<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Laberdale</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Laberdale"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Laberdale"/>
		<updated>2026-05-02T09:52:19Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Agenda&amp;diff=255479</id>
		<title>2019 BASC Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Agenda&amp;diff=255479"/>
				<updated>2019-10-15T16:00:47Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Add Steven Pelletier&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Agenda}}&lt;br /&gt;
&amp;lt;!-- --------------------------------------------------------------------&lt;br /&gt;
INSTRUCTIONS FOR EDITORS:&lt;br /&gt;
&lt;br /&gt;
Updating this agenda is a 3-step process. First you must convert the existing entries to the&lt;br /&gt;
new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to&lt;br /&gt;
fill in the data for the presentation. Third, miscellaneous details should be cleaned up.&lt;br /&gt;
&lt;br /&gt;
1) To convert a presentation to the new format:&lt;br /&gt;
  - Most importantly, look at the 10:00 time slot and use it as an example.&lt;br /&gt;
  - Find the time slot you want to modify.&lt;br /&gt;
  - If it already has the Presentation Agenda Template then you are done&lt;br /&gt;
  - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}}&lt;br /&gt;
  - Delete the text that is in the time slot already. This requires great care.&lt;br /&gt;
      You probably want to delete the lines that do not begin with a &lt;br /&gt;
      pipe (|) or an open curly ({).&lt;br /&gt;
  - Paste the text you copied into that time slot.&lt;br /&gt;
  - Replace the word &amp;quot;TYPE&amp;quot; with either &amp;quot;Presentation&amp;quot; or &amp;quot;Keynote&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2) To fill in the appropriate data:&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add&lt;br /&gt;
    the presentation's abstract. If you don't have an abstract,&lt;br /&gt;
    insert &amp;quot;Presentation abstract will be available shortly.&amp;quot;&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio.&lt;br /&gt;
    If you don't have bio information, just put the speaker's name into the page and &lt;br /&gt;
    and make their bio &amp;quot;Speaker information will be available shortly.&amp;quot;&lt;br /&gt;
    Until it presents a problem, list multiple speakers as one.&lt;br /&gt;
    For example, &amp;quot;John Boy &amp;amp; Grandpa&amp;quot;.&lt;br /&gt;
  - Find the right slot in the table.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined Presentation&amp;quot; text in the table&lt;br /&gt;
    with the presentation name __EXACTLY__ as it is on the presentation page.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined&amp;quot; text in the table&lt;br /&gt;
    with the speaker(s) name(s) __EXACTLY__ as it is on the bio page.&lt;br /&gt;
  &lt;br /&gt;
3) Clean up whatever needs cleaning up.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Presentations&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference&amp;lt;br/&amp;gt;Saturday, October 19, 2019'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 8:30-9:30 &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Breakfast and Registration'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.whitehatsec.com/ WhiteHat Security]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-09:50 &lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Opening Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2019_BASC_Homepage#Keynotes|The Internet Sucks. Should we replace it?]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2019_BASC_Homepage#Keynotes|Andy Ellis]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;!-- | colspan=&amp;quot;1&amp;quot; rowspan=&amp;quot;12&amp;quot; style=&amp;quot;width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''Capture the Flag&amp;lt;br/&amp;gt;Arena'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Vic Solem &amp;amp;amp;&amp;lt;br/&amp;gt;Phil Barrows'''&amp;lt;br/&amp;gt;MEI Security&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;DEFENDERS&amp;lt;br/&amp;gt;Jay Peak Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;ATTACKERS&amp;lt;br/&amp;gt;Bretton Woods Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;Command &amp;amp;amp; Control&amp;lt;br/&amp;gt;Cranmore Room --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | || align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Washington/Jefferson Room'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Adams Room'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|OWASP Serverless Top 10|Tal Melamed }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|An Intelligent Approach to Upgrading OSS Libraries|Madison Cool }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Critical Thinking in Cybersecurity|Kristin Dahl }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Security Culture Hacking: Disrupting the Security Status Quo|Chris Romeo }}&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:00-1:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Lunch'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.ordr.net/ Ordr]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Defending against the Acceleration of Client-Side Website Attacks|Aanand Krishnan }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Open Source Security on a Shoestring|Paulina Valdivieso }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|SAST Triage Tricks of the Trade - How to Triage Before the Universe Dies Out|Kristofer Duer &amp;amp;amp; Rashmi Patil }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Put that Cease and Desist Down: How to Train Your Org to Work with Hackers|Luke Tucker }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Automate or Die - DevSecOps in the Age of Software Supply Chain Attacks|Artie Jurgenson }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Finding Bugs Using Your Own Code: Machine Learning-based Inconsistent Code Detection|Mansour Ahmadi &amp;amp;amp; Reza Mirzazade Farkhani  }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|The User Experience of Information Security|Chris Chagnon &amp;amp;amp; Ryan LaMarche }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Identifying Malicious Android Applications in the Presence of Adversaries: A Cat-and-Mouse Game|Omid Mirzaei }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 5:00-5:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Social Time'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.nccgroup.trust/ NCC Group]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 5:30-6:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Closing Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2019_BASC_Homepage#Keynotes|Sandcastles in a Storm: Application Vulnerabilities and how they weaken our organizations]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2019_BASC_Homepage#Keynotes|Kevin Johnson]]'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Raffle'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Wrap Up'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Workshops =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Workshops&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference&amp;lt;br/&amp;gt;Saturday, October 19, 2019'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Attitash'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Monroe'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cannon'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Bretton Woods'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Jay Peak'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cranmore'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50 &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Resume_Agenda_Template|Session 1 }}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Workshop_Agenda_Template|Presentation|CMD+CTRL Cyber Range|Chad Holmes }} &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Workshop_Agenda_Template|Presentation|Capture Ever-Evolving Security Needs of Users with IKE &amp;amp; Proto-Research Persona Development|Prateek Jain &amp;amp;amp; Ryan LaMarche }}   &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Workshop_Agenda_Template|Presentation|The Ultimate Secure Coding Showdown|Brad Giguere &amp;amp;amp; Steven Pelletier }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Workshop_Agenda_Template|Presentation|How to Talk to Humans|Kitty Huang &amp;amp;amp; Roy Wattanasin }}  &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Workshop_Agenda_Template|Presentation|Zero to Hero: Intro to Web App Pentesting|Carson Owlett &amp;amp;amp; Gabrielle Hempel }} &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Resume_Agenda_Template|Session 2 }}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentaton_Agenda_Template|Workshop|AWS Cloud Security Fundamentals|Joshua Dow &amp;amp;amp; Rami McCarthy }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   {{2019_BASC:Presentaton_Agenda_Template|Workshop|Effective Threat Modeling with CTM|Izar Tarandach  }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Agenda}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=255478</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=255478"/>
				<updated>2019-10-15T15:58:32Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Add Steven Pelletier&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Mansour Ahmadi ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Mansour Ahmadi is a research associate at Northeastern University. Before coming to Northeastern, he obtained a PhD in Computer Engineering from the University of Cagliari in 2017. His research is mainly focused in applying machine learning methods for systems security problems, especially malware detection and classification, and vulnerability discovery. He co-authored over 10 scientific papers. Also, He is the lead developer of IntelliAV, which is the first on-device machine learning-based mobile malware detector. &lt;br /&gt;
&lt;br /&gt;
=== Chris Chagnon ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Chagnon is an ITSM Architect and developer who designs, develops, and maintains award-winning experiences for managing and carrying out the ITSM process. Chris has a Master of Science in Information Technology, and a bachelor’s degree in Visual Communications. In addition, Chris is a PhD Candidate studying Information Systems with a focus on user and service experience. As A Top 25 Thought Leader in ITSM, and an ALE IT Vanguard, Chris speaks nationally about the future of ITSM, practical applications of artificial intelligence and machine learning, gamification, continual service improvement, and customer service/experience. Follow Chris on Twitter @Chagn0n.&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Joshua Dow ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joshua Dow is a Security Consultant with NCC Group, joining the organization in Spring of 2019. Joshua has made contributions in his career as both a blue team practitioner and a red team operator. Joshua specializes in web application penetration testing, network penetration testing, and cloud security auditing. Joshua worked as a Senior Software Engineer prior to getting his start in Information Security.&lt;br /&gt;
&lt;br /&gt;
=== Kristofer Duer ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristofer Duer is the Lead Cognitive Researcher for AppScan Source. He has worked in the application security field for the last 8 years in the world of Static Application Security Testing (SAST) and researching language specific attack surfaces. His particular specialty deals with applying machine learning to solve some of the impossible problems which occur naturally in the world of SAST - namely Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).&lt;br /&gt;
&lt;br /&gt;
Outside of work he enjoys the gym, Disc Golf (super fun!) and spending time with his wife and two kids.&lt;br /&gt;
&lt;br /&gt;
=== Reza Mirzazade Farkhani ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Reza Mirzazade Farkhani is pursuing a PhD in Cybersecurity at Northeastern University. His research interests span a wide range of topics in systems security with a particular focus on software vulnerability detection, exploit mitigation techniques and binary analysis. Currently, Reza is focusing on developing novel techniques to protect applications against memory safety vulnerabilities. He is especially interested in new security features in ARM architecture to accelerate the performance and security of the current systems. &lt;br /&gt;
&lt;br /&gt;
=== Brad Giguere ===&lt;br /&gt;
'''Secure Code Warrior'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Brad Giguere is a Sales Engineer for Secure Code Warrior, a global security company that makes software development better and more secure. Giguere has worked in the technology and SAAS software industry for the majority of his career and is passionate about helping organizations better understand their business challenges and translating those into a solution tailored to meet their needs. He now focuses on empowering development teams to be the first line of defense in making security a highly visible piece of the SDLC.&lt;br /&gt;
&lt;br /&gt;
=== Gabrielle E. Hempel, CHTI ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for an institutional review board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as a penetration tester for Black Mirage while pursuing a certificate in Advanced Computer Security at Stanford. She continues to serve as a genetic scientist for NIH-regulated recombinant genetic studies, and serves as an instructor and mentor for a student cohort of cybersecurity analysts through Cybrary. She recently obtained her Certified Human Trafficking Investigator (CHTI) credentials through the McAfee Institute, and works with various law enforcement groups and task forces in order to combat human trafficking through digital forensics and analysis. Her area of expertise lies in GDPR/HIPAA/regulatory compliance and medical device security.&lt;br /&gt;
&lt;br /&gt;
=== Chad Holmes ===&lt;br /&gt;
'''Security Innovation'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chad Holmes is a Product Marketing Manager for Security Innovation with a focus on educating customers on emerging Cyber Range technologies and how they can improve security education within organizations. Prior to joining Security Innovation Chad was a Penetration Tester, Product Manager, Security Program Manager and team lead at Cigital, Veracode and Red Hat.&lt;br /&gt;
&lt;br /&gt;
=== Kitty Huang ===&lt;br /&gt;
'''Communications Trainer and Relationship Coach'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kitty Huang is an award-winning speaker who has led several fun and effective communication workshops at MIT, Harvard University, and corporate training events. She has worked as a copywriter at advertising agencies, a screenwriter for a television situation comedy, and a newspaper journalist. She is also a relationship coach. Her perceptive mind and creative approaches have successfully helped many individuals to solve problems in professional relationships and personal relationships.&lt;br /&gt;
&lt;br /&gt;
=== Robert Hurlbut ===&lt;br /&gt;
'''Bank of America'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Robert Hurlbut, is a Threat Modeling Architect / Lead at Bank of America. Robert is a Microsoft MVP for Developer Security and Technologies and holds the (ISC)2 CSSLP security certification. Robert has 30 years of industry experience in secure security, software architecture, and software development. He speaks at user groups, national and international conferences, and has provided training for many companies in the past. Robert is also a co-host of the Application Security Podcast (Twitter - @AppSecPodcast). Follow Robert on Twitter at @RobertHurlbut.&lt;br /&gt;
&lt;br /&gt;
=== Prateek Jain ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Prateek Jain is a UX researcher currently pursuing Ph.D. in Innovation with User Experience at Worcester Polytechnic Institute. His Ph.D. research focuses on User Experience. His research interests are augmented reality, internet of things (IoT), accessibility and persona development. He is working on multiple research projects focusing on the use of augmented reality and IoT to improve the user experience of products and services. Along with that, he is also working on developing and testing different persona frameworks to help organizations make effective design decisions.&lt;br /&gt;
&lt;br /&gt;
=== Artie Jurgenson ===&lt;br /&gt;
'''Sonatype'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Artie Jurgenson is a Solution Architect at Sonatype.  He spends his day to day working with companies small and large to apply the principles of DevSecOps and automation to their software development supply chains.  This stems from an intense distaste of performing the same procedures more than once.   Artie looks to resolve such redundancies both inside and out of his professional life which has led him down pursuits including: implementation of CI/CD toolchains and workflows from completely manual build/deploy processes, development and automation of crypto/forex trading algorithms, front-end test and deployment automation, container orchestration, API development, and computational scientific research optimized for supercomputer clusters.  Artie is happy to talk about any of the above at the reception.&lt;br /&gt;
&lt;br /&gt;
=== Aanand Krishnan ===&lt;br /&gt;
'''Tala Security'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Aanand Krishnan is the CEO and Founder of Tala Security.   Most recently he held senior technical roles at Symantec.  Aanand spent several years in M&amp;amp;A and investment banking  at Morgan Stanley and Dolby Labs acting as an adviser to leading security software, semiconductor and clean-tech companies. He started his career building high-speed optical networking products at Agilent Technologies. Aanand holds an MBA from Berkeley where he was a recipient of CJ White Fellowship, a Masters in Photonics and Optoelectronics from UC Santa Barbara where he was a QUEST Fellow and a Bachelors in Electrical Engineering with Honors from BITS, Pilani.&lt;br /&gt;
&lt;br /&gt;
=== Ryan LaMarche ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Ryan LaMarche is a digital transformation and design thinking expert that brings ideas to life with a focus on user experience, and smart system design. When Ryan isn’t building systems, he spends his time as a dual-enrolled Bachelor’s and Master’s student at Worcester Polytechnic Institute studying Computer Science and Innovation with UX. Ryan is also a founding member and CTO of Seldom Technologies where he works with companies to develop systems, applications, and websites and consult on process improvement in the ITSM space.&lt;br /&gt;
&lt;br /&gt;
=== Rami McCarthy ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rami McCarthy is a Security Consultant with NCC Group, joining with the acquisition of VSR in 2016. He's spent the past three years performing security assessments of all kinds, from SaaS products to cloud IoT platforms. In addition to client work, Rami has published research into misspelled security headers and Chromebook security. Rami got his start in security as an intern at a deep web threat analysis startup, and has a BS in CS from Northeastern University, with a concentration in cyber operations. He's currently working towards an MS from Brandeis University.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
In the past two years, Tal Melamed has been experimenting in offensive and defensive security for the serverless technology, as Head of Security Research at Protego Labs. He specializes in AppSec with more than 15 years of experience in security research and vulnerability assessment. Tal is also the leader and creator of the OWASP Serverless Top 10 and DVSA projects, and is a frequent speaker at security conferences, including DefCon, DerbyCon, OWASP, BSides and more. Follow Tal on Twitter at @_nu11p0inter&lt;br /&gt;
&lt;br /&gt;
=== Omid Mirzaei ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Omid Mirzaei is a postdoctoral research associate in the Systems Security Lab (SecLab) at Northeastern University, working with Prof. Engin Kirda. Prior to this, Omid was an assistant professor in Universidad Carlos III de Madrid. Also, he spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and he received his PhD degree in Computer Science from the same university. Omid's thesis was mainly focused on Android malware analysis and triage. Generally speaking, Omid is working and conducting research in computer and cyber security. However, he is particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, he is eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources. Previously and as an undergraduate student, Omid worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Omid also developed several intelligent systems and passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.&lt;br /&gt;
&lt;br /&gt;
=== Carson E. Owlett, OSCP CEH ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Carson is a graduate of Connecticut College, where he studied Computer Science and Slavic Studies. After graduating, he obtained his OSCP and CEH and did a brief stint doing research for DARPA. He then founded Black Mirage in 2019, where he serves as the CEO and Assessment Team Lead for penetration tests, and he has been working to implement programs for offensive security education.&lt;br /&gt;
&lt;br /&gt;
=== Rashmi Patil ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rashmi is passionate about software engineering and applying it to solve complex problems in day to day life. She has a diverse set of work experience through past research, internships and full-time work experience that has really helped others in understanding the broader picture. In her free time, she volunteers and conducts educational workshops to teach young high school girls about the importance of Cybersecurity and encourage them to pursue a career in Computer Engineering. &lt;br /&gt;
&lt;br /&gt;
=== Steven Pelletier ===&lt;br /&gt;
'''Secure Code Warrior'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Steven Pelletier is an Enterprise Account Executive for Secure Code Warrior. Secure Code Warrior is a global software security company that aims to make software development more secure by offering an interactive gamified training platform. After serving 10 years in the US military, he transitioned into the technology industry where he has helped organizations understand complex business requirements while implementing new solutions to help hit target KPIs and advance the organization's mission.&lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Izar Tarandach ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Izar Tarandach is Lead Product Security Architect at Autodesk inc.. Prior, he was the Security Architect for Enterprise Hybrid Cloud at Dell EMC, for long before a Security Consultant at the EMC Product Security Office. With more years than he’s willing to admit to in the information security arena, he is a member of SAFECode Technical Leadership Council and a founding contributor to the IEEE Center for Security Design. He holds a masters degree in Computer Science/Security from Boston University and has served &lt;br /&gt;
as an instructor in Digital Forensics at Boston University and in Secure Development at the University of Oregon.&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina Valdivieso is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
=== Roy Wattanasin ===&lt;br /&gt;
'''Information Security Professional'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Roy Wattanasin is a healthcare information security professional. You can find him on @wr0 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Workshops&amp;diff=255477</id>
		<title>2019 BASC Workshops</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Workshops&amp;diff=255477"/>
				<updated>2019-10-15T15:56:16Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Add Steven Pelletier&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Workshops}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
We would like to thank our workshop leaders for donating their time and effort to help make this conference successful.&lt;br /&gt;
&lt;br /&gt;
== All-Day Workshop ==&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|CMD+CTRL Cyber Range|Chad Holmes| | | }}&lt;br /&gt;
Want to test your skills in identifying web app vulnerabilities?  Join OWASP Boston and Security Innovation as members compete in [https://www.securityinnovation.com/training/cmd-ctrl-cyber-range-security-training/ CMD+CTRL] a web application cyber range where players exploit their way through hundreds of vulnerabilities that lurk in business applications today.  Success means learning quickly that attack and defense is all about thinking on your feet.&lt;br /&gt;
&lt;br /&gt;
For each vulnerability you uncover, you are awarded points. Climb the interactive leaderboard for a chance to win fantastic prizes! CMD+CTRL is ideal for development teams to train and develop skills, but anyone involved in keeping your organization’s data secure can play - from developers and managers and even CISOs. &lt;br /&gt;
&lt;br /&gt;
When you register for BASC and select to attend this CMD+CTRL Cyber Range workshop, a link will be provided so you can reserve your spot with Security Innovation. Spaces are limited. Register early to reserve your spot!    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Morning Workshops ==&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|The Ultimate Secure Coding Showdown|Brad Giguere and Steven Pelletier| | | }}&lt;br /&gt;
Are. You. Ready? Head to the AppSec battlefield and prove that you are the ultimate secure coding champion. Go head-to-head with your peers as you test your web application security knowledge of the OWASP Top 10. Strut your skills. Crush the competition. Score excellent prizes and take home the title of Secure Code Warrior!&lt;br /&gt;
&lt;br /&gt;
Players will be presented with a series of vulnerable code challenges that will ask them to identify the problem, locate the insecure code, and fix the vulnerability. Select from a range of software languages to complete the tournament, including Java EE, Java Spring, C# MVC, C# WebForms, Ruby on Rails, Python Django, Scala Play &amp;amp; Node.JS. It’s gamified, it’s relevant, but most of all - it’s fun.&lt;br /&gt;
&lt;br /&gt;
Watch as you earn points and climb to the top of the real-time leaderboard during the event. Prizes will be awarded to the top 3 point scorers, with one security superhero being crowned the ultimate Secure Code Warrior. Will it be you?&lt;br /&gt;
&lt;br /&gt;
Psst: Want to test your secure coding skills at your own pace, without the competition? You’re welcome to come along and join the fun.&lt;br /&gt;
&lt;br /&gt;
'''''Participants must bring a laptop.'''''  &lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Zero to Hero: Intro to Web App Pentesting|Carson Owlett and Gabrielle Hempel| | | }}&lt;br /&gt;
As more information and functionality moves to the internet, the interface between end users and web application servers becomes increasingly vulnerable. Because of these visible vulnerabilities, penetration testing skills are in high demand; however, courses catering to beginners and those wanting to get a “foot in the door” are scarce. In this workshop, you can utilize a custom environment and expertise in order to begin your journey into offensive security. We will focus on four areas of web application penetration testing: injection, XSS, XXE, and insecure deserialization. This course welcomes total beginners and will be largely oriented towards those wanting to build a foundation in web application pentesting. &lt;br /&gt;
&lt;br /&gt;
'''''Users should have a laptop equipped with BurpSuite.'''''&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Capture Ever-Evolving Security Needs of Users with IKE and Proto-Research Persona Development|Prateek Jain and Ryan LaMarche| | | }}&lt;br /&gt;
In this workshop, grounded in design thinking approach, we demonstrate the software platform IKE and its process framework for persona development, which facilitate a fast, effective, and relatively inexpensive way to inform design decisions, such as those needed to encourage and enable users to effectively utilize security features. The IKE software platform not only facilitates a deeper understanding of user needs but also provides a Key performance Indicator (KPI) that can measure an organizations’ performance in gauging its target market evolving security needs.&lt;br /&gt;
&lt;br /&gt;
Understanding customers and what their needs are is paramount to the success of any organization. In security and privacy industry, users and their needs vary drastically depending on various factors like age, education, technology use, etc. Persona development is one of the useful tools to capture these needs. It can reveal security needs, pain points, habits, security challenges, etc. of the user base. The traditional approach to persona development is rigorous but time-consuming and resource-intensive. It doesn't account for fast changes in the technological world of privacy and security. These personas become outdated as soon as they are developed. At UXDM lab, we created a unique approach to persona development. We also developed a software platform called IKE for developing and managing personas. IKE treats personas as living documents to make effective design decisions and to follow evolving user needs over time.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|How to Talk to Humans|Kitty Huang and Roy Wattanasin| | | }}&lt;br /&gt;
