Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: Just making the front page for AppSec California a little cleaner&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br&amp;gt;[[Image:Appsec banner.png|468x60px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(238,235,226); color: black&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;Training and Presentation Schedules Available Now!&lt;br /&gt;
&lt;br /&gt;
Training Days&amp;lt;br&amp;gt;Sept 7-8: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=Training_September_7th_.26_8th Schedule of Classes]&lt;br /&gt;
&lt;br /&gt;
Presentation Schedule&amp;lt;br&amp;gt;Sept 9th: [http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_9th Schedule of Talks]&amp;lt;br&amp;gt;Sept 10th:&amp;amp;nbsp;[http://www.owasp.org/index.php/AppSec_US_2010,_CA#tab=September_10th Schedule of Talks]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;width: 100%; background: none transparent scroll repeat 0% 0%; -moz-background-inline-policy: continuous&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang of Forrester Research added as keynote speaker for September 9. &lt;br /&gt;
&lt;br /&gt;
@chenxiwang tweets at http://twitter.com/chenxiwang. &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border-bottom: rgb(204,204,204) 0px solid; border-left: rgb(204,204,204) 0px solid; width: 100%; color: rgb(0,0,0); font-size: 95%; border-top: rgb(204,204,204) 0px solid; border-right: rgb(204,204,204) 0px solid&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0,0,0); font-size: 95%&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Dave Wichers: [http://www.aspectsecurity.com [[Image:|Aspect_logo.gif]]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
This course will focus on using open source tools to perform web application assessments.&amp;amp;nbsp; The course will take attendees through the process of application assessment using the open source tools included in the Samurai Web Testing Framework Live CD (Samurai-­‐WTF).&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Day one will take students through the steps and open source tools used to assess application for vulnerabilities.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Day two will focus on the exploitation of web app vulnerabilities, spending half the day on server side attacks and the other half of the day on client side attacks.&amp;amp;nbsp; The latest tools and techniques will be used throughout the course, including several tools developed by the trainers themselves&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
Instructor: Jason Searle: InGuardians [[Image:InGuardians.png|36x39px]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Jeff Williams: [http://www.aspectsecurity.com [[Image:|Aspect_logo.gif]]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This class teaches attendees how to fix security vulnerabilities in existing software. It provides a mix of discussion of project concerns for planning and managing remediation efforts with hands-on coding examples fixing specific vulnerabilities. Attendees will learn how to risk-rank vulnerabilities, estimate remediation tasks, perform coding fixes for vulnerabilities and demonstrate the effectiveness of fixes applied. The focus is on the practical: how to use limited resources to make significant improvements to the security of target applications. Code examples use the OWASP ESAPI Java and Microsoft Web Protection Library. Many classes teach developers how to build secure code from the ground up or teach security analysts how to test applications for security vulnerabilities. This class teaches developers and security analysts how to deal with their existing portfolio of insecure applications. &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Summary &lt;br /&gt;
Instructor: Matt Tesauro: [[Image:TrustwaveLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 07:30-08:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:30-08:45 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:45-9:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 9:30-10:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:15-10:35 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF kick-off (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:35-11:20 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | TBD&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:20-11:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:30-12:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | State of SSL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Threat Modeling Best Practices, ''Robert Zigweid, IOActive''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:15-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:30-14:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:15-14:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:25-15:10 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan, Trustwave's SpiderLabs''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:30-16:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | OWASP State of the Union, ''Tom Brennan, OWASP''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:15-16:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:25-17:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen, TBD...Moderator: Stuart Schwartz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:00-09:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:00-09:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:15-10:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:00-10:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:10-10:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:55-11:15 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:15-12:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Joe Basirico, Security Innovation''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:00-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:15-14:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:05-14:50 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Panel