Do you feel frustrated sometimes trying to help non-technical users? Do you find it challenging asking for more resources from management? Effective communication can help IT professionals to be more productive and be heard. This workshop demonstrates communication skills through scenarios that IT security engineers encounter regularly. We will decode written and verbal scripts by technical engineers and translate them into a communication style that non-technical people can understand and appreciate.  These cases include asking for more resources from upper management, making a suggestion to implement better security, and verifying the legitimacy of an email with an employee. Excessive workload, pressing deadlines and the lack of support can make IT engineers feel exhausted, hopeless and frustrated. This workshop provides perspectives on viewing various work situations in a different light. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Workshops ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Threat Modeling Workshop|Robert Hurlbut| | | }}&lt;br /&gt;
&lt;br /&gt;
Threat modeling is a way of thinking about what could go wrong and how to prevent it. Instinctively, we all think this way in regards to our own personal security and safety. When it comes to building software, some software shops either skip the important step of threat modeling in secure software design or, they have tried threat modeling before but haven't quite figured out how to connect the threat models to real world software development and its priorities. Threat modeling should be part of your secure software design process. Using threat modeling and some principals of risk management, you can design software in a way that makes security one of the top goals, along with performance, scalability, reliability, and maintenance.&lt;br /&gt;
&lt;br /&gt;
Objective: In this workshop, attendees will be introduced to Threat Modeling, learn how to conduct a Threat Modeling session, learn how to use practical strategies in finding Threats and proposing Countermeasures, and learn how to apply Risk Management in dealing with the threats. Depending on time, we will go through 1 or 2 Real World Threat Modeling case studies. Finally, we will end the day with the latest updates in Threat Modeling process, tools, etc.&lt;br /&gt;
&lt;br /&gt;
'''''Laptop recommended for some labs, but not required.'''''&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Effective Threat Modeling with CTM|Izar Tarandach| | | }}&lt;br /&gt;
Recently Autodesk open-sourced our Continuous Threat Modeling methodology, which aims to enable product teams to threat model every story in a quick and focused manner in order to scale the ability of an organization to keep up with rapid product changes, and enable developers to acquire a security &amp;quot;muscle memory&amp;quot; ability to really infuse their practices with security design capabilities. &lt;br /&gt;
&lt;br /&gt;
In this course you will learn how to perform and enable Continuous Threat Modeling in your organization and provide support to the learning curve of your product teams as a security SME.&lt;br /&gt;
&lt;br /&gt;
CTM is available at https://github.com/Autodesk/continuous-threat-modeling&lt;br /&gt;
A threat-modeling-as-code tool will also be introduced, available at https://github.com/izar/pytm&lt;br /&gt;
&lt;br /&gt;
'''''If you are new to the discipline of Threat Modeling we highly advise participating in the earlier Threat Modeling Workshop by Robert Hurlbut in order to solidify your understanding of the subject.'''''&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|AWS Cloud Security Fundamentals|Joshua Dow and Rami McCarthy | | | }}&lt;br /&gt;
As comfort and familiarity with cloud computing is now more mainstream, companies are leaning more and more on cloud resources to host and run even their most-sensitive technical assets. With these new technologies/innovations come new (and old!) security concerns. In this workshop, we will take participants through a baseline understanding of cloud security - with a focus on AWS security fundamentals. &lt;br /&gt;
&lt;br /&gt;
First, we will briefly outline the cloud security model, the similarities across platforms, and the shared responsibility model that Amazon employs. From there, we will introduce participants to open-source tooling for AWS account auditing and hardening, including NCC's own ScoutSuite. We will provide access to an intentionally vulnerable AWS environment, to allow workshop attendees to follow along and explore misconfigurations with their own eyes. We also will support attendees who want to immediately dive into auditing their own AWS accounts/environments. &lt;br /&gt;
&lt;br /&gt;
Next, we'll highlight easy wins for AWS security, that the audience will be able to immediately apply to their own environments. Following that, we'll speak to Amazon's built-in security tooling, including:&lt;br /&gt;
&lt;br /&gt;
* Security Hub&lt;br /&gt;
* Trusted Advisor&lt;br /&gt;
* CloudTrail&lt;br /&gt;
* Inspector&lt;br /&gt;
* GuardDuty&lt;br /&gt;
* Macie (and why it's probably wrong for you!)&lt;br /&gt;
&lt;br /&gt;
We'll focus on actionable guidance to walk away and be able to use these tools to harden your own posture. Subsequently, we'll work with attendees through the misconfigurations that led to the Capital One breach, via the CloudGoat scenario. Wrapping up, we'll provide a easy to follow cheatsheet of best practices, easy wins, and open source tools that attendees can reference to improve their own environments.&lt;br /&gt;
&lt;br /&gt;
'''''Users should bring a laptop having: administrator privileges, at least 8GB of RAM, 10GB of free disk space, the latest version of 64-bit Virtualbox installed, and USB ports for copying data.'''''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template|Workshops}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Presentations&amp;diff=255457</id>
		<title>2019 BASC Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Presentations&amp;diff=255457"/>
				<updated>2019-10-14T19:01:53Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Fix Ahmadi description&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template|Presentations}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
We would like to thank our speakers for donating their time and effort to help make this conference successful.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|An Intelligent Approach to Upgrading OSS Libraries|Madison Cool| | | }}&lt;br /&gt;
Maintaining secure versions of third-party libraries is a repetitive and tedious task at best. At worst, with many interdependent internal projects (think microservices) and dozens of layers of transitive dependencies, it is a logistical nightmare. A top-down, ad hoc approach is often used to resolve vulnerable third-party libraries, prioritizing high-severity vulnerabilities or internal projects critical to business functions, but failing to address the larger impact of vulnerabilities. TraceLink is taking a different approach, utilizing the graph structure of interconnected projects to perform security upgrades in an informed order from the bottom up. This process aims to automate third-party library version maintenance as much as possible, aiding in the completion of vital security upgrades and compounding the effects of each individual upgrade to reduce overall work done.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|OWASP Serverless Top 10|Tal Melamed| | | }}&lt;br /&gt;
In moving to serverless, we shift some security responsibilities to the infrastructure provider by eliminating the need to manage servers. Unfortunately, that doesn’t mean we’re entirely absolved of all security duties. Serverless functions still execute code and can still be vulnerable to application-level attacks. As a new type of architecture, serverless presents new security challenges. Some are equal to traditional application development, but some take a new form. Attackers are thinking differently, and developers must do so as well to gain the upper hand. &lt;br /&gt;
&lt;br /&gt;
In this talk, I will dive into the Top 10 risks of the OWASP Serverless Top 10 project. I will discuss why these risks are different from traditional attacks and how we should protect our application against them. I will also introduce OWASP DVSA, a deliberately vulnerable tool, aiming to assist both security professionals and developers to better understand the implications and processes of serverless security.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Security Culture Hacking: Disrupting the Security Status Quo|Chris Romeo| | | }}&lt;br /&gt;
This session is an exploration into the world of security culture hacking. In the wake of the “data breach of the day”, organizations claim they are more serious about security. The truth is that many still have weak security cultures. At the end of the day, how much actual security culture change occurs post-breach? The answer is not enough. This session describes how to change security culture from the inside out, utilizing best practices and real-world examples. With security culture disruption, the security team attempts to impact employees through positive security learning and experience.&lt;br /&gt;
&lt;br /&gt;
The session begins by introducing the audience to the concepts of security culture and security culture hacking, and then explains the security status quo. Security culture hacking is the skills and creativity necessary to disrupt an existing culture and redirect it towards a more secure future. Security status quo is the idea that companies move in a herd mentality and believe that their security must only be an average of their peers. To prove this point, we profile some anonymous organizations based on their external security story versus reality. Next, we’ll discuss what makes a good security culture hacker, including the skills required for success in this type of endeavor.&lt;br /&gt;
&lt;br /&gt;
The middle of this session includes a how-to of hacking security culture. Each section includes various tips and stories from real life experience about how to influence security culture. The phases of security culture improvement are explored, including awareness, big learning, and community. In addition, a discussion of organizational reach, marketing, rewards, recognition, and metrics surrounding security culture improvement are explored. It’s time to make security fun.&lt;br /&gt;
&lt;br /&gt;
At the conclusion, a plan is laid out for how a learner could put true security culture change into practice in their organization. Audience members receive a 30-60-90-1-year plan for how to implement true security culture change.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Critical Thinking in Cybersecurity|Kristin Dahl| | | }}&lt;br /&gt;
Security's most important skill is overlooked – critical thinking. Keeping up with the latest technical tools and trends is only one contributor to success. Security is a constantly evolving field. Long-term success requires that we think on our feet—regardless of technology—to understand tools and how to apply them to the changing landscape.&lt;br /&gt;
&lt;br /&gt;
We often do not think about critical thinking. What does it feel like? How is &amp;quot;critical&amp;quot; thinking different from &amp;quot;normal&amp;quot; thinking? How do you develop these skills?  And how do you apply them to security?&lt;br /&gt;
&lt;br /&gt;
Critical thinking is part art, part science. It takes a combination of intuition, logic, and creativity to understand the 'why' and not just the 'how.' It should help us address the root cause of an issue and not just the symptoms.  In security it means decomposing a problem, analyzing objectively, evaluating a hypothesis, and recognizing context. This session will explore how to apply critical thinking in your day-to-day job pulling from my experience and observations across academia, industry, and government.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Defending against the Acceleration of Client-Side Website Attacks|Aanand Krishnan| | | }}&lt;br /&gt;
The acceleration of attacks leading to the theft of private customer information, financial transaction data and disruptions to user experience are the number one threat to digital commerce. These attacks include first and third-party JavaScript/supply chain compromises, cross-site scripting (XSS), ad injections and other forms of client-side attacks. Client-side website attacks like Magecart have mostly targeted eCommerce sites with the sole purpose of stealing credit card info. Unfortunately, the reality is that the same attack vector – malicious JavaScript supply chain attacks – could be used to steal user banking credentials, PII data, healthcare data, or just about any information that users enter into a browser. Nearly every website is vulnerable. &lt;br /&gt;
Key Takeaways: Learn about the myriad of attack vectors threat-actors can leverage to compromise a website;&lt;br /&gt;
Learn about the standards-based, native website security controls most often recommended by security practitioners to secure your customer’s website experience; Learn about the compliance standards that require consideration for the website experience you provide to your customers.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Open Source Security on a Shoestring|Paulina Valdivieso| | | }}&lt;br /&gt;
Securing assets is a difficult job without the appropriate support, be it from your superiors or having access to resources: getting what you need can be challenging, but that is no excuse to not securing it. In small and medium companies where technology departments are service oriented, security is often overlooked in favor of ease of access, forcing IT to compromise on solutions and, potentially, leave the organization vulnerable.&lt;br /&gt;
&lt;br /&gt;
This talk will explore the open source and open access tools available to the public, their pros and cons, the elements to consider when implementing and the hurdles along the way, covering basic aspects of security in a company: incident response, application security, network security, training, risk &amp;amp; compliance, among others. Analysts, engineers and technicians whose many hats may result in security holes benefit from the implementation of these tools… and managers from knowing alternatives to the increasingly costly solutions in the market.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Put that Cease and Desist Down: How to Train Your Org to Work with Hackers|Luke Tucker| | | }}&lt;br /&gt;
Before that hacker slides into your brand’s DMs, how do you prepare your organization to talk to researchers and spot vulnerability disclosure? Today, poorly handled disclosures can cause the same reputational damage as a public security incident. As security continues to climb the ranks of importance, more decision makers and stakeholders are involved in interactions that were once solely owned by security teams. The vulnerability reports are coming. Ready or not. Everyone is on the front lines of security and this includes researcher interactions. Are your executives, legal, PR, and social media teams prepared?&lt;br /&gt;
&lt;br /&gt;
Based on hundreds of hacker and company mediation request, this talk will look at common and extreme scenarios many are seeing for the first time. We will cover real-world communication failures, as well as the success stories you will never read about. Attendees will walk away with armed with practical tips to prepare their colleagues for the inevitable vulnerability report, starting with hacker motivations, what disclosure success looks like, and de-escalation tips. This talk will cover: Responding to vulnerabilities reported via social media; How to minimize the chances of your vulnerabilities ending up on Twitter; Tips for keeping the press out of your bug reporting workflow; Prepare your company to talk to a hacker who is requesting cash; De-escalation tips to find a happy f@%#&amp;amp;$* ending when tempers flare and you are caught in the middle; and How to advocate for security researchers without losing friends or your job.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Identifying Malicious Android Applications in the Presence of Adversaries: A Cat-and-Mouse Game|Omid Mirzaei| | | }}&lt;br /&gt;
Android is by far the leading operating system in smartphones. As of March 2019, 51% of US smartphone subscribers were using a Google Android device. This percentage is much higher in an international scale. Also, there are currently more than 2 million Android applications on the official Google Market, known as Google Play. As most of the functionalities of smartphones are provided to users via applications, this huge market with billions of users is tempting for attackers to develop and distribute their malicious applications (or malware).&lt;br /&gt;
&lt;br /&gt;
Mobile malware has raised explosively since 2009. Symantec reported an increase of 54% in the new mobile malware variants in 2017 as compared to the previous year. This rise has happened for Android malware as well since only 20% of devices are running the newest major version of Android OS based on Symantec report in 2018. Thus, detecting malicious and potentially risky applications in the Android platform is of the utmost importance. During this talk, I will summarize different automated techniques proposed for Android malware detection and risk assessment. Along with this, I will discuss how adversaries have tried to bypass these mechanisms.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Automate or Die - DevSecOps in the Age of Software Supply Chain Attacks|Artie Jurgenson| | | }}&lt;br /&gt;
As nimble organizations deliver new innovations, adversaries are also upping their game; something we’ve seen in recent high profile and devastating cyber attacks. Bad actors have the intent and ability to exploit security vulnerabilities in the software supply chain - and in some cases plant vulnerabilities themselves. They have increased scale through automation and improved breach success through precision targeting. If we don’t fight back by doing the same - automating security directly in the DevOps pipeline - then we’ll always be at the hackers’ mercy. This session will provide new research on the above, and details on how to get started.&lt;br /&gt;
&lt;br /&gt;
Key takeaways: Real-world examples of how large and small companies are implementing DevSecOps practices in their own delivery pipelines, and increasing developer awareness to risks; Key insights from the 2019 DevSecOps community report - including the top investments for automated security; A walkthrough of how security principles have been automated into a CICD pipeline and what standards for implementation are beginning to follow suite; Why DevSecOps is more than a buzzword, and why it’s vital to protecting your software supply chain; How automating security of policies makes it harder to ignore.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Finding Bugs Using Your Own Code: Machine Learning-based Inconsistent Code Detection|Mansour Ahmadi and Reza Mirzazade Farkhani| | | }}&lt;br /&gt;
Machine learning has shown success in detecting known types of software vulnerabilities in recent years, but they mostly need extensive specimens to train their models. &lt;br /&gt;
&lt;br /&gt;
As a new alternative to such approaches, we present a learning-based technique that can identify potentially buggy code snippets which deviate from most of the code snippets implementing similar functionalities. Our approach learns from a codebase itself without the need for the cumbersome task of gathering and cleansing training samples. The core idea is that various kinds of bugs can be viewed as inconsistencies that deviate from non-buggy code that implement the same or similar logic.&lt;br /&gt;
&lt;br /&gt;
More specifically, we design a two-step clustering technique to find functionally-similar yet inconsistent code in software. We implemented our system on top of LLVM, which makes our approach language-agnostic.&lt;br /&gt;
&lt;br /&gt;
We evaluated our tool on 4 popular open source security software codebases, such as OpenSSL, OpenSSH, WolfSSL, and Mbedtls. Our tool discovered 10 new unique deep bugs, despite that some of these codebases are constantly undergoing vulnerability scans. All of the bugs have been confirmed by their developers and later fixed by either our pull requests or the developers.&lt;br /&gt;
&lt;br /&gt;
How does the system work really? How easy to find bugs by our approach and how much manual effort does it need? What is a proper code granularity for detecting inconsistencies?&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|SAST Triage Tricks of the Trade - How to Triage Before the Universe Dies Out|Kristofer Duer and Rashmi Patil| | | }}&lt;br /&gt;
Ever gotten a pile of SAST findings and wondered - what now? How do you possibly trim the fat of uninteresting findings down to a manageable set and get to work making the world a safer place? We will talk about some easy tips on how to prioritize and isolate those results which matter the most to your organization.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|The User Experience of Information Security|Chris Chagnon and Ryan LaMarche| | | }}&lt;br /&gt;
Targeted and increasingly sophisticated attacks are growing in popularity. With spear-phishing, ransomware, and a slew of other user-oriented attacks, our information security, particularly our operational security, relies on having our users on board. But training end-users can be difficult, and our response to mitigating these attacks can sometimes come at a great expense to UX. This session delves into the User Experience of Information Security, and provides attendees with insights into how some of our best laid security measures might actually increase our vulnerability to future attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template|Presentations}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=255444</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=255444"/>
				<updated>2019-10-14T15:58:51Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Fix Huang bio&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Mansour Ahmadi ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Mansour Ahmadi is a research associate at Northeastern University. Before coming to Northeastern, he obtained a PhD in Computer Engineering from the University of Cagliari in 2017. His research is mainly focused in applying machine learning methods for systems security problems, especially malware detection and classification, and vulnerability discovery. He co-authored over 10 scientific papers. Also, He is the lead developer of IntelliAV, which is the first on-device machine learning-based mobile malware detector. &lt;br /&gt;
&lt;br /&gt;
=== Chris Chagnon ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Chagnon is an ITSM Architect and developer who designs, develops, and maintains award-winning experiences for managing and carrying out the ITSM process. Chris has a Master of Science in Information Technology, and a bachelor’s degree in Visual Communications. In addition, Chris is a PhD Candidate studying Information Systems with a focus on user and service experience. As A Top 25 Thought Leader in ITSM, and an ALE IT Vanguard, Chris speaks nationally about the future of ITSM, practical applications of artificial intelligence and machine learning, gamification, continual service improvement, and customer service/experience. Follow Chris on Twitter @Chagn0n.&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Joshua Dow ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joshua Dow is a Security Consultant with NCC Group, joining the organization in Spring of 2019. Joshua has made contributions in his career as both a blue team practitioner and a red team operator. Joshua specializes in web application penetration testing, network penetration testing, and cloud security auditing. Joshua worked as a Senior Software Engineer prior to getting his start in Information Security.&lt;br /&gt;
&lt;br /&gt;
=== Kristofer Duer ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristofer Duer is the Lead Cognitive Researcher for AppScan Source. He has worked in the application security field for the last 8 years in the world of Static Application Security Testing (SAST) and researching language specific attack surfaces. His particular specialty deals with applying machine learning to solve some of the impossible problems which occur naturally in the world of SAST - namely Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).&lt;br /&gt;
&lt;br /&gt;
Outside of work he enjoys the gym, Disc Golf (super fun!) and spending time with his wife and two kids.&lt;br /&gt;
&lt;br /&gt;
=== Reza Mirzazade Farkhani ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Reza Mirzazade Farkhani is pursuing a PhD in Cybersecurity at Northeastern University. His research interests span a wide range of topics in systems security with a particular focus on software vulnerability detection, exploit mitigation techniques and binary analysis. Currently, Reza is focusing on developing novel techniques to protect applications against memory safety vulnerabilities. He is especially interested in new security features in ARM architecture to accelerate the performance and security of the current systems. &lt;br /&gt;
&lt;br /&gt;
=== Brad Giguere ===&lt;br /&gt;
'''Secure Code Warrior'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Brad Giguere is a Sales Engineer for Secure Code Warrior, a global security company that makes software development better and more secure. Giguere has worked in the technology and SAAS software industry for the majority of his career and is passionate about helping organizations better understand their business challenges and translating those into a solution tailored to meet their needs. He now focuses on empowering development teams to be the first line of defense in making security a highly visible piece of the SDLC.&lt;br /&gt;
&lt;br /&gt;
=== Gabrielle E. Hempel, CHTI ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for an institutional review board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as a penetration tester for Black Mirage while pursuing a certificate in Advanced Computer Security at Stanford. She continues to serve as a genetic scientist for NIH-regulated recombinant genetic studies, and serves as an instructor and mentor for a student cohort of cybersecurity analysts through Cybrary. She recently obtained her Certified Human Trafficking Investigator (CHTI) credentials through the McAfee Institute, and works with various law enforcement groups and task forces in order to combat human trafficking through digital forensics and analysis. Her area of expertise lies in GDPR/HIPAA/regulatory compliance and medical device security.&lt;br /&gt;
&lt;br /&gt;
=== Chad Holmes ===&lt;br /&gt;
'''Security Innovation'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chad Holmes is a Product Marketing Manager for Security Innovation with a focus on educating customers on emerging Cyber Range technologies and how they can improve security education within organizations. Prior to joining Security Innovation Chad was a Penetration Tester, Product Manager, Security Program Manager and team lead at Cigital, Veracode and Red Hat.&lt;br /&gt;
&lt;br /&gt;
=== Kitty Huang ===&lt;br /&gt;
'''Communications Trainer and Relationship Coach'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kitty Huang is an award-winning speaker who has led several fun and effective communication workshops at MIT, Harvard University, and corporate training events. She has worked as a copywriter at advertising agencies, a screenwriter for a television situation comedy, and a newspaper journalist. She is also a relationship coach. Her perceptive mind and creative approaches have successfully helped many individuals to solve problems in professional relationships and personal relationships.&lt;br /&gt;
&lt;br /&gt;
=== Robert Hurlbut ===&lt;br /&gt;
'''Bank of America'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Robert Hurlbut, is a Threat Modeling Architect / Lead at Bank of America. Robert is a Microsoft MVP for Developer Security and Technologies and holds the (ISC)2 CSSLP security certification. Robert has 30 years of industry experience in secure security, software architecture, and software development. He speaks at user groups, national and international conferences, and has provided training for many companies in the past. Robert is also a co-host of the Application Security Podcast (Twitter - @AppSecPodcast). Follow Robert on Twitter at @RobertHurlbut.&lt;br /&gt;
&lt;br /&gt;
=== Prateek Jain ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Prateek Jain is a UX researcher currently pursuing Ph.D. in Innovation with User Experience at Worcester Polytechnic Institute. His Ph.D. research focuses on User Experience. His research interests are augmented reality, internet of things (IoT), accessibility and persona development. He is working on multiple research projects focusing on the use of augmented reality and IoT to improve the user experience of products and services. Along with that, he is also working on developing and testing different persona frameworks to help organizations make effective design decisions.&lt;br /&gt;
&lt;br /&gt;
=== Artie Jurgenson ===&lt;br /&gt;
'''Sonatype'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Artie Jurgenson is a Solution Architect at Sonatype.  He spends his day to day working with companies small and large to apply the principles of DevSecOps and automation to their software development supply chains.  This stems from an intense distaste of performing the same procedures more than once.   Artie looks to resolve such redundancies both inside and out of his professional life which has led him down pursuits including: implementation of CI/CD toolchains and workflows from completely manual build/deploy processes, development and automation of crypto/forex trading algorithms, front-end test and deployment automation, container orchestration, API development, and computational scientific research optimized for supercomputer clusters.  Artie is happy to talk about any of the above at the reception.&lt;br /&gt;
&lt;br /&gt;
=== Aanand Krishnan ===&lt;br /&gt;
'''Tala Security'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Aanand Krishnan is the CEO and Founder of Tala Security.   Most recently he held senior technical roles at Symantec.  Aanand spent several years in M&amp;amp;A and investment banking  at Morgan Stanley and Dolby Labs acting as an adviser to leading security software, semiconductor and clean-tech companies. He started his career building high-speed optical networking products at Agilent Technologies. Aanand holds an MBA from Berkeley where he was a recipient of CJ White Fellowship, a Masters in Photonics and Optoelectronics from UC Santa Barbara where he was a QUEST Fellow and a Bachelors in Electrical Engineering with Honors from BITS, Pilani.&lt;br /&gt;
&lt;br /&gt;
=== Ryan LaMarche ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Ryan LaMarche is a digital transformation and design thinking expert that brings ideas to life with a focus on user experience, and smart system design. When Ryan isn’t building systems, he spends his time as a dual-enrolled Bachelor’s and Master’s student at Worcester Polytechnic Institute studying Computer Science and Innovation with UX. Ryan is also a founding member and CTO of Seldom Technologies where he works with companies to develop systems, applications, and websites and consult on process improvement in the ITSM space.&lt;br /&gt;
&lt;br /&gt;
=== Rami McCarthy ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rami McCarthy is a Security Consultant with NCC Group, joining with the acquisition of VSR in 2016. He's spent the past three years performing security assessments of all kinds, from SaaS products to cloud IoT platforms. In addition to client work, Rami has published research into misspelled security headers and Chromebook security. Rami got his start in security as an intern at a deep web threat analysis startup, and has a BS in CS from Northeastern University, with a concentration in cyber operations. He's currently working towards an MS from Brandeis University.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
In the past two years, Tal Melamed has been experimenting in offensive and defensive security for the serverless technology, as Head of Security Research at Protego Labs. He specializes in AppSec with more than 15 years of experience in security research and vulnerability assessment. Tal is also the leader and creator of the OWASP Serverless Top 10 and DVSA projects, and is a frequent speaker at security conferences, including DefCon, DerbyCon, OWASP, BSides and more. Follow Tal on Twitter at @_nu11p0inter&lt;br /&gt;
&lt;br /&gt;
=== Omid Mirzaei ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Omid Mirzaei is a postdoctoral research associate in the Systems Security Lab (SecLab) at Northeastern University, working with Prof. Engin Kirda. Prior to this, Omid was an assistant professor in Universidad Carlos III de Madrid. Also, he spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and he received his PhD degree in Computer Science from the same university. Omid's thesis was mainly focused on Android malware analysis and triage. Generally speaking, Omid is working and conducting research in computer and cyber security. However, he is particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, he is eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources. Previously and as an undergraduate student, Omid worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Omid also developed several intelligent systems and passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.&lt;br /&gt;
&lt;br /&gt;
=== Carson E. Owlett, OSCP CEH ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Carson is a graduate of Connecticut College, where he studied Computer Science and Slavic Studies. After graduating, he obtained his OSCP and CEH and did a brief stint doing research for DARPA. He then founded Black Mirage in 2019, where he serves as the CEO and Assessment Team Lead for penetration tests, and he has been working to implement programs for offensive security education.&lt;br /&gt;
&lt;br /&gt;
=== Rashmi Patil ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rashmi is passionate about software engineering and applying it to solve complex problems in day to day life. She has a diverse set of work experience through past research, internships and full-time work experience that has really helped others in understanding the broader picture. In her free time, she volunteers and conducts educational workshops to teach young high school girls about the importance of Cybersecurity and encourage them to pursue a career in Computer Engineering. &lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Izar Tarandach ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Izar Tarandach is Lead Product Security Architect at Autodesk inc.. Prior, he was the Security Architect for Enterprise Hybrid Cloud at Dell EMC, for long before a Security Consultant at the EMC Product Security Office. With more years than he’s willing to admit to in the information security arena, he is a member of SAFECode Technical Leadership Council and a founding contributor to the IEEE Center for Security Design. He holds a masters degree in Computer Science/Security from Boston University and has served &lt;br /&gt;
as an instructor in Digital Forensics at Boston University and in Secure Development at the University of Oregon.&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina Valdivieso is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
=== Roy Wattanasin ===&lt;br /&gt;
'''Information Security Professional'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Roy Wattanasin is a healthcare information security professional. You can find him on @wr0 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=255443</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=255443"/>
				<updated>2019-10-14T15:57:41Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Fix Mairzaei bio&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Mansour Ahmadi ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Mansour Ahmadi is a research associate at Northeastern University. Before coming to Northeastern, he obtained a PhD in Computer Engineering from the University of Cagliari in 2017. His research is mainly focused in applying machine learning methods for systems security problems, especially malware detection and classification, and vulnerability discovery. He co-authored over 10 scientific papers. Also, He is the lead developer of IntelliAV, which is the first on-device machine learning-based mobile malware detector. &lt;br /&gt;
&lt;br /&gt;
=== Chris Chagnon ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Chagnon is an ITSM Architect and developer who designs, develops, and maintains award-winning experiences for managing and carrying out the ITSM process. Chris has a Master of Science in Information Technology, and a bachelor’s degree in Visual Communications. In addition, Chris is a PhD Candidate studying Information Systems with a focus on user and service experience. As A Top 25 Thought Leader in ITSM, and an ALE IT Vanguard, Chris speaks nationally about the future of ITSM, practical applications of artificial intelligence and machine learning, gamification, continual service improvement, and customer service/experience. Follow Chris on Twitter @Chagn0n.&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Joshua Dow ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joshua Dow is a Security Consultant with NCC Group, joining the organization in Spring of 2019. Joshua has made contributions in his career as both a blue team practitioner and a red team operator. Joshua specializes in web application penetration testing, network penetration testing, and cloud security auditing. Joshua worked as a Senior Software Engineer prior to getting his start in Information Security.&lt;br /&gt;
&lt;br /&gt;
=== Kristofer Duer ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristofer Duer is the Lead Cognitive Researcher for AppScan Source. He has worked in the application security field for the last 8 years in the world of Static Application Security Testing (SAST) and researching language specific attack surfaces. His particular specialty deals with applying machine learning to solve some of the impossible problems which occur naturally in the world of SAST - namely Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).&lt;br /&gt;
&lt;br /&gt;
Outside of work he enjoys the gym, Disc Golf (super fun!) and spending time with his wife and two kids.&lt;br /&gt;
&lt;br /&gt;
=== Reza Mirzazade Farkhani ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Reza Mirzazade Farkhani is pursuing a PhD in Cybersecurity at Northeastern University. His research interests span a wide range of topics in systems security with a particular focus on software vulnerability detection, exploit mitigation techniques and binary analysis. Currently, Reza is focusing on developing novel techniques to protect applications against memory safety vulnerabilities. He is especially interested in new security features in ARM architecture to accelerate the performance and security of the current systems. &lt;br /&gt;
&lt;br /&gt;
=== Brad Giguere ===&lt;br /&gt;
'''Secure Code Warrior'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Brad Giguere is a Sales Engineer for Secure Code Warrior, a global security company that makes software development better and more secure. Giguere has worked in the technology and SAAS software industry for the majority of his career and is passionate about helping organizations better understand their business challenges and translating those into a solution tailored to meet their needs. He now focuses on empowering development teams to be the first line of defense in making security a highly visible piece of the SDLC.&lt;br /&gt;
&lt;br /&gt;
=== Gabrielle E. Hempel, CHTI ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for an institutional review board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as a penetration tester for Black Mirage while pursuing a certificate in Advanced Computer Security at Stanford. She continues to serve as a genetic scientist for NIH-regulated recombinant genetic studies, and serves as an instructor and mentor for a student cohort of cybersecurity analysts through Cybrary. She recently obtained her Certified Human Trafficking Investigator (CHTI) credentials through the McAfee Institute, and works with various law enforcement groups and task forces in order to combat human trafficking through digital forensics and analysis. Her area of expertise lies in GDPR/HIPAA/regulatory compliance and medical device security.&lt;br /&gt;
&lt;br /&gt;
=== Chad Holmes ===&lt;br /&gt;
'''Security Innovation'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chad Holmes is a Product Marketing Manager for Security Innovation with a focus on educating customers on emerging Cyber Range technologies and how they can improve security education within organizations. Prior to joining Security Innovation Chad was a Penetration Tester, Product Manager, Security Program Manager and team lead at Cigital, Veracode and Red Hat.&lt;br /&gt;
&lt;br /&gt;
=== Kitty Huang ===&lt;br /&gt;
'''Communications Trainer and Relationship Coach'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kitty Huang is an award-winning speaker who has led several fun and effective communication workshops at MIT, Harvard University, and corporate training events. She has worked as a copywriter at advertising agencies, a screenwriter for a television situation comedy, and a newspaper journalist. Her perceptive mind and creative approaches have successfully helped many individuals to solve problems in professional relationships and personal relationships. &lt;br /&gt;
&lt;br /&gt;
=== Robert Hurlbut ===&lt;br /&gt;
'''Bank of America'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Robert Hurlbut, is a Threat Modeling Architect / Lead at Bank of America. Robert is a Microsoft MVP for Developer Security and Technologies and holds the (ISC)2 CSSLP security certification. Robert has 30 years of industry experience in secure security, software architecture, and software development. He speaks at user groups, national and international conferences, and has provided training for many companies in the past. Robert is also a co-host of the Application Security Podcast (Twitter - @AppSecPodcast). Follow Robert on Twitter at @RobertHurlbut.&lt;br /&gt;
&lt;br /&gt;
=== Prateek Jain ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Prateek Jain is a UX researcher currently pursuing Ph.D. in Innovation with User Experience at Worcester Polytechnic Institute. His Ph.D. research focuses on User Experience. His research interests are augmented reality, internet of things (IoT), accessibility and persona development. He is working on multiple research projects focusing on the use of augmented reality and IoT to improve the user experience of products and services. Along with that, he is also working on developing and testing different persona frameworks to help organizations make effective design decisions.&lt;br /&gt;
&lt;br /&gt;
=== Artie Jurgenson ===&lt;br /&gt;
'''Sonatype'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Artie Jurgenson is a Solution Architect at Sonatype.  He spends his day to day working with companies small and large to apply the principles of DevSecOps and automation to their software development supply chains.  This stems from an intense distaste of performing the same procedures more than once.   Artie looks to resolve such redundancies both inside and out of his professional life which has led him down pursuits including: implementation of CI/CD toolchains and workflows from completely manual build/deploy processes, development and automation of crypto/forex trading algorithms, front-end test and deployment automation, container orchestration, API development, and computational scientific research optimized for supercomputer clusters.  Artie is happy to talk about any of the above at the reception.&lt;br /&gt;
&lt;br /&gt;
=== Aanand Krishnan ===&lt;br /&gt;
'''Tala Security'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Aanand Krishnan is the CEO and Founder of Tala Security.   Most recently he held senior technical roles at Symantec.  Aanand spent several years in M&amp;amp;A and investment banking  at Morgan Stanley and Dolby Labs acting as an adviser to leading security software, semiconductor and clean-tech companies. He started his career building high-speed optical networking products at Agilent Technologies. Aanand holds an MBA from Berkeley where he was a recipient of CJ White Fellowship, a Masters in Photonics and Optoelectronics from UC Santa Barbara where he was a QUEST Fellow and a Bachelors in Electrical Engineering with Honors from BITS, Pilani.&lt;br /&gt;
&lt;br /&gt;
=== Ryan LaMarche ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Ryan LaMarche is a digital transformation and design thinking expert that brings ideas to life with a focus on user experience, and smart system design. When Ryan isn’t building systems, he spends his time as a dual-enrolled Bachelor’s and Master’s student at Worcester Polytechnic Institute studying Computer Science and Innovation with UX. Ryan is also a founding member and CTO of Seldom Technologies where he works with companies to develop systems, applications, and websites and consult on process improvement in the ITSM space.&lt;br /&gt;
&lt;br /&gt;
=== Rami McCarthy ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rami McCarthy is a Security Consultant with NCC Group, joining with the acquisition of VSR in 2016. He's spent the past three years performing security assessments of all kinds, from SaaS products to cloud IoT platforms. In addition to client work, Rami has published research into misspelled security headers and Chromebook security. Rami got his start in security as an intern at a deep web threat analysis startup, and has a BS in CS from Northeastern University, with a concentration in cyber operations. He's currently working towards an MS from Brandeis University.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
In the past two years, Tal Melamed has been experimenting in offensive and defensive security for the serverless technology, as Head of Security Research at Protego Labs. He specializes in AppSec with more than 15 years of experience in security research and vulnerability assessment. Tal is also the leader and creator of the OWASP Serverless Top 10 and DVSA projects, and is a frequent speaker at security conferences, including DefCon, DerbyCon, OWASP, BSides and more. Follow Tal on Twitter at @_nu11p0inter&lt;br /&gt;
&lt;br /&gt;
=== Omid Mirzaei ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Omid Mirzaei is a postdoctoral research associate in the Systems Security Lab (SecLab) at Northeastern University, working with Prof. Engin Kirda. Prior to this, Omid was an assistant professor in Universidad Carlos III de Madrid. Also, he spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and he received his PhD degree in Computer Science from the same university. Omid's thesis was mainly focused on Android malware analysis and triage. Generally speaking, Omid is working and conducting research in computer and cyber security. However, he is particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, he is eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources. Previously and as an undergraduate student, Omid worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Omid also developed several intelligent systems and passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.&lt;br /&gt;
&lt;br /&gt;
=== Carson E. Owlett, OSCP CEH ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Carson is a graduate of Connecticut College, where he studied Computer Science and Slavic Studies. After graduating, he obtained his OSCP and CEH and did a brief stint doing research for DARPA. He then founded Black Mirage in 2019, where he serves as the CEO and Assessment Team Lead for penetration tests, and he has been working to implement programs for offensive security education.&lt;br /&gt;
&lt;br /&gt;
=== Rashmi Patil ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rashmi is passionate about software engineering and applying it to solve complex problems in day to day life. She has a diverse set of work experience through past research, internships and full-time work experience that has really helped others in understanding the broader picture. In her free time, she volunteers and conducts educational workshops to teach young high school girls about the importance of Cybersecurity and encourage them to pursue a career in Computer Engineering. &lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Izar Tarandach ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Izar Tarandach is Lead Product Security Architect at Autodesk inc.. Prior, he was the Security Architect for Enterprise Hybrid Cloud at Dell EMC, for long before a Security Consultant at the EMC Product Security Office. With more years than he’s willing to admit to in the information security arena, he is a member of SAFECode Technical Leadership Council and a founding contributor to the IEEE Center for Security Design. He holds a masters degree in Computer Science/Security from Boston University and has served &lt;br /&gt;
as an instructor in Digital Forensics at Boston University and in Secure Development at the University of Oregon.&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina Valdivieso is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
=== Roy Wattanasin ===&lt;br /&gt;
'''Information Security Professional'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Roy Wattanasin is a healthcare information security professional. You can find him on @wr0 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Homepage&amp;diff=255424</id>
		<title>2019 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Homepage&amp;diff=255424"/>
				<updated>2019-10-12T15:24:05Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Fixed typos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Home}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== Welcome   ==&lt;br /&gt;
This is the homepage for the 2019 Boston Application Security Conference (BASC). Conference will take place 8:30am to 6:30pm on Saturday, October 19&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at &lt;br /&gt;
* Location: [https://goo.gl/maps/MErChZ3cX5B2 5 Wayside Road Burlington, MA]  &lt;br /&gt;
&lt;br /&gt;
The BASC will be a free*, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: * Some workshops and training may have a separate fee.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== Call for Papers/Workshops ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/BASC_2019_Call_For_Papers CFP/CFW link]  &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
[https://www.eventbrite.com/e/boston-application-security-conference-basc-2019-tickets-71803643631 Register Here]&lt;br /&gt;
&lt;br /&gt;
Registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited.&lt;br /&gt;
&lt;br /&gt;
You may also register for one or more workshops, but workshop tickets are limited.  Please be considerate of others and '''only register for a workshop if you plan to attend'''.  If your plans change, please cancel your ticket to free the space up for others.  Do not sign up for more than one session of the same workshop, or for workshops whose times overlap.   If you do, conference organizers will cancel your ticket orders.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Keynotes ==&lt;br /&gt;
&lt;br /&gt;
'''The Internet Sucks.  Should We Replace It?'''&lt;br /&gt;
&lt;br /&gt;
'''Andy Ellis,''' Akamai&lt;br /&gt;
&lt;br /&gt;
[[File:Andy-ellis_0532_1-2.jpg|left|frameless]]&lt;br /&gt;
&lt;br /&gt;
50 years into the Internet, it’s become very clear that there are virtually no security goals designed into the underpinnings of the Internet, and even higher level protocols suffer from this lack.  As a result, existing on the Internet makes the Wild West look like a tame environment.  Should we attempt to redesign the Internet, and make it secure by default?  Let’s explore the dystopian world of an alternate Internet, and see why the Internet we have might actually be the best Internet we could hope for.&lt;br /&gt;
&lt;br /&gt;
Andy Ellis is Akamai’s Chief Security Officer, and his mission is “making the Internet suck less.” Governing cybersecurity, compliance, and safety for Akamai’s planetary-scale cloud platform since 2000, he has also designed and brought to market Akamai’s TLS acceleration network, its DDoS defense offerings, and several of the core technologies behind its security solutions. Andy has also guided Akamai’s IT transformation from a flat password-based network to a distributed, zero-trust enterprise based on strong authentication.&lt;br /&gt;
&lt;br /&gt;
Andy is a graduate of MIT with a degree in computer science, and has served as an officer in the United States Air Force with the 609th Information Warfare Squadron and the Electronic Systems Center.&lt;br /&gt;
&lt;br /&gt;
Also active in Internet policy and governance circles, Andy has supported past and present Akamai CEOs in roles on the NIAC and NSTAC, as well as serving on the FCC’s Communications Security, Reliability, and Interoperability Council. He is an affiliate of Harvard’s Berkman Klein Center, and a guest lecturer in executive education at MIT and the Harvard Kennedy School. He is a frequent speaker on topics of Internet security, anthropocentric risk management, and security governance; and occasionally blogs at www.csoandy.com. He can be found on Twitter as @csoandy, where he discusses security, wine, American football, and hairstyling.&lt;br /&gt;
&lt;br /&gt;
Andy is also an Advisor to YL Ventures’ YLV3 Fund, Uptycs, and Vulcan Cyber.&lt;br /&gt;
&lt;br /&gt;
Andy has received The Spirit of Disneyland Award, The Wine Spectator’s Award of Excellence (as The Arlington Inn), the US Air Force Commendation Medal, and the CSO Compass Award.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Sandcastles in a Storm: Application Vulnerabilities and How They Weaken Our Organizations'''&lt;br /&gt;
&lt;br /&gt;
'''Kevin Johnson,''' Secure Ideas&lt;br /&gt;
&lt;br /&gt;
[[File:KevinJohnson.jpg|175px|left|frameless]]&lt;br /&gt;
&lt;br /&gt;
In this presentation Kevin will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things.   We will explore the vulnerabilities, how they are attacked, and what it means to all of us.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions for large enterprises and penetration testing everything from government agencies to Fortune 100 companies. In addition, Kevin is a faculty member at IANS and was an instructor and author for the SANS Institute.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In his free time, Kevin enjoys spending time with his family and is an avid Star Wars fan and member of the 501st Legion (Star Wars charity group)&lt;br /&gt;
&lt;br /&gt;
Kevin is also very involved in the open source community. He runs a number of open source projects. These include SamuraiWTF; a web pen-testing environment, Laudanum; a collection of injectable web payloads, Yokoso; an infrastructure fingerprinting project and a number of others. Kevin is also involved in MobiSec and SH5ARK. Kevin was the founder and lead of the BASE project for Snort before transitioning that to another developer.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
*  Only Silver Sponsorships Remain [https://www.owasp.org/images/9/94/BASCSponsorship2019.pdf Sponsorship Kit]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* [[2019_BASC_Presentations | Presentations]]&lt;br /&gt;
* [[2019_BASC_Workshops | Workshops]]&lt;br /&gt;
* [[2019_BASC_Speakers | Speakers]]&lt;br /&gt;
* [[2019_BASC_Agenda | Agenda]]&lt;br /&gt;
* Twitter: Follow [https://twitter.com/BASConf @BASConf] @[https://twitter.com/owaspboston OWASPBoston] HashTag: #basc2019&lt;br /&gt;
&lt;br /&gt;
== OWASP Boston Chapter ==&lt;br /&gt;
BASC is presented by the [https://www.owasp.org/index.php/Boston OWASP Boston] chapter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Homepage&amp;diff=255399</id>
		<title>2019 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Homepage&amp;diff=255399"/>
				<updated>2019-10-10T16:10:28Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Not accepting any more sponsors.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Home}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== Welcome   ==&lt;br /&gt;
This is the homepage for the 2019 Boston Application Security Conference (BASC). Conference will take place 8:30am to 6:30pm on Saturday, October 19&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at &lt;br /&gt;
* Location: [https://goo.gl/maps/MErChZ3cX5B2 5 Wayside Road Burlington, MA]  &lt;br /&gt;
&lt;br /&gt;
The BASC will be a free*, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: * Some workshops and training may have a separate fee.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== Call for Papers/Workshops ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/BASC_2019_Call_For_Papers CFP/CFW link]  &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
[https://www.eventbrite.com/e/boston-application-security-conference-basc-2019-tickets-71803643631 Register Here]&lt;br /&gt;
&lt;br /&gt;
Registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited.&lt;br /&gt;
&lt;br /&gt;
You may also register for one or more workshops, but workshop tickets are limited.  Please be considerate of others and '''only register for a workshop if you plan to attend'''.  If your plans change, please cancel your ticket to free the space up for others.  Do not sign up for more than one session of the same workshop, or for workshops whose times overlap.   If you do, conference organizers will cancel your ticket orders.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Keynotes ==&lt;br /&gt;
&lt;br /&gt;
'''The Internet Sucks.  Should we replace it?'''&lt;br /&gt;
&lt;br /&gt;
'''Andy Ellis,''' Akamai&lt;br /&gt;
&lt;br /&gt;
[[File:Andy-ellis_0532_1-2.jpg|left|frameless]]&lt;br /&gt;
&lt;br /&gt;
50 years into the Internet, it’s become very clear that there are virtually no security goals designed into the underpinnings of the Internet, and even higher level protocols suffer from this lack.  As a result, existing on the Internet makes the Wild West look like a tame environment.  Should we attempt to redesign the Internet, and make it secure by default?  Let’s explore the dystopian world of an alternate Internet, and see why the Internet we have might actually be the best Internet we could hope for.&lt;br /&gt;
&lt;br /&gt;
Andy Ellis is Akamai’s Chief Security Officer, and his mission is “making the Internet suck less.” Governing cybersecurity, compliance, and safety for Akamai’s planetary-scale cloud platform since 2000, he has also designed and brought to market Akamai’s TLS acceleration network, its DDoS defense offerings, and several of the core technologies behind its security solutions. Andy has also guided Akamai’s IT transformation from a flat password-based network to a distributed, zero-trust enterprise based on strong authentication.&lt;br /&gt;
&lt;br /&gt;