Discussion: Vulnerability Lifecycle for Software Vendors, ''Kelly FitzGerald (Symantec), (US CERT), (Cigital), (Tipping Point) Moderator: Edward Bonver''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:50-15:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Escalating Privileges through Database Trusts, ''Scott Sutherland and Antti Rantasaari, NetSPI''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Defining the Identiy Management Framework, ''Richard Tychansky, Jim Molini, Hord Tipton, and Mike Kilroy''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Breaking Web Browsers, ''Jeremiah Grossman, WhiteHat Security''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:55-16:05 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:05-16:50 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background: none transparent scroll repeat 0% 0%; color: white; -moz-background-inline-policy: continuous&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Platinum Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
| [File:Qualys-468-60.png] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| [[Image:Ibmneg blurgb.jpg]] &lt;br /&gt;
| [[Image:Fortify logo AppSec Research 2010.png]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| [[Image:Fishnet Logo AppSec.jpg]] &lt;br /&gt;
| [[Image:Acunetix logo 200.png]] &lt;br /&gt;
| [[Image:Barracuda Color Logo.jpg]] &lt;br /&gt;
| [[Image:Cenziclogo.png]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Cigital-hor-color.JPG|120px]] &lt;br /&gt;
| [[Image:Fujitsu-red-opt-b-150x56.gif]] &lt;br /&gt;
| [[Image:Netspi logo.png]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| [[Image:Isc2 logo.gif|120px]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=86743</id>
		<title>AppSec US 2010, CA</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_US_2010,_CA&amp;diff=86743"/>
				<updated>2010-07-20T19:24:18Z</updated>
		
		<summary type="html">&lt;p&gt;Kelly FitzGerald: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br&amp;gt;[[Image:Appsec banner.png|468x60px|AppSec USA 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 25%; background: rgb(240,230,140)&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.appsecusa.org/travel-and-venue.html Travel and Venue] &lt;br /&gt;
| style=&amp;quot;width: 25%; background: rgb(240,230,140)&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.appsecusa.org/become-a-sponsor.html Sponsor Information] &lt;br /&gt;
| style=&amp;quot;width: 25%; background: rgb(240,230,140)&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.appsecusa.org/volunteer-opportunities.html Volunteer Opportunities] &lt;br /&gt;
| style=&amp;quot;width: 25%; background: rgb(255,215,0)&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.appsecusa.org/register-now.html REGISTER NOW]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(238,235,226); color: black&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt;For complete information, please visit [http://www.appsecusa.org AppSec US 2010 Website] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;width: 100%; background: none transparent scroll repeat 0% 0%; -moz-background-inline-policy: continuous&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0,0,0)&amp;quot; | &lt;br /&gt;
'''Latest Updates:''' &lt;br /&gt;
&lt;br /&gt;
'''Training and conference agenda available''' &lt;br /&gt;
&lt;br /&gt;
'''Register now!''' Early-bird rates extended till July 31. &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border-bottom: rgb(204,204,204) 0px solid; border-left: rgb(204,204,204) 0px solid; width: 100%; color: rgb(0,0,0); font-size: 95%; border-top: rgb(204,204,204) 0px solid; border-right: rgb(204,204,204) 0px solid&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 110px; color: rgb(0,0,0); font-size: 95%&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Training September 7th &amp;amp;amp; 8th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T1. Web Security Testing - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This course is a deep dive into the world of web application security testing. It is designed to walk testers through every step of web application penetration testing, arming them with the knowledge and tools they will need to begin conducting their own security testing. The course will teach the participants how to think like a security engineer by creating and executing a security test plan. Participants will be exposed to common web application vulnerabilities, testing techniques and tools by a professional security tester. &lt;br /&gt;
The course includes a guided penetration test in which the students will execute security test with the help of the instructor.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Joe Basirico, Security Innovation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More About the Web Security Testing Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T2. Building Secure Ajax and Web 2.0 Applications - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | This two-day class will cover common Web 2.0 and AJAX security threats, vulnerabilities, and it will provide specific guidance on how to develop Web 2.0 applications to defend against these threats and vulnerabilities. &lt;br /&gt;
Training developers on secure coding practices offers one of highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Building Secure Ajax and Web 2.0 Applications Course enables developers to securely utilize Web 2.0 technologies in their web applications without introducing security issues. The course provides detailed examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and delivered in a very interactive manner. The course will use demonstrations, code examples, and spot-the-bug exercises to get developers engaged in the topic. Developers will leave with an understanding of how Ajax attacks work, the impacts of successful attacks, and what to do to defend against them.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Dave Wichers: [[Image:100px-Aspect Security Logo.jpg]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Building Secure Ajax and Web 2.0 Applications Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T3. Assessing and Exploiting Web Applications with Samurai - WTF - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