Andy is a graduate of MIT with a degree in computer science, and has served as an officer in the United States Air Force with the 609th Information Warfare Squadron and the Electronic Systems Center.&lt;br /&gt;
&lt;br /&gt;
Also active in Internet policy and governance circles, Andy has supported past and present Akamai CEOs in roles on the NIAC and NSTAC, as well as serving on the FCC’s Communications Security, Reliability, and Interoperability Council. He is an affiliate of Harvard’s Berkman Klein Center, and a guest lecturer in executive education at MIT and the Harvard Kennedy School. He is a frequent speaker on topics of Internet security, anthropocentric risk management, and security governance; and occasionally blogs at www.csoandy.com. He can be found on Twitter as @csoandy, where he discusses security, wine, American football, and hairstyling.&lt;br /&gt;
&lt;br /&gt;
Andy is also an Advisor to YL Ventures’ YLV3 Fund, Uptycs, and Vulcan Cyber.&lt;br /&gt;
&lt;br /&gt;
Andy has received The Spirit of Disneyland Award, The Wine Spectator’s Award of Excellence (as The Arlington Inn), the US Air Force Commendation Medal, and the CSO Compass Award.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Sandcastles in a Storm: Application Vulnerabilities and how they weaken our organizations'''&lt;br /&gt;
&lt;br /&gt;
'''Kevin Johnson,''' Secure Ideas&lt;br /&gt;
&lt;br /&gt;
[[File:KevinJohnson.jpg|175px|left|frameless]]&lt;br /&gt;
&lt;br /&gt;
In this presentation Kevin will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things.   We will explore the vulnerabilities, how they are attacked, and what it means to all of us.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions for large enterprises and penetration testing everything from government agencies to Fortune 100 companies. In addition, Kevin is a faculty member at IANS and was an instructor and author for the SANS Institute.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In his free time, Kevin enjoys spending time with his family and is an avid Star Wars fan and member of the 501st Legion (Star Wars charity group)&lt;br /&gt;
&lt;br /&gt;
Kevin is also very involved in the open source community. He runs a number of open source projects. These include SamuraiWTF; a web pen-testing environment, Laudanum; a collection of injectable web payloads, Yokoso; an infrastructure fingerprinting project and a number of others. Kevin is also involved in MobiSec and SH5ARK. Kevin was the founder and lead of the BASE project for Snort before transitioning that to another developer.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
*  Only Silver Sponsorships Remain [https://www.owasp.org/images/9/94/BASCSponsorship2019.pdf Sponsorship Kit]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* [[2019_BASC_Presentations | Presentations]]&lt;br /&gt;
* [[2019_BASC_Workshops | Workshops]]&lt;br /&gt;
* [[2019_BASC_Speakers | Speakers]]&lt;br /&gt;
* [[2019_BASC_Agenda | Agenda]]&lt;br /&gt;
* Twitter: Follow [https://twitter.com/BASConf @BASConf] @[https://twitter.com/owaspboston OWASPBoston] HashTag: #basc2019&lt;br /&gt;
&lt;br /&gt;
== OWASP Boston Chapter ==&lt;br /&gt;
BASC is presented by the [https://www.owasp.org/index.php/Boston OWASP Boston] chapter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Agenda&amp;diff=255217</id>
		<title>2019 BASC Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Agenda&amp;diff=255217"/>
				<updated>2019-10-04T03:55:34Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Create Agenda&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Agenda}}&lt;br /&gt;
&amp;lt;!-- --------------------------------------------------------------------&lt;br /&gt;
INSTRUCTIONS FOR EDITORS:&lt;br /&gt;
&lt;br /&gt;
Updating this agenda is a 3-step process. First you must convert the existing entries to the&lt;br /&gt;
new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to&lt;br /&gt;
fill in the data for the presentation. Third, miscellaneous details should be cleaned up.&lt;br /&gt;
&lt;br /&gt;
1) To convert a presentation to the new format:&lt;br /&gt;
  - Most importantly, look at the 10:00 time slot and use it as an example.&lt;br /&gt;
  - Find the time slot you want to modify.&lt;br /&gt;
  - If it already has the Presentation Agenda Template then you are done&lt;br /&gt;
  - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}}&lt;br /&gt;
  - Delete the text that is in the time slot already. This requires great care.&lt;br /&gt;
      You probably want to delete the lines that do not begin with a &lt;br /&gt;
      pipe (|) or an open curly ({).&lt;br /&gt;
  - Paste the text you copied into that time slot.&lt;br /&gt;
  - Replace the word &amp;quot;TYPE&amp;quot; with either &amp;quot;Presentation&amp;quot; or &amp;quot;Keynote&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2) To fill in the appropriate data:&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add&lt;br /&gt;
    the presentation's abstract. If you don't have an abstract,&lt;br /&gt;
    insert &amp;quot;Presentation abstract will be available shortly.&amp;quot;&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio.&lt;br /&gt;
    If you don't have bio information, just put the speaker's name into the page and &lt;br /&gt;
    and make their bio &amp;quot;Speaker information will be available shortly.&amp;quot;&lt;br /&gt;
    Until it presents a problem, list multiple speakers as one.&lt;br /&gt;
    For example, &amp;quot;John Boy &amp;amp; Grandpa&amp;quot;.&lt;br /&gt;
  - Find the right slot in the table.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined Presentation&amp;quot; text in the table&lt;br /&gt;
    with the presentation name __EXACTLY__ as it is on the presentation page.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined&amp;quot; text in the table&lt;br /&gt;
    with the speaker(s) name(s) __EXACTLY__ as it is on the bio page.&lt;br /&gt;
  &lt;br /&gt;
3) Clean up whatever needs cleaning up.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Presentations&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference&amp;lt;br/&amp;gt;Saturday, October 19, 2019'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 8:30-9:30 &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Breakfast and Registration'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.whitehatsec.com/ WhiteHat Security]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-09:50 &lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Opening Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2019_BASC_Homepage#Keynotes|The Internet Sucks. Should we replace it?]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2019_BASC_Homepage#Keynotes|Andy Ellis]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;!-- | colspan=&amp;quot;1&amp;quot; rowspan=&amp;quot;12&amp;quot; style=&amp;quot;width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''Capture the Flag&amp;lt;br/&amp;gt;Arena'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Vic Solem &amp;amp;amp;&amp;lt;br/&amp;gt;Phil Barrows'''&amp;lt;br/&amp;gt;MEI Security&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;DEFENDERS&amp;lt;br/&amp;gt;Jay Peak Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;ATTACKERS&amp;lt;br/&amp;gt;Bretton Woods Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;Command &amp;amp;amp; Control&amp;lt;br/&amp;gt;Cranmore Room --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | || align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Washington/Jefferson Room'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Adams Room'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|OWASP Serverless Top 10|Tal Melamed }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|An Intelligent Approach to Upgrading OSS Libraries|Madison Cool }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Critical Thinking in Cybersecurity|Kristin Dahl }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Security Culture Hacking: Disrupting the Security Status Quo|Chris Romeo }}&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:00-1:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Lunch'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.ordr.net/ Ordr]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Defending against the Acceleration of Client-Side Website Attacks|Aanand Krishnan }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Open Source Security on a Shoestring|Paulina Valdivieso }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|SAST Triage Tricks of the Trade - How to Triage Before the Universe Dies Out|Kristofer Duer &amp;amp;amp; Rashmi Patil }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Put that Cease and Desist Down: How to Train Your Org to Work with Hackers|Luke Tucker }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Automate or Die - DevSecOps in the Age of Software Supply Chain Attacks|Artie Jurgenson }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Finding Bugs Using Your Own Code: Machine Learning-based Inconsistent Code Detection|Mansour Ahmadi &amp;amp;amp; Reza Mirzazade Farkhani  }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|The User Experience of Information Security|Chris Chagnon &amp;amp;amp; Ryan LaMarche }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentation_Agenda_Template|Presentation|Identifying Malicious Android Applications in the Presence of Adversaries: A Cat-and-Mouse Game|Omid Mirzaei }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 5:00-5:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Social Time'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.nccgroup.trust/ NCC Group]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 5:30-6:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Closing Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2019_BASC_Homepage#Keynotes|Sandcastles in a Storm: Application Vulnerabilities and how they weaken our organizations]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2019_BASC_Homepage#Keynotes|Kevin Johnson]]'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Raffle'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Wrap Up'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Workshops =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Workshops&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference&amp;lt;br/&amp;gt;Saturday, October 19, 2019'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Attitash'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Monroe'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cannon'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Bretton Woods'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Jay Peak'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cranmore'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50 &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Resume_Agenda_Template|Session 1 }}&lt;br /&gt;
| rowspan=&amp;quot;6&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Workshop_Agenda_Template|Presentation|CMD+CTRL Cyber Range|Chad Holmes }} &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Workshop_Agenda_Template|Presentation|Capture Ever-Evolving Security Needs of Users with IKE &amp;amp; Proto-Research Persona Development|Prateek Jain &amp;amp;amp; Ryan Lamarche }}   &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Workshop_Agenda_Template|Presentation|The Ultimate Secure Coding Showdown|Brad Giguere }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Workshop_Agenda_Template|Presentation|How to Talk to Humans|Kitty Huang &amp;amp;amp; Roy Wattanasin }}  &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Workshop_Agenda_Template|Presentation|Zero to Hero: Intro to Web App Pentesting|Carson Owlett &amp;amp;amp; Gabrielle Hempel }} &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Resume_Agenda_Template|Session 2 }}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2019_BASC:Presentaton_Agenda_Template|Workshop|AWS Cloud Security Fundamentals|Joshua Dow &amp;amp;amp; Rami McCarthy }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   {{2019_BASC:Presentaton_Agenda_Template|Workshop|Effective Threat Modeling with CTM|Izar Tarandach  }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Agenda}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Workshop_Agenda_Template&amp;diff=255216</id>
		<title>Template:2019 BASC:Workshop Agenda Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Workshop_Agenda_Template&amp;diff=255216"/>
				<updated>2019-10-04T02:53:37Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Created page with &amp;quot;&amp;lt;!--     Parameters:       1=Caption. For example, &amp;quot;Presentation&amp;quot;, or &amp;quot;Breakfast&amp;quot;       2=Presentation Name __EXACTLY__ as it appears on the presentation page       3=Presenta...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- &lt;br /&gt;
   Parameters:&lt;br /&gt;
      1=Caption. For example, &amp;quot;Presentation&amp;quot;, or &amp;quot;Breakfast&amp;quot;&lt;br /&gt;
      2=Presentation Name __EXACTLY__ as it appears on the presentation page&lt;br /&gt;
      3=Presentation Speaker __EXACTLY__ as it appears on the speaker page&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2019_BASC_Workshops#{{{2}}}|{{{2}}}]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;[[2019_BASC_Speakers#{{{3}}}|{{{3}}}]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Resume_Agenda_Template&amp;diff=255215</id>
		<title>Template:2019 BASC:Resume Agenda Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Resume_Agenda_Template&amp;diff=255215"/>
				<updated>2019-10-04T02:52:21Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Created page with &amp;quot;&amp;lt;!--     Parameters:       1=Caption. For example, &amp;quot;Presentation&amp;quot;, or &amp;quot;Breakfast&amp;quot;       2=Presentation Name __EXACTLY__ as it appears on the presentation page       3=Presenta...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- &lt;br /&gt;
   Parameters:&lt;br /&gt;
      1=Caption. For example, &amp;quot;Presentation&amp;quot;, or &amp;quot;Breakfast&amp;quot;&lt;br /&gt;
      2=Presentation Name __EXACTLY__ as it appears on the presentation page&lt;br /&gt;
      3=Presentation Speaker __EXACTLY__ as it appears on the speaker page&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2019_BASC_Resume_Room|CyberSN Career Center]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;{{{1}}}&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Presentation_Agenda_Template&amp;diff=255214</id>
		<title>Template:2019 BASC:Presentation Agenda Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Presentation_Agenda_Template&amp;diff=255214"/>
				<updated>2019-10-04T02:40:27Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Create template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- &lt;br /&gt;
   Parameters:&lt;br /&gt;
      1=Caption. For example, &amp;quot;Presentation&amp;quot;, or &amp;quot;Breakfast&amp;quot;&lt;br /&gt;
      2=Presentation Name __EXACTLY__ as it appears on the presentation page&lt;br /&gt;
      3=Presentation Speaker __EXACTLY__ as it appears on the speaker page&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2019_BASC_Presentations#{{{2}}}|{{{2}}}]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;[[2019_BASC_Speakers#{{{3}}}|{{{3}}}]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Presentaton_Agenda_Template&amp;diff=255213</id>
		<title>Template:2019 BASC:Presentaton Agenda Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Presentaton_Agenda_Template&amp;diff=255213"/>
				<updated>2019-10-04T02:36:10Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Create template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- &lt;br /&gt;
   Parameters:&lt;br /&gt;
      1=Caption. For example, &amp;quot;Presentation&amp;quot;, or &amp;quot;Breakfast&amp;quot;&lt;br /&gt;
      2=Presentation Name __EXACTLY__ as it appears on the presentation page&lt;br /&gt;
      3=Presentation Speaker __EXACTLY__ as it appears on the speaker page&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2019_BASC_Presentations#{{{2}}}|{{{2}}}]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;[[2019_BASC_Speakers#{{{3}}}|{{{3}}}]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=255210</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=255210"/>
				<updated>2019-10-03T16:54:51Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Update speakers&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Mansour Ahmadi ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Mansour Ahmadi is a research associate at Northeastern University. Before coming to Northeastern, he obtained a PhD in Computer Engineering from the University of Cagliari in 2017. His research is mainly focused in applying machine learning methods for systems security problems, especially malware detection and classification, and vulnerability discovery. He co-authored over 10 scientific papers. Also, He is the lead developer of IntelliAV, which is the first on-device machine learning-based mobile malware detector. &lt;br /&gt;
&lt;br /&gt;
=== Chris Chagnon ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Chagnon is an ITSM Architect and developer who designs, develops, and maintains award-winning experiences for managing and carrying out the ITSM process. Chris has a Master of Science in Information Technology, and a bachelor’s degree in Visual Communications. In addition, Chris is a PhD Candidate studying Information Systems with a focus on user and service experience. As A Top 25 Thought Leader in ITSM, and an ALE IT Vanguard, Chris speaks nationally about the future of ITSM, practical applications of artificial intelligence and machine learning, gamification, continual service improvement, and customer service/experience. Follow Chris on Twitter @Chagn0n.&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Joshua Dow ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joshua Dow is a Security Consultant with NCC Group, joining the organization in Spring of 2019. Joshua has made contributions in his career as both a blue team practitioner and a red team operator. Joshua specializes in web application penetration testing, network penetration testing, and cloud security auditing. Joshua worked as a Senior Software Engineer prior to getting his start in Information Security.&lt;br /&gt;
&lt;br /&gt;
=== Kristofer Duer ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristofer Duer is the Lead Cognitive Researcher for AppScan Source. He has worked in the application security field for the last 8 years in the world of Static Application Security Testing (SAST) and researching language specific attack surfaces. His particular specialty deals with applying machine learning to solve some of the impossible problems which occur naturally in the world of SAST - namely Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).&lt;br /&gt;
&lt;br /&gt;
Outside of work he enjoys the gym, Disc Golf (super fun!) and spending time with his wife and two kids.&lt;br /&gt;
&lt;br /&gt;
=== Reza Mirzazade Farkhani ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Reza Mirzazade Farkhani is pursuing a PhD in Cybersecurity at Northeastern University. His research interests span a wide range of topics in systems security with a particular focus on software vulnerability detection, exploit mitigation techniques and binary analysis. Currently, Reza is focusing on developing novel techniques to protect applications against memory safety vulnerabilities. He is especially interested in new security features in ARM architecture to accelerate the performance and security of the current systems. &lt;br /&gt;
&lt;br /&gt;
=== Brad Giguere ===&lt;br /&gt;
'''Secure Code Warrior'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Brad Giguere is a Sales Engineer for Secure Code Warrior, a global security company that makes software development better and more secure. Giguere has worked in the technology and SAAS software industry for the majority of his career and is passionate about helping organizations better understand their business challenges and translating those into a solution tailored to meet their needs. He now focuses on empowering development teams to be the first line of defense in making security a highly visible piece of the SDLC.&lt;br /&gt;
&lt;br /&gt;
=== Gabrielle E. Hempel, CHTI ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for an institutional review board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as a penetration tester for Black Mirage while pursuing a certificate in Advanced Computer Security at Stanford. She continues to serve as a genetic scientist for NIH-regulated recombinant genetic studies, and serves as an instructor and mentor for a student cohort of cybersecurity analysts through Cybrary. She recently obtained her Certified Human Trafficking Investigator (CHTI) credentials through the McAfee Institute, and works with various law enforcement groups and task forces in order to combat human trafficking through digital forensics and analysis. Her area of expertise lies in GDPR/HIPAA/regulatory compliance and medical device security.&lt;br /&gt;
&lt;br /&gt;
=== Chad Holmes ===&lt;br /&gt;
'''Security Innovation'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chad Holmes is a Product Marketing Manager for Security Innovation with a focus on educating customers on emerging Cyber Range technologies and how they can improve security education within organizations. Prior to joining Security Innovation Chad was a Penetration Tester, Product Manager, Security Program Manager and team lead at Cigital, Veracode and Red Hat.&lt;br /&gt;
&lt;br /&gt;
=== Kitty Huang ===&lt;br /&gt;
'''Communications Trainer and Relationship Coach'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kitty Huang is an award-winning speaker who has led several fun and effective communication workshops at MIT, Harvard University, and corporate training events. She has worked as a copywriter at advertising agencies, a screenwriter for a television situation comedy, and a newspaper journalist. Her perceptive mind and creative approaches have successfully helped many individuals to solve problems in professional relationships and personal relationships. &lt;br /&gt;
&lt;br /&gt;
=== Robert Hurlbut ===&lt;br /&gt;
'''Bank of America'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Robert Hurlbut, is a Threat Modeling Architect / Lead at Bank of America. Robert is a Microsoft MVP for Developer Security and Technologies and holds the (ISC)2 CSSLP security certification. Robert has 30 years of industry experience in secure security, software architecture, and software development. He speaks at user groups, national and international conferences, and has provided training for many companies in the past. Robert is also a co-host of the Application Security Podcast (Twitter - @AppSecPodcast). Follow Robert on Twitter at @RobertHurlbut.&lt;br /&gt;
&lt;br /&gt;
=== Prateek Jain ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Prateek Jain is a UX researcher currently pursuing Ph.D. in Innovation with User Experience at Worcester Polytechnic Institute. His Ph.D. research focuses on User Experience. His research interests are augmented reality, internet of things (IoT), accessibility and persona development. He is working on multiple research projects focusing on the use of augmented reality and IoT to improve the user experience of products and services. Along with that, he is also working on developing and testing different persona frameworks to help organizations make effective design decisions.&lt;br /&gt;
&lt;br /&gt;
=== Artie Jurgenson ===&lt;br /&gt;
'''Sonatype'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Artie Jurgenson is a Solution Architect at Sonatype.  He spends his day to day working with companies small and large to apply the principles of DevSecOps and automation to their software development supply chains.  This stems from an intense distaste of performing the same procedures more than once.   Artie looks to resolve such redundancies both inside and out of his professional life which has led him down pursuits including: implementation of CI/CD toolchains and workflows from completely manual build/deploy processes, development and automation of crypto/forex trading algorithms, front-end test and deployment automation, container orchestration, API development, and computational scientific research optimized for supercomputer clusters.  Artie is happy to talk about any of the above at the reception.&lt;br /&gt;
&lt;br /&gt;
=== Aanand Krishnan ===&lt;br /&gt;
'''Tala Security'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Aanand Krishnan is the CEO and Founder of Tala Security.   Most recently he held senior technical roles at Symantec.  Aanand spent several years in M&amp;amp;A and investment banking  at Morgan Stanley and Dolby Labs acting as an adviser to leading security software, semiconductor and clean-tech companies. He started his career building high-speed optical networking products at Agilent Technologies. Aanand holds an MBA from Berkeley where he was a recipient of CJ White Fellowship, a Masters in Photonics and Optoelectronics from UC Santa Barbara where he was a QUEST Fellow and a Bachelors in Electrical Engineering with Honors from BITS, Pilani.&lt;br /&gt;
&lt;br /&gt;
=== Ryan LaMarche ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Ryan LaMarche is a digital transformation and design thinking expert that brings ideas to life with a focus on user experience, and smart system design. When Ryan isn’t building systems, he spends his time as a dual-enrolled Bachelor’s and Master’s student at Worcester Polytechnic Institute studying Computer Science and Innovation with UX. Ryan is also a founding member and CTO of Seldom Technologies where he works with companies to develop systems, applications, and websites and consult on process improvement in the ITSM space.&lt;br /&gt;
&lt;br /&gt;
=== Rami McCarthy ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rami McCarthy is a Security Consultant with NCC Group, joining with the acquisition of VSR in 2016. He's spent the past three years performing security assessments of all kinds, from SaaS products to cloud IoT platforms. In addition to client work, Rami has published research into misspelled security headers and Chromebook security. Rami got his start in security as an intern at a deep web threat analysis startup, and has a BS in CS from Northeastern University, with a concentration in cyber operations. He's currently working towards an MS from Brandeis University.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
In the past two years, Tal Melamed has been experimenting in offensive and defensive security for the serverless technology, as Head of Security Research at Protego Labs. He specializes in AppSec with more than 15 years of experience in security research and vulnerability assessment. Tal is also the leader and creator of the OWASP Serverless Top 10 and DVSA projects, and is a frequent speaker at security conferences, including DefCon, DerbyCon, OWASP, BSides and more. Follow Tal on Twitter at @_nu11p0inter&lt;br /&gt;
&lt;br /&gt;
=== Omid Mirzaei ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Omid Mirzaei is a postdoctoral research associate in the Systems Security (SecLab) and the Research in Software and Systems Security (RiS3) Labs at Northeastern University, working with Prof. Engin Kirda and Dr. Long Lu. Prior to this, Omid was an assistant professor in Universidad Carlos III de Madrid. Also, he spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and he received his PhD degree in Computer Science from the same university. Omid's thesis was mainly focused on Android malware analysis and triage. Generally speaking, Omid is working and conducting research in computer and cyber security. However, he is particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, he is eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources. Previously and as an undergraduate student, Omid worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Omid also developed several intelligent systems and passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.&lt;br /&gt;
&lt;br /&gt;
=== Carson E. Owlett, OSCP CEH ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Carson is a graduate of Connecticut College, where he studied Computer Science and Slavic Studies. After graduating, he obtained his OSCP and CEH and did a brief stint doing research for DARPA. He then founded Black Mirage in 2019, where he serves as the CEO and Assessment Team Lead for penetration tests, and he has been working to implement programs for offensive security education.&lt;br /&gt;
&lt;br /&gt;
=== Rashmi Patil ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rashmi is passionate about software engineering and applying it to solve complex problems in day to day life. She has a diverse set of work experience through past research, internships and full-time work experience that has really helped others in understanding the broader picture. In her free time, she volunteers and conducts educational workshops to teach young high school girls about the importance of Cybersecurity and encourage them to pursue a career in Computer Engineering. &lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Izar Tarandach ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Izar Tarandach is Lead Product Security Architect at Autodesk inc.. Prior, he was the Security Architect for Enterprise Hybrid Cloud at Dell EMC, for long before a Security Consultant at the EMC Product Security Office. With more years than he’s willing to admit to in the information security arena, he is a member of SAFECode Technical Leadership Council and a founding contributor to the IEEE Center for Security Design. He holds a masters degree in Computer Science/Security from Boston University and has served &lt;br /&gt;
as an instructor in Digital Forensics at Boston University and in Secure Development at the University of Oregon.&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina Valdivieso is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
=== Roy Wattanasin ===&lt;br /&gt;
'''Information Security Professional'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Roy Wattanasin is a healthcare information security professional. You can find him on @wr0 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Workshops&amp;diff=255209</id>
		<title>2019 BASC Workshops</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Workshops&amp;diff=255209"/>
				<updated>2019-10-03T16:53:22Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Update workshop leaders&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Workshops}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
We would like to thank our workshop leaders for donating their time and effort to help make this conference successful.&lt;br /&gt;
&lt;br /&gt;
== All-Day Workshop ==&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|CMD+CTRL Cyber Range|Chad Holmes| | | }}&lt;br /&gt;
Want to test your skills in identifying web app vulnerabilities?  Join OWASP Boston and Security Innovation as members compete in [https://www.securityinnovation.com/training/cmd-ctrl-cyber-range-security-training/ CMD+CTRL] a web application cyber range where players exploit their way through hundreds of vulnerabilities that lurk in business applications today.  Success means learning quickly that attack and defense is all about thinking on your feet.&lt;br /&gt;
&lt;br /&gt;
For each vulnerability you uncover, you are awarded points. Climb the interactive leaderboard for a chance to win fantastic prizes! CMD+CTRL is ideal for development teams to train and develop skills, but anyone involved in keeping your organization’s data secure can play - from developers and managers and even CISOs. &lt;br /&gt;
&lt;br /&gt;
When you register for BASC and select to attend this CMD+CTRL Cyber Range workshop, a link will be provided so you can reserve your spot with Security Innovation. Spaces are limited. Register early to reserve your spot!    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Morning Workshops ==&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|The Ultimate Secure Coding Showdown|Brad Giguere| | | }}&lt;br /&gt;
Are. You. Ready? Head to the AppSec battlefield and prove that you are the ultimate secure coding champion. Go head-to-head with your peers as you test your web application security knowledge of the OWASP Top 10. Strut your skills. Crush the competition. Score excellent prizes and take home the title of Secure Code Warrior!&lt;br /&gt;
&lt;br /&gt;
Players will be presented with a series of vulnerable code challenges that will ask them to identify the problem, locate the insecure code, and fix the vulnerability. Select from a range of software languages to complete the tournament, including Java EE, Java Spring, C# MVC, C# WebForms, Ruby on Rails, Python Django, Scala Play &amp;amp; Node.JS. It’s gamified, it’s relevant, but most of all - it’s fun.&lt;br /&gt;
&lt;br /&gt;
Watch as you earn points and climb to the top of the real-time leaderboard during the event. Prizes will be awarded to the top 3 point scorers, with one security superhero being crowned the ultimate Secure Code Warrior. Will it be you?&lt;br /&gt;
&lt;br /&gt;
Psst: Want to test your secure coding skills at your own pace, without the competition? You’re welcome to come along and join the fun.&lt;br /&gt;
&lt;br /&gt;
'''''Participants must bring a laptop.'''''  &lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Zero to Hero: Intro to Web App Pentesting|Carson Owlett and Gabrielle Hempel| | | }}&lt;br /&gt;
As more information and functionality moves to the internet, the interface between end users and web application servers becomes increasingly vulnerable. Because of these visible vulnerabilities, penetration testing skills are in high demand; however, courses catering to beginners and those wanting to get a “foot in the door” are scarce. In this workshop, you can utilize a custom environment and expertise in order to begin your journey into offensive security. We will focus on four areas of web application penetration testing: injection, XSS, XXE, and insecure deserialization. This course welcomes total beginners and will be largely oriented towards those wanting to build a foundation in web application pentesting. &lt;br /&gt;
&lt;br /&gt;
'''''Users should have a laptop equipped with BurpSuite.'''''&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Capture Ever-Evolving Security Needs of Users with IKE and Proto-Research Persona Development|Prateek Jain and Ryan Lamarche| | | }}&lt;br /&gt;
In this workshop, grounded in design thinking approach, we demonstrate the software platform IKE and its process framework for persona development, which facilitate a fast, effective, and relatively inexpensive way to inform design decisions, such as those needed to encourage and enable users to effectively utilize security features. The IKE software platform not only facilitates a deeper understanding of user needs but also provides a Key performance Indicator (KPI) that can measure an organizations’ performance in gauging its target market evolving security needs.&lt;br /&gt;
&lt;br /&gt;
Understanding customers and what their needs are is paramount to the success of any organization. In security and privacy industry, users and their needs vary drastically depending on various factors like age, education, technology use, etc. Persona development is one of the useful tools to capture these needs. It can reveal security needs, pain points, habits, security challenges, etc. of the user base. The traditional approach to persona development is rigorous but time-consuming and resource-intensive. It doesn't account for fast changes in the technological world of privacy and security. These personas become outdated as soon as they are developed. At UXDM lab, we created a unique approach to persona development. We also developed a software platform called IKE for developing and managing personas. IKE treats personas as living documents to make effective design decisions and to follow evolving user needs over time.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|How to Talk to Humans|Kitty Huang and Roy Wattanasin| | | }}&lt;br /&gt;
Do you feel frustrated sometimes trying to help non-technical users? Do you find it challenging asking for more resources from management? Effective communication can help IT professionals to be more productive and be heard. This workshop demonstrates communication skills through scenarios that IT security engineers encounter regularly. We will decode written and verbal scripts by technical engineers and translate them into a communication style that non-technical people can understand and appreciate.  These cases include asking for more resources from upper management, making a suggestion to implement better security, and verifying the legitimacy of an email with an employee. Excessive workload, pressing deadlines and the lack of support can make IT engineers feel exhausted, hopeless and frustrated. This workshop provides perspectives on viewing various work situations in a different light. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Workshops ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Threat Modeling Workshop|Robert Hurlbut| | | }}&lt;br /&gt;
&lt;br /&gt;
Threat modeling is a way of thinking about what could go wrong and how to prevent it. Instinctively, we all think this way in regards to our own personal security and safety. When it comes to building software, some software shops either skip the important step of threat modeling in secure software design or, they have tried threat modeling before but haven't quite figured out how to connect the threat models to real world software development and its priorities. Threat modeling should be part of your secure software design process. Using threat modeling and some principals of risk management, you can design software in a way that makes security one of the top goals, along with performance, scalability, reliability, and maintenance.&lt;br /&gt;
&lt;br /&gt;
Objective: In this workshop, attendees will be introduced to Threat Modeling, learn how to conduct a Threat Modeling session, learn how to use practical strategies in finding Threats and proposing Countermeasures, and learn how to apply Risk Management in dealing with the threats. Depending on time, we will go through 1 or 2 Real World Threat Modeling case studies. Finally, we will end the day with the latest updates in Threat Modeling process, tools, etc.&lt;br /&gt;
&lt;br /&gt;
'''''Laptop recommended for some labs, but not required.'''''&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Effective Threat Modeling with CTM|Izar Tarandach| | | }}&lt;br /&gt;
Recently Autodesk open-sourced our Continuous Threat Modeling methodology, which aims to enable product teams to threat model every story in a quick and focused manner in order to scale the ability of an organization to keep up with rapid product changes, and enable developers to acquire a security &amp;quot;muscle memory&amp;quot; ability to really infuse their practices with security design capabilities. &lt;br /&gt;
&lt;br /&gt;
In this course you will learn how to perform and enable Continuous Threat Modeling in your organization and provide support to the learning curve of your product teams as a security SME.&lt;br /&gt;
&lt;br /&gt;
CTM is available at https://github.com/Autodesk/continuous-threat-modeling&lt;br /&gt;
A threat-modeling-as-code tool will also be introduced, available at https://github.com/izar/pytm&lt;br /&gt;
&lt;br /&gt;
'''''If you are new to the discipline of Threat Modeling we highly advise participating in the earlier Threat Modeling Workshop by Robert Hurlbut in order to solidify your understanding of the subject.'''''&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|AWS Cloud Security Fundamentals|Joshua Dow and Rami McCarthy | | | }}&lt;br /&gt;
As comfort and familiarity with cloud computing is now more mainstream, companies are leaning more and more on cloud resources to host and run even their most-sensitive technical assets. With these new technologies/innovations come new (and old!) security concerns. In this workshop, we will take participants through a baseline understanding of cloud security - with a focus on AWS security fundamentals. &lt;br /&gt;
&lt;br /&gt;
First, we will briefly outline the cloud security model, the similarities across platforms, and the shared responsibility model that Amazon employs. From there, we will introduce participants to open-source tooling for AWS account auditing and hardening, including NCC's own ScoutSuite. We will provide access to an intentionally vulnerable AWS environment, to allow workshop attendees to follow along and explore misconfigurations with their own eyes. We also will support attendees who want to immediately dive into auditing their own AWS accounts/environments. &lt;br /&gt;
&lt;br /&gt;
Next, we'll highlight easy wins for AWS security, that the audience will be able to immediately apply to their own environments. Following that, we'll speak to Amazon's built-in security tooling, including:&lt;br /&gt;
&lt;br /&gt;
* Security Hub&lt;br /&gt;
* Trusted Advisor&lt;br /&gt;
* CloudTrail&lt;br /&gt;
* Inspector&lt;br /&gt;
* GuardDuty&lt;br /&gt;
* Macie (and why it's probably wrong for you!)&lt;br /&gt;
&lt;br /&gt;
We'll focus on actionable guidance to walk away and be able to use these tools to harden your own posture. Subsequently, we'll work with attendees through the misconfigurations that led to the Capital One breach, via the CloudGoat scenario. Wrapping up, we'll provide a easy to follow cheatsheet of best practices, easy wins, and open source tools that attendees can reference to improve their own environments.&lt;br /&gt;
&lt;br /&gt;
'''''Users should bring a laptop having: administrator privileges, at least 8GB of RAM, 10GB of free disk space, the latest version of 64-bit Virtualbox installed, and USB ports for copying data.'''''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template|Workshops}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255208</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255208"/>
				<updated>2019-10-03T16:50:46Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Update sponsors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nccgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Ordr Logo Tag.jpg|link=https://www.ordr.net/|180x1280px|Ordr]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:WhiteHat Primary Logo 2COLOR HIRES.jpg|link=https://www.whitehatsec.com/|180x1280px|WhiteHat]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
        &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:blackduck-synopsys-299x91.png|link=https://www.blackducksoftware.com/|299x91px|Black Duck Software]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Optiv Logo.jpg|link=https://www.optiv.com/|299x91px|Optiv]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:CA_vanguard_417x124.png|link=http://www.veracode.com/|317x104px|Veracode]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|150x39px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:SON logo main@2x (1).png|link=https://www.sonatype.com/|240x93px|Sonatype]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Netsparker-logo-transparent-h1000px-color.png|link=http://www.netsparker.com//|160x71px|Netsparker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:HackerOne_Logo_.jpg|link=https://www.hackerone.com/|170x50px|HackerOne]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_new.png|link=https://checkmarx.com|270x57px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TCell_V_GRD_CLR_RGB-800-160x128.png|link=https://www.tcell.io/|160x128px|tCell.io]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            [[File:AccuvantA10.png|link=https://www.accuvant.com/|170x78px|Accuvant]]&lt;br /&gt;
            &amp;amp;emsp;[[File:LOGOcontrast299x97.gif|link=http://contrastsecurity.com|299x97px|Contrast Security]]&lt;br /&gt;
            &amp;amp;emsp;&amp;amp;emsp;[[File:NetSPI Logo offset.jpg|link=http://netspi.com|180x90px|NetSPI]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Dell_Logo_Blue_rgb-125x125.png|link=http://www.dell.com/|125x125px|Dell]]&amp;lt;/span&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|243x77px|Qualys]]&lt;br /&gt;
            [[File:Nvisium-full_color-on_light_bg.png|link=https://nvisium.com|234x102px|nVisium]]&lt;br /&gt;
            [[File:GoSecure_Artboard_1@2x_(002)998x242.png|link=https://gosecure.net|250x280px|GoSecure]]&lt;br /&gt;
		&amp;lt;/p&amp;gt;&lt;br /&gt;
		&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 15%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
           &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TWM_logo_for_Boston_OWASP_2018_-_white_(CP).jpg|link=http://TokenizeWhatMatters.com//|160x71px|TWM]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Bugcrowd.jpg|link=http://www.bugcrowd.com/|248x49px|bugcrowd]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            [[File:Stormpath-blue-logo-218x52.png|link=https://www.stormpath.com/|218x52px|Stormpath]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Facebook.PNG|link=http://www.facebook.com|206x62px|Facebook]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Synopsys L|link=http://www.synopsys.com/home.aspx|150x45px|Synopsys]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
  &lt;br /&gt;
         &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|182x58px|Qualys]]&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Individual Sponsor: Justin Olin&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SON_logo_main@2x_(1).png&amp;diff=255203</id>
		<title>File:SON logo main@2x (1).png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SON_logo_main@2x_(1).png&amp;diff=255203"/>
				<updated>2019-10-03T14:58:46Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255202</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255202"/>
				<updated>2019-10-03T14:57:21Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Add more sponsors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nccgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Ordr Logo Tag.jpg|link=https://www.ordr.net/|180x1280px|Ordr]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:WhiteHat Primary Logo 2COLOR HIRES.jpg|link=https://www.whitehatsec.com/|180x1280px|WhiteHat]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
        &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:blackduck-synopsys-299x91.png|link=https://www.blackducksoftware.com/|299x91px|Black Duck Software]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Optiv Logo.jpg|link=https://www.optiv.com/|299x91px|Optiv]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:CA_vanguard_417x124.png|link=http://www.veracode.com/|317x104px|Veracode]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|160x71px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Netsparker-logo-transparent-h1000px-color.png|link=http://www.netsparker.com//|160x71px|Netsparker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:HackerOne_Logo_.jpg|link=https://www.hackerone.com/|170x50px|HackerOne]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_new.png|link=https://checkmarx.com|270x57px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TCell_V_GRD_CLR_RGB-800-160x128.png|link=https://www.tcell.io/|160x128px|tCell.io]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            [[File:AccuvantA10.png|link=https://www.accuvant.com/|170x78px|Accuvant]]&lt;br /&gt;
            &amp;amp;emsp;[[File:LOGOcontrast299x97.gif|link=http://contrastsecurity.com|299x97px|Contrast Security]]&lt;br /&gt;
            &amp;amp;emsp;&amp;amp;emsp;[[File:NetSPI Logo offset.jpg|link=http://netspi.com|180x90px|NetSPI]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Dell_Logo_Blue_rgb-125x125.png|link=http://www.dell.com/|125x125px|Dell]]&amp;lt;/span&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|243x77px|Qualys]]&lt;br /&gt;
            [[File:Nvisium-full_color-on_light_bg.png|link=https://nvisium.com|234x102px|nVisium]]&lt;br /&gt;
            [[File:GoSecure_Artboard_1@2x_(002)998x242.png|link=https://gosecure.net|250x280px|GoSecure]]&lt;br /&gt;
		&amp;lt;/p&amp;gt;&lt;br /&gt;
		&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 15%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
           &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TWM_logo_for_Boston_OWASP_2018_-_white_(CP).jpg|link=http://TokenizeWhatMatters.com//|160x71px|TWM]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Bugcrowd.jpg|link=http://www.bugcrowd.com/|248x49px|bugcrowd]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            [[File:Stormpath-blue-logo-218x52.png|link=https://www.stormpath.com/|218x52px|Stormpath]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Facebook.PNG|link=http://www.facebook.com|206x62px|Facebook]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Synopsys L|link=http://www.synopsys.com/home.aspx|150x45px|Synopsys]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
  &amp;lt;br/&amp;gt;&lt;br /&gt;
         &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|243x77px|Qualys]]&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Individual Sponsor: Justin Olin&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=255007</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=255007"/>
				<updated>2019-09-30T00:23:00Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Swap Joel Carson for Brad Giguere&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Mansour Ahmadi ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Mansour Ahmadi is a research associate at Northeastern University. Before coming to Northeastern, he obtained a PhD in Computer Engineering from the University of Cagliari in 2017. His research is mainly focused in applying machine learning methods for systems security problems, especially malware detection and classification, and vulnerability discovery. He co-authored over 10 scientific papers. Also, He is the lead developer of IntelliAV, which is the first on-device machine learning-based mobile malware detector. &lt;br /&gt;
&lt;br /&gt;
=== Chris Chagnon ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Chagnon is an ITSM Architect and developer who designs, develops, and maintains award-winning experiences for managing and carrying out the ITSM process. Chris has a Master of Science in Information Technology, and a bachelor’s degree in Visual Communications. In addition, Chris is a PhD Candidate studying Information Systems with a focus on user and service experience. As A Top 25 Thought Leader in ITSM, and an ALE IT Vanguard, Chris speaks nationally about the future of ITSM, practical applications of artificial intelligence and machine learning, gamification, continual service improvement, and customer service/experience. Follow Chris on Twitter @Chagn0n.&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Joshua Dow ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joshua Dow is a Security Consultant with NCC Group, joining the organization in Spring of 2019. Joshua has made contributions in his career as both a blue team practitioner and a red team operator. Joshua specializes in web application penetration testing, network penetration testing, and cloud security auditing. Joshua worked as a Senior Software Engineer prior to getting his start in Information Security.&lt;br /&gt;
&lt;br /&gt;
=== Kristofer Duer ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristofer Duer is the Lead Cognitive Researcher for AppScan Source. He has worked in the application security field for the last 8 years in the world of Static Application Security Testing (SAST) and researching language specific attack surfaces. His particular specialty deals with applying machine learning to solve some of the impossible problems which occur naturally in the world of SAST - namely Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).&lt;br /&gt;
&lt;br /&gt;
Outside of work he enjoys the gym, Disc Golf (super fun!) and spending time with his wife and two kids.&lt;br /&gt;
&lt;br /&gt;
=== Reza Mirzazade Farkhani ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Reza Mirzazade Farkhani is pursuing a PhD in Cybersecurity at Northeastern University. His research interests span a wide range of topics in systems security with a particular focus on software vulnerability detection, exploit mitigation techniques and binary analysis. Currently, Reza is focusing on developing novel techniques to protect applications against memory safety vulnerabilities. He is especially interested in new security features in ARM architecture to accelerate the performance and security of the current systems. &lt;br /&gt;
&lt;br /&gt;
=== Brad Giguere ===&lt;br /&gt;
'''Secure Code Warrior'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Brad Giguere is a Sales Engineer for Secure Code Warrior, a global security company that makes software development better and more secure. Giguere has worked in the technology and SAAS software industry for the majority of his career and is passionate about helping organizations better understand their business challenges and translating those into a solution tailored to meet their needs. He now focuses on empowering development teams to be the first line of defense in making security a highly visible piece of the SDLC.&lt;br /&gt;
&lt;br /&gt;
=== Gabrielle E. Hempel, CHTI ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for an institutional review board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as a penetration tester for Black Mirage while pursuing a certificate in Advanced Computer Security at Stanford. She continues to serve as a genetic scientist for NIH-regulated recombinant genetic studies, and serves as an instructor and mentor for a student cohort of cybersecurity analysts through Cybrary. She recently obtained her Certified Human Trafficking Investigator (CHTI) credentials through the McAfee Institute, and works with various law enforcement groups and task forces in order to combat human trafficking through digital forensics and analysis. Her area of expertise lies in GDPR/HIPAA/regulatory compliance and medical device security.&lt;br /&gt;
&lt;br /&gt;
=== Chad Holmes ===&lt;br /&gt;
'''Security Innovation'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chad Holmes is a Product Marketing Manager for Security Innovation with a focus on educating customers on emerging Cyber Range technologies and how they can improve security education within organizations. Prior to joining Security Innovation Chad was a Penetration Tester, Product Manager, Security Program Manager and team lead at Cigital, Veracode and Red Hat.&lt;br /&gt;
&lt;br /&gt;
=== Kitty Huang ===&lt;br /&gt;
'''Communications Trainer and Relationship Coach'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kitty Huang is an award-winning speaker who has led several fun and effective communication workshops at MIT, Harvard University, and corporate training events. She has worked as a copywriter at advertising agencies, a screenwriter for a television situation comedy, and a newspaper journalist. Her perceptive mind and creative approaches have successfully helped many individuals to solve problems in professional relationships and personal relationships. &lt;br /&gt;
&lt;br /&gt;
=== Robert Hurlbut ===&lt;br /&gt;
'''Bank of America'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Robert Hurlbut, is a Threat Modeling Architect / Lead at Bank of America. Robert is a Microsoft MVP for Developer Security and Technologies and holds the (ISC)2 CSSLP security certification. Robert has 30 years of industry experience in secure security, software architecture, and software development. He speaks at user groups, national and international conferences, and has provided training for many companies in the past. Robert is also a co-host of the Application Security Podcast (Twitter - @AppSecPodcast). Follow Robert on Twitter at @RobertHurlbut.&lt;br /&gt;
&lt;br /&gt;
=== Prateek Jain ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Prateek Jain is a UX researcher currently pursuing Ph.D. in Innovation with User Experience at Worcester Polytechnic Institute. His Ph.D. research focuses on User Experience. His research interests are augmented reality, internet of things (IoT), accessibility and persona development. He is working on multiple research projects focusing on the use of augmented reality and IoT to improve the user experience of products and services. Along with that, he is also working on developing and testing different persona frameworks to help organizations make effective design decisions.&lt;br /&gt;
&lt;br /&gt;
=== Artie Jurgenson ===&lt;br /&gt;
'''Sonatype'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Artie Jurgenson is a Solution Architect at Sonatype.  He spends his day to day working with companies small and large to apply the principles of DevSecOps and automation to their software development supply chains.  This stems from an intense distaste of performing the same procedures more than once.   Artie looks to resolve such redundancies both inside and out of his professional life which has led him down pursuits including: implementation of CI/CD toolchains and workflows from completely manual build/deploy processes, development and automation of crypto/forex trading algorithms, front-end test and deployment automation, container orchestration, API development, and computational scientific research optimized for supercomputer clusters.  Artie is happy to talk about any of the above at the reception.&lt;br /&gt;
&lt;br /&gt;
=== Aanand Krishnan ===&lt;br /&gt;
'''Tala Security'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Aanand Krishnan is the CEO and Founder of Tala Security.   Most recently he held senior technical roles at Symantec.  Aanand spent several years in M&amp;amp;A and investment banking  at Morgan Stanley and Dolby Labs acting as an adviser to leading security software, semiconductor and clean-tech companies. He started his career building high-speed optical networking products at Agilent Technologies. Aanand holds an MBA from Berkeley where he was a recipient of CJ White Fellowship, a Masters in Photonics and Optoelectronics from UC Santa Barbara where he was a QUEST Fellow and a Bachelors in Electrical Engineering with Honors from BITS, Pilani.&lt;br /&gt;
&lt;br /&gt;
=== Ryan LaMarche ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Ryan LaMarche is a digital transformation and design thinking expert that brings ideas to life with a focus on user experience, and smart system design. When Ryan isn’t building systems, he spends his time as a dual-enrolled Bachelor’s and Master’s student at Worcester Polytechnic Institute studying Computer Science and Innovation with UX. Ryan is also a founding member and CTO of Seldom Technologies where he works with companies to develop systems, applications, and websites and consult on process improvement in the ITSM space.&lt;br /&gt;
&lt;br /&gt;
=== Rami McCarthy ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rami McCarthy is a Security Consultant with NCC Group, joining with the acquisition of VSR in 2016. He's spent the past three years performing security assessments of all kinds, from SaaS products to cloud IoT platforms. In addition to client work, Rami has published research into misspelled security headers and Chromebook security. Rami got his start in security as an intern at a deep web threat analysis startup, and has a BS in CS from Northeastern University, with a concentration in cyber operations. He's currently working towards an MS from Brandeis University.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