This course will focus on using open source tools to perform web application assessments.&amp;amp;nbsp; The course will take attendees through the process of application assessment using the open source tools included in the Samurai Web Testing Framework Live CD (Samurai-­‐WTF).&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Day one will take students through the steps and open source tools used to assess application for vulnerabilities.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Day two will focus on the exploitation of web app vulnerabilities, spending half the day on server side attacks and the other half of the day on client side attacks.&amp;amp;nbsp; The latest tools and techniques will be used throughout the course, including several tools developed by the trainers themselves&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | &lt;br /&gt;
Instructor: Jason Searle: InGuardian [[Image:InGuardians.png|36x40px]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T4. Application Security Leadership Essentials - 2-Days - $1350&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | In this two-day management session you’ll get an industry perspective of application security, understand the key vulnerabilities to applications, be able to analyze root cause, and provide practical and proven techniques in building out an application security initiative. This course gives executives and managers the education and practical guidance they need to ensure that software projects properly address security. The course is designed to provide a firm understanding of the importance of software security, the critical security activities required within the software development lifecycle, and how to efficiently manage security issues during development and maintenance. This understanding is reinforced through industry awareness, live demonstrations of commonly found application vulnerabilities and workgroup exercises allowing attendees to conduct capability assessments and recommend improvement plans.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Instructor: Jeff Williams: [[Image:100px-Aspect Security Logo.jpg]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [[Learn More about the Application Security Leadership Essentials Class]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T5. Software Security Remediation: How to Fix Application Vulnerabilities 1-Day - Sept 7th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Summary &lt;br /&gt;
Instructor: Dan Cornell: [[Image:AppSecDC2009-Sponsor-denim.gif]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; align=&amp;quot;center&amp;quot; | T6. Live CD 1-Day - Sept 8th- $675&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | Summary &lt;br /&gt;
Instructor: Matt Tesauro: [[Image:TrustwaveLogo.jpg]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(242,242,242)&amp;quot; | [http://www.appsecusa.org/register-now.html Click here to register]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== September 9th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 1 - September 9th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 07:30-08:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:30-08:45 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to OWASP AppSec US, 2010 (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:45-9:30 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Jeff Williams (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 9:30-10:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Chenxi Wang (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:15-10:35 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF kick-off (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:35-11:20 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | How I met your Girlfriend, ''Samy Kamkar''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Solving Real-World Problems with an Enterprise Security API (ESAPI), ''Chris Schmidt, ServiceMagic''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Microsoft Security Development Lifecycle for Agile Development, ''Nick Coblentz, AT&amp;amp;amp;T''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:20-11:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:30-12:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | State of SL on the Internet - 2010 Survey, Results and Conclusions, ''Ivan Ristic, Qualys''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Into the Rabbit Hole: Execution Flow-based Web Application Testing, ''Rafal Los, Hewlett-Packard''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Threat Modeling Best Practices, Robert Zigweid, IOActive&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:15-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:30-14:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: Bill Cheswick (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:15-14:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:25-15:10 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | P0w3d for Botnet CnC, ''Gunter Ollmann, Damballa''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Cloud Computing, A Weapon of Mass Destruction?, ''David Bryan''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Secure Coding Practices Quick Reference Guide, ''Keith Turpin, Boeing''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:30 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:30-16:15 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications, ''Dan Cornell, Denim Group''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Assessing, Testing and Validating Flash Content, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | OWASP State of the Union, ''Tom Brennan, OWASP''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:15-16:25 