In the past two years, Tal Melamed has been experimenting in offensive and defensive security for the serverless technology, as Head of Security Research at Protego Labs. He specializes in AppSec with more than 15 years of experience in security research and vulnerability assessment. Tal is also the leader and creator of the OWASP Serverless Top 10 and DVSA projects, and is a frequent speaker at security conferences, including DefCon, DerbyCon, OWASP, BSides and more. Follow Tal on Twitter at @_nu11p0inter&lt;br /&gt;
&lt;br /&gt;
=== Omid Mirzaei ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Omid Mirzaei is a postdoctoral research associate in the Systems Security (SecLab) and the Research in Software and Systems Security (RiS3) Labs at Northeastern University, working with Prof. Engin Kirda and Dr. Long Lu. Prior to this, Omid was an assistant professor in Universidad Carlos III de Madrid. Also, he spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and he received his PhD degree in Computer Science from the same university. Omid's thesis was mainly focused on Android malware analysis and triage. Generally speaking, Omid is working and conducting research in computer and cyber security. However, he is particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, he is eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources. Previously and as an undergraduate student, Omid worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Omid also developed several intelligent systems and passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.&lt;br /&gt;
&lt;br /&gt;
=== Carson E. Owlett, OSCP CEH ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Carson is a graduate of Connecticut College, where he studied Computer Science and Slavic Studies. After graduating, he obtained his OSCP and CEH and did a brief stint doing research for DARPA. He then founded Black Mirage in 2019, where he serves as the CEO and Assessment Team Lead for penetration tests, and he has been working to implement programs for offensive security education.&lt;br /&gt;
&lt;br /&gt;
=== Rashmi Patil ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rashmi is passionate about software engineering and applying it to solve complex problems in day to day life. She has a diverse set of work experience through past research, internships and full-time work experience that has really helped others in understanding the broader picture. In her free time, she volunteers and conducts educational workshops to teach young high school girls about the importance of Cybersecurity and encourage them to pursue a career in Computer Engineering. &lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Allison Schoenfield ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Allison Schoenfield is from Berkeley and also attended UC Berkeley, but is now a San Franciscan. She works as an Application Security Engineer at Autodesk. She enjoys threat modeling and working in partnership with developers to secure applications. Previously, she worked as a security consultant in penetration testing. In her free time, she likes to play social deduction games, bake and eat cupcakes, and mentor.&lt;br /&gt;
&lt;br /&gt;
=== Izar Tarandach ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Izar Tarandach is Lead Product Security Architect at Autodesk inc.. Prior, he was the Security Architect for Enterprise Hybrid Cloud at Dell EMC, for long before a Security Consultant at the EMC Product Security Office. With more years than he’s willing to admit to in the information security arena, he is a member of SAFECode Technical Leadership Council and a founding contributor to the IEEE Center for Security Design. He holds a masters degree in Computer Science/Security from Boston University and has served &lt;br /&gt;
as an instructor in Digital Forensics at Boston University and in Secure Development at the University of Oregon.&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina Valdivieso is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
=== Roy Wattanasin ===&lt;br /&gt;
'''Information Security Professional'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Roy Wattanasin is a healthcare information security professional. You can find him on @wr0 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Homepage&amp;diff=254994</id>
		<title>2019 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Homepage&amp;diff=254994"/>
				<updated>2019-09-27T13:28:15Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Add Registration Link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Home}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== Welcome   ==&lt;br /&gt;
This is the homepage for the 2019 Boston Application Security Conference (BASC). Conference will take place 8:30am to 6:30pm on Saturday, October 19&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at &lt;br /&gt;
* Location: [https://goo.gl/maps/MErChZ3cX5B2 5 Wayside Road Burlington, MA]  &lt;br /&gt;
&lt;br /&gt;
The BASC will be a free*, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: * Some workshops and training may have a separate fee.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== Call for Papers/Workshops ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/BASC_2019_Call_For_Papers CFP/CFW link]  &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
[https://www.eventbrite.com/e/boston-application-security-conference-basc-2019-tickets-71803643631 Register Here]&lt;br /&gt;
&lt;br /&gt;
Registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited.&lt;br /&gt;
&lt;br /&gt;
You may also register for one or more workshops, but workshop tickets are limited.  Please be considerate of others and '''only register for a workshop if you plan to attend'''.  If your plans change, please cancel your ticket to free the space up for others.  Do not sign up for more than one session of the same workshop, or for workshops whose times overlap.   If you do, conference organizers will cancel your ticket orders.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Keynotes ==&lt;br /&gt;
&lt;br /&gt;
'''The Internet Sucks.  Should we replace it?'''&lt;br /&gt;
&lt;br /&gt;
'''Andy Ellis,''' Akamai&lt;br /&gt;
&lt;br /&gt;
[[File:Andy-ellis_0532_1-2.jpg|left|frameless]]&lt;br /&gt;
&lt;br /&gt;
50 years into the Internet, it’s become very clear that there are virtually no security goals designed into the underpinnings of the Internet, and even higher level protocols suffer from this lack.  As a result, existing on the Internet makes the Wild West look like a tame environment.  Should we attempt to redesign the Internet, and make it secure by default?  Let’s explore the dystopian world of an alternate Internet, and see why the Internet we have might actually be the best Internet we could hope for.&lt;br /&gt;
&lt;br /&gt;
Andy Ellis is Akamai’s Chief Security Officer, and his mission is “making the Internet suck less.” Governing cybersecurity, compliance, and safety for Akamai’s planetary-scale cloud platform since 2000, he has also designed and brought to market Akamai’s TLS acceleration network, its DDoS defense offerings, and several of the core technologies behind its security solutions. Andy has also guided Akamai’s IT transformation from a flat password-based network to a distributed, zero-trust enterprise based on strong authentication.&lt;br /&gt;
&lt;br /&gt;
Andy is a graduate of MIT with a degree in computer science, and has served as an officer in the United States Air Force with the 609th Information Warfare Squadron and the Electronic Systems Center.&lt;br /&gt;
&lt;br /&gt;
Also active in Internet policy and governance circles, Andy has supported past and present Akamai CEOs in roles on the NIAC and NSTAC, as well as serving on the FCC’s Communications Security, Reliability, and Interoperability Council. He is an affiliate of Harvard’s Berkman Klein Center, and a guest lecturer in executive education at MIT and the Harvard Kennedy School. He is a frequent speaker on topics of Internet security, anthropocentric risk management, and security governance; and occasionally blogs at www.csoandy.com. He can be found on Twitter as @csoandy, where he discusses security, wine, American football, and hairstyling.&lt;br /&gt;
&lt;br /&gt;
Andy is also an Advisor to YL Ventures’ YLV3 Fund, Uptycs, and Vulcan Cyber.&lt;br /&gt;
&lt;br /&gt;
Andy has received The Spirit of Disneyland Award, The Wine Spectator’s Award of Excellence (as The Arlington Inn), the US Air Force Commendation Medal, and the CSO Compass Award.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Sandcastles in a Storm: Application Vulnerabilities and how they weaken our organizations'''&lt;br /&gt;
&lt;br /&gt;
'''Kevin Johnson,''' Secure Ideas&lt;br /&gt;
&lt;br /&gt;
[[File:KevinJohnson.jpg|175px|left|frameless]]&lt;br /&gt;
&lt;br /&gt;
In this presentation Kevin will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things.   We will explore the vulnerabilities, how they are attacked, and what it means to all of us.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions for large enterprises and penetration testing everything from government agencies to Fortune 100 companies. In addition, Kevin is a faculty member at IANS and was an instructor and author for the SANS Institute.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In his free time, Kevin enjoys spending time with his family and is an avid Star Wars fan and member of the 501st Legion (Star Wars charity group)&lt;br /&gt;
&lt;br /&gt;
Kevin is also very involved in the open source community. He runs a number of open source projects. These include SamuraiWTF; a web pen-testing environment, Laudanum; a collection of injectable web payloads, Yokoso; an infrastructure fingerprinting project and a number of others. Kevin is also involved in MobiSec and SH5ARK. Kevin was the founder and lead of the BASE project for Snort before transitioning that to another developer.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
&lt;br /&gt;
*  Only Silver Sponsorships Remain [https://www.owasp.org/images/9/94/BASCSponsorship2019.pdf Sponsorship Kit]&lt;br /&gt;
* [[2019_BASC_Presentations | Presentations]]&lt;br /&gt;
* [[2019_BASC_Workshops | Workshops]]&lt;br /&gt;
* [[2019_BASC_Speakers | Speakers]]&lt;br /&gt;
* [[2019_BASC_Agenda | Agenda]]&lt;br /&gt;
* Twitter: Follow [https://twitter.com/BASConf @BASConf] @[https://twitter.com/owaspboston OWASPBoston] HashTag: #basc2019&lt;br /&gt;
&lt;br /&gt;
== OWASP Boston Chapter ==&lt;br /&gt;
BASC is presented by the [https://www.owasp.org/index.php/Boston OWASP Boston] chapter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254879</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254879"/>
				<updated>2019-09-23T15:20:30Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Add Chad Holmes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Mansour Ahmadi ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Mansour Ahmadi is a research associate at Northeastern University. Before coming to Northeastern, he obtained a PhD in Computer Engineering from the University of Cagliari in 2017. His research is mainly focused in applying machine learning methods for systems security problems, especially malware detection and classification, and vulnerability discovery. He co-authored over 10 scientific papers. Also, He is the lead developer of IntelliAV, which is the first on-device machine learning-based mobile malware detector. &lt;br /&gt;
&lt;br /&gt;
=== Joel Carlson ===&lt;br /&gt;
'''Secure Code Warrior'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joel Carlson is a security professional with 15 years of experience in the security industry. Joel has a long history of connecting businesses with security tools to help them ensure a secure environment. He joined Secure Code Warrior earlier this year after previous success at Veracode, Dell and Bitsight. &lt;br /&gt;
&lt;br /&gt;
=== Chris Chagnon ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Chagnon is an ITSM Architect and developer who designs, develops, and maintains award-winning experiences for managing and carrying out the ITSM process. Chris has a Master of Science in Information Technology, and a bachelor’s degree in Visual Communications. In addition, Chris is a PhD Candidate studying Information Systems with a focus on user and service experience. As A Top 25 Thought Leader in ITSM, and an ALE IT Vanguard, Chris speaks nationally about the future of ITSM, practical applications of artificial intelligence and machine learning, gamification, continual service improvement, and customer service/experience. Follow Chris on Twitter @Chagn0n.&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Joshua Dow ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joshua Dow is a Security Consultant with NCC Group, joining the organization in Spring of 2019. Joshua has made contributions in his career as both a blue team practitioner and a red team operator. Joshua specializes in web application penetration testing, network penetration testing, and cloud security auditing. Joshua worked as a Senior Software Engineer prior to getting his start in Information Security.&lt;br /&gt;
&lt;br /&gt;
=== Kristofer Duer ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristofer Duer is the Lead Cognitive Researcher for AppScan Source. He has worked in the application security field for the last 8 years in the world of Static Application Security Testing (SAST) and researching language specific attack surfaces. His particular specialty deals with applying machine learning to solve some of the impossible problems which occur naturally in the world of SAST - namely Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).&lt;br /&gt;
&lt;br /&gt;
Outside of work he enjoys the gym, Disc Golf (super fun!) and spending time with his wife and two kids.&lt;br /&gt;
&lt;br /&gt;
=== Reza Mirzazade Farkhani ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Reza Mirzazade Farkhani is pursuing a PhD in Cybersecurity at Northeastern University. His research interests span a wide range of topics in systems security with a particular focus on software vulnerability detection, exploit mitigation techniques and binary analysis. Currently, Reza is focusing on developing novel techniques to protect applications against memory safety vulnerabilities. He is especially interested in new security features in ARM architecture to accelerate the performance and security of the current systems. &lt;br /&gt;
&lt;br /&gt;
=== Gabrielle E. Hempel, CHTI ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for an institutional review board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as a penetration tester for Black Mirage while pursuing a certificate in Advanced Computer Security at Stanford. She continues to serve as a genetic scientist for NIH-regulated recombinant genetic studies, and serves as an instructor and mentor for a student cohort of cybersecurity analysts through Cybrary. She recently obtained her Certified Human Trafficking Investigator (CHTI) credentials through the McAfee Institute, and works with various law enforcement groups and task forces in order to combat human trafficking through digital forensics and analysis. Her area of expertise lies in GDPR/HIPAA/regulatory compliance and medical device security.&lt;br /&gt;
&lt;br /&gt;
=== Chad Holmes ===&lt;br /&gt;
'''Security Innovation'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chad Holmes is a Product Marketing Manager for Security Innovation with a focus on educating customers on emerging Cyber Range technologies and how they can improve security education within organizations. Prior to joining Security Innovation Chad was a Penetration Tester, Product Manager, Security Program Manager and team lead at Cigital, Veracode and Red Hat.&lt;br /&gt;
&lt;br /&gt;
=== Kitty Huang ===&lt;br /&gt;
'''Communications Trainer and Relationship Coach'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kitty Huang is an award-winning speaker who has led several fun and effective communication workshops at MIT, Harvard University, and corporate training events. She has worked as a copywriter at advertising agencies, a screenwriter for a television situation comedy, and a newspaper journalist. Her perceptive mind and creative approaches have successfully helped many individuals to solve problems in professional relationships and personal relationships. &lt;br /&gt;
&lt;br /&gt;
=== Robert Hurlbut ===&lt;br /&gt;
'''Bank of America'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Robert Hurlbut, is a Threat Modeling Architect / Lead at Bank of America. Robert is a Microsoft MVP for Developer Security and Technologies and holds the (ISC)2 CSSLP security certification. Robert has 30 years of industry experience in secure security, software architecture, and software development. He speaks at user groups, national and international conferences, and has provided training for many companies in the past. Robert is also a co-host of the Application Security Podcast (Twitter - @AppSecPodcast). Follow Robert on Twitter at @RobertHurlbut.&lt;br /&gt;
&lt;br /&gt;
=== Prateek Jain ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Prateek Jain is a UX researcher currently pursuing Ph.D. in Innovation with User Experience at Worcester Polytechnic Institute. His Ph.D. research focuses on User Experience. His research interests are augmented reality, internet of things (IoT), accessibility and persona development. He is working on multiple research projects focusing on the use of augmented reality and IoT to improve the user experience of products and services. Along with that, he is also working on developing and testing different persona frameworks to help organizations make effective design decisions.&lt;br /&gt;
&lt;br /&gt;
=== Artie Jurgenson ===&lt;br /&gt;
'''Sonatype'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Artie Jurgenson is a Solution Architect at Sonatype.  He spends his day to day working with companies small and large to apply the principles of DevSecOps and automation to their software development supply chains.  This stems from an intense distaste of performing the same procedures more than once.   Artie looks to resolve such redundancies both inside and out of his professional life which has led him down pursuits including: implementation of CI/CD toolchains and workflows from completely manual build/deploy processes, development and automation of crypto/forex trading algorithms, front-end test and deployment automation, container orchestration, API development, and computational scientific research optimized for supercomputer clusters.  Artie is happy to talk about any of the above at the reception.&lt;br /&gt;
&lt;br /&gt;
=== Aanand Krishnan ===&lt;br /&gt;
'''Tala Security'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Aanand Krishnan is the CEO and Founder of Tala Security.   Most recently he held senior technical roles at Symantec.  Aanand spent several years in M&amp;amp;A and investment banking  at Morgan Stanley and Dolby Labs acting as an adviser to leading security software, semiconductor and clean-tech companies. He started his career building high-speed optical networking products at Agilent Technologies. Aanand holds an MBA from Berkeley where he was a recipient of CJ White Fellowship, a Masters in Photonics and Optoelectronics from UC Santa Barbara where he was a QUEST Fellow and a Bachelors in Electrical Engineering with Honors from BITS, Pilani.&lt;br /&gt;
&lt;br /&gt;
=== Ryan LaMarche ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Ryan LaMarche is a digital transformation and design thinking expert that brings ideas to life with a focus on user experience, and smart system design. When Ryan isn’t building systems, he spends his time as a dual-enrolled Bachelor’s and Master’s student at Worcester Polytechnic Institute studying Computer Science and Innovation with UX. Ryan is also a founding member and CTO of Seldom Technologies where he works with companies to develop systems, applications, and websites and consult on process improvement in the ITSM space.&lt;br /&gt;
&lt;br /&gt;
=== Rami McCarthy ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rami McCarthy is a Security Consultant with NCC Group, joining with the acquisition of VSR in 2016. He's spent the past three years performing security assessments of all kinds, from SaaS products to cloud IoT platforms. In addition to client work, Rami has published research into misspelled security headers and Chromebook security. Rami got his start in security as an intern at a deep web threat analysis startup, and has a BS in CS from Northeastern University, with a concentration in cyber operations. He's currently working towards an MS from Brandeis University.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
In the past two years, Tal Melamed has been experimenting in offensive and defensive security for the serverless technology, as Head of Security Research at Protego Labs. He specializes in AppSec with more than 15 years of experience in security research and vulnerability assessment. Tal is also the leader and creator of the OWASP Serverless Top 10 and DVSA projects, and is a frequent speaker at security conferences, including DefCon, DerbyCon, OWASP, BSides and more. Follow Tal on Twitter at @_nu11p0inter&lt;br /&gt;
&lt;br /&gt;
=== Omid Mirzaei ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Omid Mirzaei is a postdoctoral research associate in the Systems Security (SecLab) and the Research in Software and Systems Security (RiS3) Labs at Northeastern University, working with Prof. Engin Kirda and Dr. Long Lu. Prior to this, Omid was an assistant professor in Universidad Carlos III de Madrid. Also, he spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and he received his PhD degree in Computer Science from the same university. Omid's thesis was mainly focused on Android malware analysis and triage. Generally speaking, Omid is working and conducting research in computer and cyber security. However, he is particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, he is eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources. Previously and as an undergraduate student, Omid worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Omid also developed several intelligent systems and passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.&lt;br /&gt;
&lt;br /&gt;
=== Carson E. Owlett, OSCP CEH ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Carson is a graduate of Connecticut College, where he studied Computer Science and Slavic Studies. After graduating, he obtained his OSCP and CEH and did a brief stint doing research for DARPA. He then founded Black Mirage in 2019, where he serves as the CEO and Assessment Team Lead for penetration tests, and he has been working to implement programs for offensive security education.&lt;br /&gt;
&lt;br /&gt;
=== Rashmi Patil ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rashmi is passionate about software engineering and applying it to solve complex problems in day to day life. She has a diverse set of work experience through past research, internships and full-time work experience that has really helped others in understanding the broader picture. In her free time, she volunteers and conducts educational workshops to teach young high school girls about the importance of Cybersecurity and encourage them to pursue a career in Computer Engineering. &lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Allison Schoenfield ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Allison Schoenfield is from Berkeley and also attended UC Berkeley, but is now a San Franciscan. She works as an Application Security Engineer at Autodesk. She enjoys threat modeling and working in partnership with developers to secure applications. Previously, she worked as a security consultant in penetration testing. In her free time, she likes to play social deduction games, bake and eat cupcakes, and mentor.&lt;br /&gt;
&lt;br /&gt;
=== Izar Tarandach ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Izar Tarandach is Lead Product Security Architect at Autodesk inc.. Prior, he was the Security Architect for Enterprise Hybrid Cloud at Dell EMC, for long before a Security Consultant at the EMC Product Security Office. With more years than he’s willing to admit to in the information security arena, he is a member of SAFECode Technical Leadership Council and a founding contributor to the IEEE Center for Security Design. He holds a masters degree in Computer Science/Security from Boston University and has served &lt;br /&gt;
as an instructor in Digital Forensics at Boston University and in Secure Development at the University of Oregon.&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina Valdivieso is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
=== Roy Wattanasin ===&lt;br /&gt;
'''Information Security Professional'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Roy Wattanasin is a healthcare information security professional. You can find him on @wr0 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Workshops&amp;diff=254878</id>
		<title>2019 BASC Workshops</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Workshops&amp;diff=254878"/>
				<updated>2019-09-23T15:12:05Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Add CMD+CTRL&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Workshops}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
We would like to thank our workshop leaders for donating their time and effort to help make this conference successful.&lt;br /&gt;
&lt;br /&gt;
== All-Day Workshop ==&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|CMD+CTRL Cyber Range|Chad Holmes| | | }}&lt;br /&gt;
Want to test your skills in identifying web app vulnerabilities?  Join OWASP Boston and Security Innovation as members compete in [https://www.securityinnovation.com/training/cmd-ctrl-cyber-range-security-training/ CMD+CTRL] a web application cyber range where players exploit their way through hundreds of vulnerabilities that lurk in business applications today.  Success means learning quickly that attack and defense is all about thinking on your feet.&lt;br /&gt;
&lt;br /&gt;
For each vulnerability you uncover, you are awarded points. Climb the interactive leaderboard for a chance to win fantastic prizes! CMD+CTRL is ideal for development teams to train and develop skills, but anyone involved in keeping your organization’s data secure can play - from developers and managers and even CISOs. &lt;br /&gt;
&lt;br /&gt;
When you register for BASC and select to attend this CMD+CTRL Cyber Range workshop, a link will be provided so you can reserve your spot with Security Innovation. Spaces are limited. Register early to reserve your spot!    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Morning Workshops ==&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|The Ultimate Secure Coding Showdown|Joel Carlson| | | }}&lt;br /&gt;
Are. You. Ready? Head to the AppSec battlefield and prove that you are the ultimate secure coding champion. Go head-to-head with your peers as you test your web application security knowledge of the OWASP Top 10. Strut your skills. Crush the competition. Score excellent prizes and take home the title of Secure Code Warrior!&lt;br /&gt;
&lt;br /&gt;
Players will be presented with a series of vulnerable code challenges that will ask them to identify the problem, locate the insecure code, and fix the vulnerability. Select from a range of software languages to complete the tournament, including Java EE, Java Spring, C# MVC, C# WebForms, Ruby on Rails, Python Django, Scala Play &amp;amp; Node.JS. It’s gamified, it’s relevant, but most of all - it’s fun.&lt;br /&gt;
&lt;br /&gt;
Watch as you earn points and climb to the top of the real-time leaderboard during the event. Prizes will be awarded to the top 3 point scorers, with one security superhero being crowned the ultimate Secure Code Warrior. Will it be you?&lt;br /&gt;
&lt;br /&gt;
Psst: Want to test your secure coding skills at your own pace, without the competition? You’re welcome to come along and join the fun.&lt;br /&gt;
&lt;br /&gt;
'''''Participants must bring a laptop.'''''  &lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Zero to Hero: Intro to Web App Pentesting|Carson Owlett and Gabrielle Hempel| | | }}&lt;br /&gt;
As more information and functionality moves to the internet, the interface between end users and web application servers becomes increasingly vulnerable. Because of these visible vulnerabilities, penetration testing skills are in high demand; however, courses catering to beginners and those wanting to get a “foot in the door” are scarce. In this workshop, you can utilize a custom environment and expertise in order to begin your journey into offensive security. We will focus on four areas of web application penetration testing: injection, XSS, XXE, and insecure deserialization. This course welcomes total beginners and will be largely oriented towards those wanting to build a foundation in web application pentesting. &lt;br /&gt;
&lt;br /&gt;
'''''Users should have a laptop equipped with BurpSuite.'''''&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Capture Ever-Evolving Security Needs of Users with IKE and Proto-Research Persona Development|Prateek Jain and Ryan Lamarche| | | }}&lt;br /&gt;
In this workshop, grounded in design thinking approach, we demonstrate the software platform IKE and its process framework for persona development, which facilitate a fast, effective, and relatively inexpensive way to inform design decisions, such as those needed to encourage and enable users to effectively utilize security features. The IKE software platform not only facilitates a deeper understanding of user needs but also provides a Key performance Indicator (KPI) that can measure an organizations’ performance in gauging its target market evolving security needs.&lt;br /&gt;
&lt;br /&gt;
Understanding customers and what their needs are is paramount to the success of any organization. In security and privacy industry, users and their needs vary drastically depending on various factors like age, education, technology use, etc. Persona development is one of the useful tools to capture these needs. It can reveal security needs, pain points, habits, security challenges, etc. of the user base. The traditional approach to persona development is rigorous but time-consuming and resource-intensive. It doesn't account for fast changes in the technological world of privacy and security. These personas become outdated as soon as they are developed. At UXDM lab, we created a unique approach to persona development. We also developed a software platform called IKE for developing and managing personas. IKE treats personas as living documents to make effective design decisions and to follow evolving user needs over time.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|How to Talk to Humans|Kitty Huang and Roy Wattanasin| | | }}&lt;br /&gt;
Do you feel frustrated sometimes trying to help non-technical users? Do you find it challenging asking for more resources from management? Effective communication can help IT professionals to be more productive and be heard. This workshop demonstrates communication skills through scenarios that IT security engineers encounter regularly. We will decode written and verbal scripts by technical engineers and translate them into a communication style that non-technical people can understand and appreciate.  These cases include asking for more resources from upper management, making a suggestion to implement better security, and verifying the legitimacy of an email with an employee. Excessive workload, pressing deadlines and the lack of support can make IT engineers feel exhausted, hopeless and frustrated. This workshop provides perspectives on viewing various work situations in a different light. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Workshops ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Threat Modeling Workshop|Robert Hurlbut| | | }}&lt;br /&gt;
&lt;br /&gt;
Threat modeling is a way of thinking about what could go wrong and how to prevent it. Instinctively, we all think this way in regards to our own personal security and safety. When it comes to building software, some software shops either skip the important step of threat modeling in secure software design or, they have tried threat modeling before but haven't quite figured out how to connect the threat models to real world software development and its priorities. Threat modeling should be part of your secure software design process. Using threat modeling and some principals of risk management, you can design software in a way that makes security one of the top goals, along with performance, scalability, reliability, and maintenance.&lt;br /&gt;
&lt;br /&gt;
Objective: In this workshop, attendees will be introduced to Threat Modeling, learn how to conduct a Threat Modeling session, learn how to use practical strategies in finding Threats and proposing Countermeasures, and learn how to apply Risk Management in dealing with the threats. Depending on time, we will go through 1 or 2 Real World Threat Modeling case studies. Finally, we will end the day with the latest updates in Threat Modeling process, tools, etc.&lt;br /&gt;
&lt;br /&gt;
'''''Laptop recommended for some labs, but not required.'''''&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Effective Threat Modeling with CTM|Izar Tarandach and Allison Schoenfield| | | }}&lt;br /&gt;
Recently Autodesk open-sourced our Continuous Threat Modeling methodology, which aims to enable product teams to threat model every story in a quick and focused manner in order to scale the ability of an organization to keep up with rapid product changes, and enable developers to acquire a security &amp;quot;muscle memory&amp;quot; ability to really infuse their practices with security design capabilities. &lt;br /&gt;
&lt;br /&gt;
In this course you will learn how to perform and enable Continuous Threat Modeling in your organization and provide support to the learning curve of your product teams as a security SME.&lt;br /&gt;
&lt;br /&gt;
CTM is available at https://github.com/Autodesk/continuous-threat-modeling&lt;br /&gt;
A threat-modeling-as-code tool will also be introduced, available at https://github.com/izar/pytm&lt;br /&gt;
&lt;br /&gt;
'''''If you are new to the discipline of Threat Modeling we highly advise participating in the earlier Threat Modeling Workshop by Robert Hurlbut in order to solidify your understanding of the subject.'''''&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|AWS Cloud Security Fundamentals|Joshua Dow and Rami McCarthy | | | }}&lt;br /&gt;
As comfort and familiarity with cloud computing is now more mainstream, companies are leaning more and more on cloud resources to host and run even their most-sensitive technical assets. With these new technologies/innovations come new (and old!) security concerns. In this workshop, we will take participants through a baseline understanding of cloud security - with a focus on AWS security fundamentals. &lt;br /&gt;
&lt;br /&gt;
First, we will briefly outline the cloud security model, the similarities across platforms, and the shared responsibility model that Amazon employs. From there, we will introduce participants to open-source tooling for AWS account auditing and hardening, including NCC's own ScoutSuite. We will provide access to an intentionally vulnerable AWS environment, to allow workshop attendees to follow along and explore misconfigurations with their own eyes. We also will support attendees who want to immediately dive into auditing their own AWS accounts/environments. &lt;br /&gt;
&lt;br /&gt;
Next, we'll highlight easy wins for AWS security, that the audience will be able to immediately apply to their own environments. Following that, we'll speak to Amazon's built-in security tooling, including:&lt;br /&gt;
&lt;br /&gt;
* Security Hub&lt;br /&gt;
* Trusted Advisor&lt;br /&gt;
* CloudTrail&lt;br /&gt;
* Inspector&lt;br /&gt;
* GuardDuty&lt;br /&gt;
* Macie (and why it's probably wrong for you!)&lt;br /&gt;
&lt;br /&gt;
We'll focus on actionable guidance to walk away and be able to use these tools to harden your own posture. Subsequently, we'll work with attendees through the misconfigurations that led to the Capital One breach, via the CloudGoat scenario. Wrapping up, we'll provide a easy to follow cheatsheet of best practices, easy wins, and open source tools that attendees can reference to improve their own environments.&lt;br /&gt;
&lt;br /&gt;
'''''Users should bring a laptop having: administrator privileges, at least 8GB of RAM, 10GB of free disk space, the latest version of 64-bit Virtualbox installed, and USB ports for copying data.'''''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template|Workshops}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254830</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254830"/>
				<updated>2019-09-20T20:50:35Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Added Krishnan&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Mansour Ahmadi ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Mansour Ahmadi is a research associate at Northeastern University. Before coming to Northeastern, he obtained a PhD in Computer Engineering from the University of Cagliari in 2017. His research is mainly focused in applying machine learning methods for systems security problems, especially malware detection and classification, and vulnerability discovery. He co-authored over 10 scientific papers. Also, He is the lead developer of IntelliAV, which is the first on-device machine learning-based mobile malware detector. &lt;br /&gt;
&lt;br /&gt;
=== Joel Carlson ===&lt;br /&gt;
'''Secure Code Warrior'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joel Carlson is a security professional with 15 years of experience in the security industry. Joel has a long history of connecting businesses with security tools to help them ensure a secure environment. He joined Secure Code Warrior earlier this year after previous success at Veracode, Dell and Bitsight. &lt;br /&gt;
&lt;br /&gt;
=== Chris Chagnon ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Chagnon is an ITSM Architect and developer who designs, develops, and maintains award-winning experiences for managing and carrying out the ITSM process. Chris has a Master of Science in Information Technology, and a bachelor’s degree in Visual Communications. In addition, Chris is a PhD Candidate studying Information Systems with a focus on user and service experience. As A Top 25 Thought Leader in ITSM, and an ALE IT Vanguard, Chris speaks nationally about the future of ITSM, practical applications of artificial intelligence and machine learning, gamification, continual service improvement, and customer service/experience. Follow Chris on Twitter @Chagn0n.&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Joshua Dow ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joshua Dow is a Security Consultant with NCC Group, joining the organization in Spring of 2019. Joshua has made contributions in his career as both a blue team practitioner and a red team operator. Joshua specializes in web application penetration testing, network penetration testing, and cloud security auditing. Joshua worked as a Senior Software Engineer prior to getting his start in Information Security.&lt;br /&gt;
&lt;br /&gt;
=== Kristofer Duer ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristofer Duer is the Lead Cognitive Researcher for AppScan Source. He has worked in the application security field for the last 8 years in the world of Static Application Security Testing (SAST) and researching language specific attack surfaces. His particular specialty deals with applying machine learning to solve some of the impossible problems which occur naturally in the world of SAST - namely Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).&lt;br /&gt;
&lt;br /&gt;
Outside of work he enjoys the gym, Disc Golf (super fun!) and spending time with his wife and two kids.&lt;br /&gt;
&lt;br /&gt;
=== Reza Mirzazade Farkhani ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Reza Mirzazade Farkhani is pursuing a PhD in Cybersecurity at Northeastern University. His research interests span a wide range of topics in systems security with a particular focus on software vulnerability detection, exploit mitigation techniques and binary analysis. Currently, Reza is focusing on developing novel techniques to protect applications against memory safety vulnerabilities. He is especially interested in new security features in ARM architecture to accelerate the performance and security of the current systems. &lt;br /&gt;
&lt;br /&gt;
=== Gabrielle E. Hempel, CHTI ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for an institutional review board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as a penetration tester for Black Mirage while pursuing a certificate in Advanced Computer Security at Stanford. She continues to serve as a genetic scientist for NIH-regulated recombinant genetic studies, and serves as an instructor and mentor for a student cohort of cybersecurity analysts through Cybrary. She recently obtained her Certified Human Trafficking Investigator (CHTI) credentials through the McAfee Institute, and works with various law enforcement groups and task forces in order to combat human trafficking through digital forensics and analysis. Her area of expertise lies in GDPR/HIPAA/regulatory compliance and medical device security.&lt;br /&gt;
&lt;br /&gt;
=== Kitty Huang ===&lt;br /&gt;
'''Communications Trainer and Relationship Coach'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kitty Huang is an award-winning speaker who has led several fun and effective communication workshops at MIT, Harvard University, and corporate training events. She has worked as a copywriter at advertising agencies, a screenwriter for a television situation comedy, and a newspaper journalist. Her perceptive mind and creative approaches have successfully helped many individuals to solve problems in professional relationships and personal relationships. &lt;br /&gt;
&lt;br /&gt;
=== Robert Hurlbut ===&lt;br /&gt;
'''Bank of America'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Robert Hurlbut, is a Threat Modeling Architect / Lead at Bank of America. Robert is a Microsoft MVP for Developer Security and Technologies and holds the (ISC)2 CSSLP security certification. Robert has 30 years of industry experience in secure security, software architecture, and software development. He speaks at user groups, national and international conferences, and has provided training for many companies in the past. Robert is also a co-host of the Application Security Podcast (Twitter - @AppSecPodcast). Follow Robert on Twitter at @RobertHurlbut.&lt;br /&gt;
&lt;br /&gt;
=== Prateek Jain ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Prateek Jain is a UX researcher currently pursuing Ph.D. in Innovation with User Experience at Worcester Polytechnic Institute. His Ph.D. research focuses on User Experience. His research interests are augmented reality, internet of things (IoT), accessibility and persona development. He is working on multiple research projects focusing on the use of augmented reality and IoT to improve the user experience of products and services. Along with that, he is also working on developing and testing different persona frameworks to help organizations make effective design decisions.&lt;br /&gt;
&lt;br /&gt;
=== Artie Jurgenson ===&lt;br /&gt;
'''Sonatype'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Artie Jurgenson is a Solution Architect at Sonatype.  He spends his day to day working with companies small and large to apply the principles of DevSecOps and automation to their software development supply chains.  This stems from an intense distaste of performing the same procedures more than once.   Artie looks to resolve such redundancies both inside and out of his professional life which has led him down pursuits including: implementation of CI/CD toolchains and workflows from completely manual build/deploy processes, development and automation of crypto/forex trading algorithms, front-end test and deployment automation, container orchestration, API development, and computational scientific research optimized for supercomputer clusters.  Artie is happy to talk about any of the above at the reception.&lt;br /&gt;
&lt;br /&gt;
=== Aanand Krishnan ===&lt;br /&gt;
'''Tala Security'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Aanand Krishnan is the CEO and Founder of Tala Security.   Most recently he held senior technical roles at Symantec.  Aanand spent several years in M&amp;amp;A and investment banking  at Morgan Stanley and Dolby Labs acting as an adviser to leading security software, semiconductor and clean-tech companies. He started his career building high-speed optical networking products at Agilent Technologies. Aanand holds an MBA from Berkeley where he was a recipient of CJ White Fellowship, a Masters in Photonics and Optoelectronics from UC Santa Barbara where he was a QUEST Fellow and a Bachelors in Electrical Engineering with Honors from BITS, Pilani.&lt;br /&gt;
&lt;br /&gt;
=== Ryan LaMarche ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Ryan LaMarche is a digital transformation and design thinking expert that brings ideas to life with a focus on user experience, and smart system design. When Ryan isn’t building systems, he spends his time as a dual-enrolled Bachelor’s and Master’s student at Worcester Polytechnic Institute studying Computer Science and Innovation with UX. Ryan is also a founding member and CTO of Seldom Technologies where he works with companies to develop systems, applications, and websites and consult on process improvement in the ITSM space.&lt;br /&gt;
&lt;br /&gt;
=== Rami McCarthy ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rami McCarthy is a Security Consultant with NCC Group, joining with the acquisition of VSR in 2016. He's spent the past three years performing security assessments of all kinds, from SaaS products to cloud IoT platforms. In addition to client work, Rami has published research into misspelled security headers and Chromebook security. Rami got his start in security as an intern at a deep web threat analysis startup, and has a BS in CS from Northeastern University, with a concentration in cyber operations. He's currently working towards an MS from Brandeis University.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
In the past two years, Tal Melamed has been experimenting in offensive and defensive security for the serverless technology, as Head of Security Research at Protego Labs. He specializes in AppSec with more than 15 years of experience in security research and vulnerability assessment. Tal is also the leader and creator of the OWASP Serverless Top 10 and DVSA projects, and is a frequent speaker at security conferences, including DefCon, DerbyCon, OWASP, BSides and more. Follow Tal on Twitter at @_nu11p0inter&lt;br /&gt;
&lt;br /&gt;
=== Omid Mirzaei ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Omid Mirzaei is a postdoctoral research associate in the Systems Security (SecLab) and the Research in Software and Systems Security (RiS3) Labs at Northeastern University, working with Prof. Engin Kirda and Dr. Long Lu. Prior to this, Omid was an assistant professor in Universidad Carlos III de Madrid. Also, he spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and he received his PhD degree in Computer Science from the same university. Omid's thesis was mainly focused on Android malware analysis and triage. Generally speaking, Omid is working and conducting research in computer and cyber security. However, he is particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, he is eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources. Previously and as an undergraduate student, Omid worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Omid also developed several intelligent systems and passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.&lt;br /&gt;
&lt;br /&gt;
=== Carson E. Owlett, OSCP CEH ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Carson is a graduate of Connecticut College, where he studied Computer Science and Slavic Studies. After graduating, he obtained his OSCP and CEH and did a brief stint doing research for DARPA. He then founded Black Mirage in 2019, where he serves as the CEO and Assessment Team Lead for penetration tests, and he has been working to implement programs for offensive security education.&lt;br /&gt;
&lt;br /&gt;
=== Rashmi Patil ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rashmi is passionate about software engineering and applying it to solve complex problems in day to day life. She has a diverse set of work experience through past research, internships and full-time work experience that has really helped others in understanding the broader picture. In her free time, she volunteers and conducts educational workshops to teach young high school girls about the importance of Cybersecurity and encourage them to pursue a career in Computer Engineering. &lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Allison Schoenfield ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Allison Schoenfield is from Berkeley and also attended UC Berkeley, but is now a San Franciscan. She works as an Application Security Engineer at Autodesk. She enjoys threat modeling and working in partnership with developers to secure applications. Previously, she worked as a security consultant in penetration testing. In her free time, she likes to play social deduction games, bake and eat cupcakes, and mentor.&lt;br /&gt;
&lt;br /&gt;
=== Izar Tarandach ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Izar Tarandach is Lead Product Security Architect at Autodesk inc.. Prior, he was the Security Architect for Enterprise Hybrid Cloud at Dell EMC, for long before a Security Consultant at the EMC Product Security Office. With more years than he’s willing to admit to in the information security arena, he is a member of SAFECode Technical Leadership Council and a founding contributor to the IEEE Center for Security Design. He holds a masters degree in Computer Science/Security from Boston University and has served &lt;br /&gt;
as an instructor in Digital Forensics at Boston University and in Secure Development at the University of Oregon.&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina Valdivieso is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
=== Roy Wattanasin ===&lt;br /&gt;
'''Information Security Professional'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Roy Wattanasin is a healthcare information security professional. You can find him on @wr0 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Presentations&amp;diff=254829</id>
		<title>2019 BASC Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Presentations&amp;diff=254829"/>
				<updated>2019-09-20T20:47:50Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Add Krishnan talk&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template|Presentations}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
We would like to thank our speakers for donating their time and effort to help make this conference successful.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|An Intelligent Approach to Upgrading OSS Libraries|Madison Cool| | | }}&lt;br /&gt;
Maintaining secure versions of third-party libraries is a repetitive and tedious task at best. At worst, with many interdependent internal projects (think microservices) and dozens of layers of transitive dependencies, it is a logistical nightmare. A top-down, ad hoc approach is often used to resolve vulnerable third-party libraries, prioritizing high-severity vulnerabilities or internal projects critical to business functions, but failing to address the larger impact of vulnerabilities. TraceLink is taking a different approach, utilizing the graph structure of interconnected projects to perform security upgrades in an informed order from the bottom up. This process aims to automate third-party library version maintenance as much as possible, aiding in the completion of vital security upgrades and compounding the effects of each individual upgrade to reduce overall work done.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|OWASP Serverless Top 10|Tal Melamed| | | }}&lt;br /&gt;
In moving to serverless, we shift some security responsibilities to the infrastructure provider by eliminating the need to manage servers. Unfortunately, that doesn’t mean we’re entirely absolved of all security duties. Serverless functions still execute code and can still be vulnerable to application-level attacks. As a new type of architecture, serverless presents new security challenges. Some are equal to traditional application development, but some take a new form. Attackers are thinking differently, and developers must do so as well to gain the upper hand. &lt;br /&gt;
&lt;br /&gt;
In this talk, I will dive into the Top 10 risks of the OWASP Serverless Top 10 project. I will discuss why these risks are different from traditional attacks and how we should protect our application against them. I will also introduce OWASP DVSA, a deliberately vulnerable tool, aiming to assist both security professionals and developers to better understand the implications and processes of serverless security.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Security Culture Hacking: Disrupting the Security Status Quo|Chris Romeo| | | }}&lt;br /&gt;
This session is an exploration into the world of security culture hacking. In the wake of the “data breach of the day”, organizations claim they are more serious about security. The truth is that many still have weak security cultures. At the end of the day, how much actual security culture change occurs post-breach? The answer is not enough. This session describes how to change security culture from the inside out, utilizing best practices and real-world examples. With security culture disruption, the security team attempts to impact employees through positive security learning and experience.&lt;br /&gt;
&lt;br /&gt;
The session begins by introducing the audience to the concepts of security culture and security culture hacking, and then explains the security status quo. Security culture hacking is the skills and creativity necessary to disrupt an existing culture and redirect it towards a more secure future. Security status quo is the idea that companies move in a herd mentality and believe that their security must only be an average of their peers. To prove this point, we profile some anonymous organizations based on their external security story versus reality. Next, we’ll discuss what makes a good security culture hacker, including the skills required for success in this type of endeavor.&lt;br /&gt;
&lt;br /&gt;
The middle of this session includes a how-to of hacking security culture. Each section includes various tips and stories from real life experience about how to influence security culture. The phases of security culture improvement are explored, including awareness, big learning, and community. In addition, a discussion of organizational reach, marketing, rewards, recognition, and metrics surrounding security culture improvement are explored. It’s time to make security fun.&lt;br /&gt;
&lt;br /&gt;
At the conclusion, a plan is laid out for how a learner could put true security culture change into practice in their organization. Audience members receive a 30-60-90-1-year plan for how to implement true security culture change.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Critical Thinking in Cybersecurity|Kristin Dahl| | | }}&lt;br /&gt;
Security's most important skill is overlooked – critical thinking. Keeping up with the latest technical tools and trends is only one contributor to success. Security is a constantly evolving field. Long-term success requires that we think on our feet—regardless of technology—to understand tools and how to apply them to the changing landscape.&lt;br /&gt;
&lt;br /&gt;
We often do not think about critical thinking. What does it feel like? How is &amp;quot;critical&amp;quot; thinking different from &amp;quot;normal&amp;quot; thinking? How do you develop these skills?  And how do you apply them to security?&lt;br /&gt;
&lt;br /&gt;
Critical thinking is part art, part science. It takes a combination of intuition, logic, and creativity to understand the 'why' and not just the 'how.' It should help us address the root cause of an issue and not just the symptoms.  In security it means decomposing a problem, analyzing objectively, evaluating a hypothesis, and recognizing context. This session will explore how to apply critical thinking in your day-to-day job pulling from my experience and observations across academia, industry, and government.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Defending against the Acceleration of Client-Side Website Attacks|Aanand Krishnan| | | }}&lt;br /&gt;
The acceleration of attacks leading to the theft of private customer information, financial transaction data and disruptions to user experience are the number one threat to digital commerce. These attacks include first and third-party JavaScript/supply chain compromises, cross-site scripting (XSS), ad injections and other forms of client-side attacks. Client-side website attacks like Magecart have mostly targeted eCommerce sites with the sole purpose of stealing credit card info. Unfortunately, the reality is that the same attack vector – malicious JavaScript supply chain attacks – could be used to steal user banking credentials, PII data, healthcare data, or just about any information that users enter into a browser. Nearly every website is vulnerable. &lt;br /&gt;
Key Takeaways: Learn about the myriad of attack vectors threat-actors can leverage to compromise a website;&lt;br /&gt;
Learn about the standards-based, native website security controls most often recommended by security practitioners to secure your customer’s website experience; Learn about the compliance standards that require consideration for the website experience you provide to your customers.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Open Source Security on a Shoestring|Paulina Valdivieso| | | }}&lt;br /&gt;
Securing assets is a difficult job without the appropriate support, be it from your superiors or having access to resources: getting what you need can be challenging, but that is no excuse to not securing it. In small and medium companies where technology departments are service oriented, security is often overlooked in favor of ease of access, forcing IT to compromise on solutions and, potentially, leave the organization vulnerable.&lt;br /&gt;
&lt;br /&gt;
This talk will explore the open source and open access tools available to the public, their pros and cons, the elements to consider when implementing and the hurdles along the way, covering basic aspects of security in a company: incident response, application security, network security, training, risk &amp;amp; compliance, among others. Analysts, engineers and technicians whose many hats may result in security holes benefit from the implementation of these tools… and managers from knowing alternatives to the increasingly costly solutions in the market.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Put that Cease and Desist Down: How to Train Your Org to Work with Hackers|Luke Tucker| | | }}&lt;br /&gt;