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:25-17:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Panel Discussion: Security Trends: Jeremiah Grossman, Robert Hansen, TBD...Moderator: Stuart Schwartz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== September 10th  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 80%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white&amp;quot; colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; | '''Conference Day 2 - September 10th, 2010''' &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; | Track 1 - Crystal Cove Auditorium &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; | Track 2 - Pacific Ballroom &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; | Track 3 - Doheny Beach&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 08:00-09:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:00-09:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Announcements (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 09:15-10:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: David Rice (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:00-10:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF (Emerald Bay)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:10-10:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Security Architecting Applications for the Cloud, ''Alex Stamos, iSEC Partners''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Unraveling Cross-Technology, Cross-Domain Trust Relations, ''Peleus Uhley, Adobe''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Real Time Application Defenses - The Reality of AppSensor &amp;amp;amp; ESAPI, ''Michael Coates, Mozilla,''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 10:55-11:15 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 11:15-12:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Reducing Web application Vulnerabilities: Moving from a Test-Dependent to Design-Driven development, ''Ed Adams, Security Innovation''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Session Management Security tips and Tricks, ''Lars Ewe, Cenzic''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | The Dark Side of Twitter: Measuring and Analyzing Malicious Activity on Twitter, ''Paul Judge, David Maynor, and Daniel Peck, Barracuda Labs''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 12:00-13:15 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 13:14-14:00 &lt;br /&gt;
| style=&amp;quot;width: 80%; background: rgb(252,252,150)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: HD Moore (Crystal Cove Auditorium)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:04-14:50 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Panal Discussion: Vulnerability Lifecycle for Software Vendors, ''Kelly FitzGerald (Symantec), (US CERT), (Cigital), (Tipping Point) Moderator: Edward Bonver''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Agile + Security = FAIL, ''Adrian Lane''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | Bug-Alcoholic 2.0 - Untamed World of Web Vulnerabilities, ''Aditya K. Sood, Armorize Technologies''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 14:50-15:10 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Coffee Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:10-15:55 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,133,122)&amp;quot; align=&amp;quot;left&amp;quot; | Exploiting Networks through Database Weaknesses, ''Scott Sutherland, NetSPI''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(188,165,122)&amp;quot; align=&amp;quot;left&amp;quot; | Defining the Identiy Management Framework, ''Richard Tychansky, Jim Molini, Hord Tipton, and Mike Kilroy''&amp;lt;br&amp;gt;&lt;br /&gt;
| style=&amp;quot;width: 30%; background: rgb(153,255,153)&amp;quot; align=&amp;quot;left&amp;quot; | ''TBD''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 15:55-16:05 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(194,194,194)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: rgb(123,138,189)&amp;quot; | 16:05-16:50 &lt;br /&gt;
| style=&amp;quot;width: 90%; background: rgb(242,242,242)&amp;quot; colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | Conference Wrap Up: AppSec US 2011 Location Announcement, CTF Results, Prizes&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec US 2010 Conference. Please refer to our [http://www.appsecusa.org/become-a-sponsor.html List of Sponsorship Opportunities]&amp;amp;nbsp;(or [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf PDF]). &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp; &amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;background: none transparent scroll repeat 0% 0%; color: white; -moz-background-inline-policy: continuous&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Platinum Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
| [File:Qualys-468-60.png] &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| [[Image:Ibmneg blurgb.jpg]] &lt;br /&gt;
| [[Image:Fortify logo AppSec Research 2010.png]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors ==&lt;br /&gt;
&lt;br /&gt;
| [[Image:AppSecDC2009-Sponsor-fishnet.gif]] &lt;br /&gt;
| [[Image:Acunetix logo 200.png]] &lt;br /&gt;
| [[Image:Barracuda Color Logo.jpg]] &lt;br /&gt;
| [[Image:Cenziclogo.png]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Cigital-hor-color.JPG|120px]] &lt;br /&gt;
| [[Image:Fujitsu-red-opt-b-150x56.gif]] &lt;br /&gt;
| [[Image:Netspi logo.png]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| [[Image:Isc2 logo.gif|120px]] &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors ===&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== REGISTER NOW  ====&lt;br /&gt;
&lt;br /&gt;
Click [http://www.appsecusa.org/register-now.html here]&amp;amp;nbsp; for registration information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.appsecusa.org/register-now.html http://www.appsecusa.org/register-now.html] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Kelly FitzGerald</name></author>	</entry>

	</feed>