Before that hacker slides into your brand’s DMs, how do you prepare your organization to talk to researchers and spot vulnerability disclosure? Today, poorly handled disclosures can cause the same reputational damage as a public security incident. As security continues to climb the ranks of importance, more decision makers and stakeholders are involved in interactions that were once solely owned by security teams. The vulnerability reports are coming. Ready or not. Everyone is on the front lines of security and this includes researcher interactions. Are your executives, legal, PR, and social media teams prepared?&lt;br /&gt;
&lt;br /&gt;
Based on hundreds of hacker and company mediation request, this talk will look at common and extreme scenarios many are seeing for the first time. We will cover real-world communication failures, as well as the success stories you will never read about. Attendees will walk away with armed with practical tips to prepare their colleagues for the inevitable vulnerability report, starting with hacker motivations, what disclosure success looks like, and de-escalation tips. This talk will cover: Responding to vulnerabilities reported via social media; How to minimize the chances of your vulnerabilities ending up on Twitter; Tips for keeping the press out of your bug reporting workflow; Prepare your company to talk to a hacker who is requesting cash; De-escalation tips to find a happy f@%#&amp;amp;$* ending when tempers flare and you are caught in the middle; and How to advocate for security researchers without losing friends or your job.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Identifying Malicious Android Applications in the Presence of Adversaries: A Cat-and-Mouse Game|Omid Mirzaei| | | }}&lt;br /&gt;
Android is by far the leading operating system in smartphones. As of March 2019, 51% of US smartphone subscribers were using a Google Android device. This percentage is much higher in an international scale. Also, there are currently more than 2 million Android applications on the official Google Market, known as Google Play. As most of the functionalities of smartphones are provided to users via applications, this huge market with billions of users is tempting for attackers to develop and distribute their malicious applications (or malware).&lt;br /&gt;
&lt;br /&gt;
Mobile malware has raised explosively since 2009. Symantec reported an increase of 54% in the new mobile malware variants in 2017 as compared to the previous year. This rise has happened for Android malware as well since only 20% of devices are running the newest major version of Android OS based on Symantec report in 2018. Thus, detecting malicious and potentially risky applications in the Android platform is of the utmost importance. During this talk, I will summarize different automated techniques proposed for Android malware detection and risk assessment. Along with this, I will discuss how adversaries have tried to bypass these mechanisms.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Automate or Die - DevSecOps in the Age of Software Supply Chain Attacks|Artie Jurgenson| | | }}&lt;br /&gt;
As nimble organizations deliver new innovations, adversaries are also upping their game; something we’ve seen in recent high profile and devastating cyber attacks. Bad actors have the intent and ability to exploit security vulnerabilities in the software supply chain - and in some cases plant vulnerabilities themselves. They have increased scale through automation and improved breach success through precision targeting. If we don’t fight back by doing the same - automating security directly in the DevOps pipeline - then we’ll always be at the hackers’ mercy. This session will provide new research on the above, and details on how to get started.&lt;br /&gt;
&lt;br /&gt;
Key takeaways: Real-world examples of how large and small companies are implementing DevSecOps practices in their own delivery pipelines, and increasing developer awareness to risks; Key insights from the 2019 DevSecOps community report - including the top investments for automated security; A walkthrough of how security principles have been automated into a CICD pipeline and what standards for implementation are beginning to follow suite; Why DevSecOps is more than a buzzword, and why it’s vital to protecting your software supply chain; How automating security of policies makes it harder to ignore.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Finding Bugs Using Your Own Code: Machine Learning-based Inconsistent Code Detection|Mansour Ahmadi and Reza Mirzazade Farkhani| | | }}&lt;br /&gt;
Machine learning has shown success in detecting known types of software vulnerabilities in recent years, but they mostly need extensive specimens to train their models. &lt;br /&gt;
&lt;br /&gt;
As a new alternative to such approaches, we present a learning-based technique that can identify potentially buggy code snippets which deviate from most of the code snippets implementing similar functionalities. Our approach learns from a codebase itself without the need for the cumbersome task of gathering and cleansing training samples. The core idea is that various kinds of bugs can be viewed as inconsistencies that deviate from non-buggy code that implement the same or similar logic.&lt;br /&gt;
&lt;br /&gt;
More specifically, we design a two-step clustering technique to find functionally-similar yet inconsistent code in software. We implemented our system on top of LLVM, which makes our approach language-agnostic.&lt;br /&gt;
&lt;br /&gt;
We evaluated our tool on 4 popular open source security software codebases, such as OpenSSL, OpenSSH, WolfSSL, and Mbedtls. Our tool discovered 10 new unique deep bugs (some are exploitable), despite that some of these codebases are constantly undergoing vulnerability scans. All of the bugs have been confirmed by their developers and later fixed by either our pull requests or the developers.&lt;br /&gt;
&lt;br /&gt;
How does the system work really? How easy to find bugs by our approach and how much manual effort does it need? What is a proper code granularity for detecting inconsistencies?&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|SAST Triage Tricks of the Trade - How to Triage Before the Universe Dies Out|Kristofer Duer and Rashmi Patil| | | }}&lt;br /&gt;
Ever gotten a pile of SAST findings and wondered - what now? How do you possibly trim the fat of uninteresting findings down to a manageable set and get to work making the world a safer place? We will talk about some easy tips on how to prioritize and isolate those results which matter the most to your organization.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|The User Experience of Information Security|Chris Chagnon and Ryan LaMarche| | | }}&lt;br /&gt;
Targeted and increasingly sophisticated attacks are growing in popularity. With spear-phishing, ransomware, and a slew of other user-oriented attacks, our information security, particularly our operational security, relies on having our users on board. But training end-users can be difficult, and our response to mitigating these attacks can sometimes come at a great expense to UX. This session delves into the User Experience of Information Security, and provides attendees with insights into how some of our best laid security measures might actually increase our vulnerability to future attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template|Presentations}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=254818</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=254818"/>
				<updated>2019-09-19T21:53:25Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Added Gold Netsparker&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nccgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Ordr Logo Tag.jpg|link=https://www.ordr.net/|180x1280px|Ordr]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:WhiteHat Primary Logo 2COLOR HIRES.jpg|link=https://www.whitehatsec.com/|180x1280px|WhiteHat]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
        &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:blackduck-synopsys-299x91.png|link=https://www.blackducksoftware.com/|299x91px|Black Duck Software]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Optiv Logo.jpg|link=https://www.optiv.com/|299x91px|Optiv]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:CA_vanguard_417x124.png|link=http://www.veracode.com/|317x104px|Veracode]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|160x71px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Netsparker-logo-transparent-h1000px-color.png|link=http://www.netsparker.com//|160x71px|Netsparker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:HackerOne_Logo_.jpg|link=https://www.hackerone.com/|170x50px|HackerOne]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_new.png|link=https://checkmarx.com|270x57px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TCell_V_GRD_CLR_RGB-800-160x128.png|link=https://www.tcell.io/|160x128px|tCell.io]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            [[File:AccuvantA10.png|link=https://www.accuvant.com/|170x78px|Accuvant]]&lt;br /&gt;
            &amp;amp;emsp;[[File:LOGOcontrast299x97.gif|link=http://contrastsecurity.com|299x97px|Contrast Security]]&lt;br /&gt;
            &amp;amp;emsp;&amp;amp;emsp;[[File:NetSPI Logo offset.jpg|link=http://netspi.com|180x90px|NetSPI]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Dell_Logo_Blue_rgb-125x125.png|link=http://www.dell.com/|125x125px|Dell]]&amp;lt;/span&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|243x77px|Qualys]]&lt;br /&gt;
            [[File:Nvisium-full_color-on_light_bg.png|link=https://nvisium.com|234x102px|nVisium]]&lt;br /&gt;
            [[File:GoSecure_Artboard_1@2x_(002)998x242.png|link=https://gosecure.net|250x280px|GoSecure]]&lt;br /&gt;
		&amp;lt;/p&amp;gt;&lt;br /&gt;
		&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 15%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
           &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TWM_logo_for_Boston_OWASP_2018_-_white_(CP).jpg|link=http://TokenizeWhatMatters.com//|160x71px|TWM]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Bugcrowd.jpg|link=http://www.bugcrowd.com/|248x49px|bugcrowd]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            [[File:Stormpath-blue-logo-218x52.png|link=https://www.stormpath.com/|218x52px|Stormpath]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Facebook.PNG|link=http://www.facebook.com|206x62px|Facebook]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Synopsys L|link=http://www.synopsys.com/home.aspx|150x45px|Synopsys]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
    &amp;lt;br/&amp;gt;Silver Sponsorships are available: See [[Media:BASCSponsorship2019.pdf|Sponsorship Kit]]&amp;lt;br/&amp;gt;&lt;br /&gt;
        &lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=254817</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=254817"/>
				<updated>2019-09-19T20:52:49Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Added Platinum WhiteHat Security&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nccgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Ordr Logo Tag.jpg|link=https://www.ordr.net/|180x1280px|Ordr]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:WhiteHat Primary Logo 2COLOR HIRES.jpg|link=https://www.whitehatsec.com/|180x1280px|WhiteHat]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
        &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:blackduck-synopsys-299x91.png|link=https://www.blackducksoftware.com/|299x91px|Black Duck Software]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Optiv Logo.jpg|link=https://www.optiv.com/|299x91px|Optiv]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:CA_vanguard_417x124.png|link=http://www.veracode.com/|317x104px|Veracode]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|160x71px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:HackerOne_Logo_.jpg|link=https://www.hackerone.com/|170x50px|HackerOne]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_new.png|link=https://checkmarx.com|270x57px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TCell_V_GRD_CLR_RGB-800-160x128.png|link=https://www.tcell.io/|160x128px|tCell.io]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            [[File:AccuvantA10.png|link=https://www.accuvant.com/|170x78px|Accuvant]]&lt;br /&gt;
            &amp;amp;emsp;[[File:LOGOcontrast299x97.gif|link=http://contrastsecurity.com|299x97px|Contrast Security]]&lt;br /&gt;
            &amp;amp;emsp;&amp;amp;emsp;[[File:NetSPI Logo offset.jpg|link=http://netspi.com|180x90px|NetSPI]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Dell_Logo_Blue_rgb-125x125.png|link=http://www.dell.com/|125x125px|Dell]]&amp;lt;/span&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|243x77px|Qualys]]&lt;br /&gt;
            [[File:Nvisium-full_color-on_light_bg.png|link=https://nvisium.com|234x102px|nVisium]]&lt;br /&gt;
            [[File:GoSecure_Artboard_1@2x_(002)998x242.png|link=https://gosecure.net|250x280px|GoSecure]]&lt;br /&gt;
		&amp;lt;/p&amp;gt;&lt;br /&gt;
		&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 15%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
           &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TWM_logo_for_Boston_OWASP_2018_-_white_(CP).jpg|link=http://TokenizeWhatMatters.com//|160x71px|TWM]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Bugcrowd.jpg|link=http://www.bugcrowd.com/|248x49px|bugcrowd]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            [[File:Stormpath-blue-logo-218x52.png|link=https://www.stormpath.com/|218x52px|Stormpath]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Facebook.PNG|link=http://www.facebook.com|206x62px|Facebook]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Synopsys L|link=http://www.synopsys.com/home.aspx|150x45px|Synopsys]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
    &amp;lt;br/&amp;gt;Silver Sponsorships are available: See [[Media:BASCSponsorship2019.pdf|Sponsorship Kit]]&amp;lt;br/&amp;gt;&lt;br /&gt;
        &lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:WhiteHat_Primary_Logo_2COLOR_HIRES.jpg&amp;diff=254816</id>
		<title>File:WhiteHat Primary Logo 2COLOR HIRES.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:WhiteHat_Primary_Logo_2COLOR_HIRES.jpg&amp;diff=254816"/>
				<updated>2019-09-19T20:50:40Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:WhiteHat_Logo_Primary_PANTONE_for_White_Bkgrd.eps&amp;diff=254809</id>
		<title>File:WhiteHat Logo Primary PANTONE for White Bkgrd.eps</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:WhiteHat_Logo_Primary_PANTONE_for_White_Bkgrd.eps&amp;diff=254809"/>
				<updated>2019-09-19T13:32:24Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=254808</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=254808"/>
				<updated>2019-09-19T13:26:04Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Added Platinum Ordr Logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nccgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Ordr Logo Tag.jpg|link=https://www.ordr.net/|180x1280px|Ordr]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
        &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:blackduck-synopsys-299x91.png|link=https://www.blackducksoftware.com/|299x91px|Black Duck Software]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Optiv Logo.jpg|link=https://www.optiv.com/|299x91px|Optiv]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:CA_vanguard_417x124.png|link=http://www.veracode.com/|317x104px|Veracode]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|160x71px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:HackerOne_Logo_.jpg|link=https://www.hackerone.com/|170x50px|HackerOne]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_new.png|link=https://checkmarx.com|270x57px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TCell_V_GRD_CLR_RGB-800-160x128.png|link=https://www.tcell.io/|160x128px|tCell.io]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            [[File:AccuvantA10.png|link=https://www.accuvant.com/|170x78px|Accuvant]]&lt;br /&gt;
            &amp;amp;emsp;[[File:LOGOcontrast299x97.gif|link=http://contrastsecurity.com|299x97px|Contrast Security]]&lt;br /&gt;
            &amp;amp;emsp;&amp;amp;emsp;[[File:NetSPI Logo offset.jpg|link=http://netspi.com|180x90px|NetSPI]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Dell_Logo_Blue_rgb-125x125.png|link=http://www.dell.com/|125x125px|Dell]]&amp;lt;/span&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|243x77px|Qualys]]&lt;br /&gt;
            [[File:Nvisium-full_color-on_light_bg.png|link=https://nvisium.com|234x102px|nVisium]]&lt;br /&gt;
            [[File:GoSecure_Artboard_1@2x_(002)998x242.png|link=https://gosecure.net|250x280px|GoSecure]]&lt;br /&gt;
		&amp;lt;/p&amp;gt;&lt;br /&gt;
		&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 15%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
           &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TWM_logo_for_Boston_OWASP_2018_-_white_(CP).jpg|link=http://TokenizeWhatMatters.com//|160x71px|TWM]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Bugcrowd.jpg|link=http://www.bugcrowd.com/|248x49px|bugcrowd]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            [[File:Stormpath-blue-logo-218x52.png|link=https://www.stormpath.com/|218x52px|Stormpath]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Facebook.PNG|link=http://www.facebook.com|206x62px|Facebook]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Synopsys L|link=http://www.synopsys.com/home.aspx|150x45px|Synopsys]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
    &amp;lt;br/&amp;gt;Silver Sponsorships are available: See [[Media:BASCSponsorship2019.pdf|Sponsorship Kit]]&amp;lt;br/&amp;gt;&lt;br /&gt;
        &lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Ordr_Logo_Tag.jpg&amp;diff=254807</id>
		<title>File:Ordr Logo Tag.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Ordr_Logo_Tag.jpg&amp;diff=254807"/>
				<updated>2019-09-19T13:22:13Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254793</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254793"/>
				<updated>2019-09-17T20:25:05Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Changed Artie Jurgenson to 3rd person.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Mansour Ahmadi ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Mansour Ahmadi is a research associate at Northeastern University. Before coming to Northeastern, he obtained a PhD in Computer Engineering from the University of Cagliari in 2017. His research is mainly focused in applying machine learning methods for systems security problems, especially malware detection and classification, and vulnerability discovery. He co-authored over 10 scientific papers. Also, He is the lead developer of IntelliAV, which is the first on-device machine learning-based mobile malware detector. &lt;br /&gt;
&lt;br /&gt;
=== Joel Carlson ===&lt;br /&gt;
'''Secure Code Warrior'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joel Carlson is a security professional with 15 years of experience in the security industry. Joel has a long history of connecting businesses with security tools to help them ensure a secure environment. He joined Secure Code Warrior earlier this year after previous success at Veracode, Dell and Bitsight. &lt;br /&gt;
&lt;br /&gt;
=== Chris Chagnon ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Chagnon is an ITSM Architect and developer who designs, develops, and maintains award-winning experiences for managing and carrying out the ITSM process. Chris has a Master of Science in Information Technology, and a bachelor’s degree in Visual Communications. In addition, Chris is a PhD Candidate studying Information Systems with a focus on user and service experience. As A Top 25 Thought Leader in ITSM, and an ALE IT Vanguard, Chris speaks nationally about the future of ITSM, practical applications of artificial intelligence and machine learning, gamification, continual service improvement, and customer service/experience. Follow Chris on Twitter @Chagn0n.&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Joshua Dow ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joshua Dow is a Security Consultant with NCC Group, joining the organization in Spring of 2019. Joshua has made contributions in his career as both a blue team practitioner and a red team operator. Joshua specializes in web application penetration testing, network penetration testing, and cloud security auditing. Joshua worked as a Senior Software Engineer prior to getting his start in Information Security.&lt;br /&gt;
&lt;br /&gt;
=== Kristofer Duer ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristofer Duer is the Lead Cognitive Researcher for AppScan Source. He has worked in the application security field for the last 8 years in the world of Static Application Security Testing (SAST) and researching language specific attack surfaces. His particular specialty deals with applying machine learning to solve some of the impossible problems which occur naturally in the world of SAST - namely Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).&lt;br /&gt;
&lt;br /&gt;
Outside of work he enjoys the gym, Disc Golf (super fun!) and spending time with his wife and two kids.&lt;br /&gt;
&lt;br /&gt;
=== Reza Mirzazade Farkhani ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Reza Mirzazade Farkhani is pursuing a PhD in Cybersecurity at Northeastern University. His research interests span a wide range of topics in systems security with a particular focus on software vulnerability detection, exploit mitigation techniques and binary analysis. Currently, Reza is focusing on developing novel techniques to protect applications against memory safety vulnerabilities. He is especially interested in new security features in ARM architecture to accelerate the performance and security of the current systems. &lt;br /&gt;
&lt;br /&gt;
=== Gabrielle E. Hempel, CHTI ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for an institutional review board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as a penetration tester for Black Mirage while pursuing a certificate in Advanced Computer Security at Stanford. She continues to serve as a genetic scientist for NIH-regulated recombinant genetic studies, and serves as an instructor and mentor for a student cohort of cybersecurity analysts through Cybrary. She recently obtained her Certified Human Trafficking Investigator (CHTI) credentials through the McAfee Institute, and works with various law enforcement groups and task forces in order to combat human trafficking through digital forensics and analysis. Her area of expertise lies in GDPR/HIPAA/regulatory compliance and medical device security.&lt;br /&gt;
&lt;br /&gt;
=== Kitty Huang ===&lt;br /&gt;
'''Communications Trainer and Relationship Coach'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kitty Huang is an award-winning speaker who has led several fun and effective communication workshops at MIT, Harvard University, and corporate training events. She has worked as a copywriter at advertising agencies, a screenwriter for a television situation comedy, and a newspaper journalist. Her perceptive mind and creative approaches have successfully helped many individuals to solve problems in professional relationships and personal relationships. &lt;br /&gt;
&lt;br /&gt;
=== Robert Hurlbut ===&lt;br /&gt;
'''Bank of America'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Robert Hurlbut, is a Threat Modeling Architect / Lead at Bank of America. Robert is a Microsoft MVP for Developer Security and Technologies and holds the (ISC)2 CSSLP security certification. Robert has 30 years of industry experience in secure security, software architecture, and software development. He speaks at user groups, national and international conferences, and has provided training for many companies in the past. Robert is also a co-host of the Application Security Podcast (Twitter - @AppSecPodcast). Follow Robert on Twitter at @RobertHurlbut.&lt;br /&gt;
&lt;br /&gt;
=== Prateek Jain ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Prateek Jain is a UX researcher currently pursuing Ph.D. in Innovation with User Experience at Worcester Polytechnic Institute. His Ph.D. research focuses on User Experience. His research interests are augmented reality, internet of things (IoT), accessibility and persona development. He is working on multiple research projects focusing on the use of augmented reality and IoT to improve the user experience of products and services. Along with that, he is also working on developing and testing different persona frameworks to help organizations make effective design decisions.&lt;br /&gt;
&lt;br /&gt;
=== Artie Jurgenson ===&lt;br /&gt;
'''Sonatype'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Artie Jurgenson is a Solution Architect at Sonatype.  He spends his day to day working with companies small and large to apply the principles of DevSecOps and automation to their software development supply chains.  This stems from an intense distaste of performing the same procedures more than once.   Artie looks to resolve such redundancies both inside and out of his professional life which has led him down pursuits including: implementation of CI/CD toolchains and workflows from completely manual build/deploy processes, development and automation of crypto/forex trading algorithms, front-end test and deployment automation, container orchestration, API development, and computational scientific research optimized for supercomputer clusters.  Artie is happy to talk about any of the above at the reception.&lt;br /&gt;
&lt;br /&gt;
=== Ryan LaMarche ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Ryan LaMarche is a digital transformation and design thinking expert that brings ideas to life with a focus on user experience, and smart system design. When Ryan isn’t building systems, he spends his time as a dual-enrolled Bachelor’s and Master’s student at Worcester Polytechnic Institute studying Computer Science and Innovation with UX. Ryan is also a founding member and CTO of Seldom Technologies where he works with companies to develop systems, applications, and websites and consult on process improvement in the ITSM space.&lt;br /&gt;
&lt;br /&gt;
=== Rami McCarthy ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rami McCarthy is a Security Consultant with NCC Group, joining with the acquisition of VSR in 2016. He's spent the past three years performing security assessments of all kinds, from SaaS products to cloud IoT platforms. In addition to client work, Rami has published research into misspelled security headers and Chromebook security. Rami got his start in security as an intern at a deep web threat analysis startup, and has a BS in CS from Northeastern University, with a concentration in cyber operations. He's currently working towards an MS from Brandeis University.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
In the past two years, Tal Melamed has been experimenting in offensive and defensive security for the serverless technology, as Head of Security Research at Protego Labs. He specializes in AppSec with more than 15 years of experience in security research and vulnerability assessment. Tal is also the leader and creator of the OWASP Serverless Top 10 and DVSA projects, and is a frequent speaker at security conferences, including DefCon, DerbyCon, OWASP, BSides and more. Follow Tal on Twitter at @_nu11p0inter&lt;br /&gt;
&lt;br /&gt;
=== Omid Mirzaei ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Omid Mirzaei is a postdoctoral research associate in the Systems Security (SecLab) and the Research in Software and Systems Security (RiS3) Labs at Northeastern University, working with Prof. Engin Kirda and Dr. Long Lu. Prior to this, Omid was an assistant professor in Universidad Carlos III de Madrid. Also, he spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and he received his PhD degree in Computer Science from the same university. Omid's thesis was mainly focused on Android malware analysis and triage. Generally speaking, Omid is working and conducting research in computer and cyber security. However, he is particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, he is eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources. Previously and as an undergraduate student, Omid worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Omid also developed several intelligent systems and passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.&lt;br /&gt;
&lt;br /&gt;
=== Carson E. Owlett, OSCP CEH ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Carson is a graduate of Connecticut College, where he studied Computer Science and Slavic Studies. After graduating, he obtained his OSCP and CEH and did a brief stint doing research for DARPA. He then founded Black Mirage in 2019, where he serves as the CEO and Assessment Team Lead for penetration tests, and he has been working to implement programs for offensive security education.&lt;br /&gt;
&lt;br /&gt;
=== Rashmi Patil ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rashmi is passionate about software engineering and applying it to solve complex problems in day to day life. She has a diverse set of work experience through past research, internships and full-time work experience that has really helped others in understanding the broader picture. In her free time, she volunteers and conducts educational workshops to teach young high school girls about the importance of Cybersecurity and encourage them to pursue a career in Computer Engineering. &lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Allison Schoenfield ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Allison Schoenfield is from Berkeley and also attended UC Berkeley, but is now a San Franciscan. She works as an Application Security Engineer at Autodesk. She enjoys threat modeling and working in partnership with developers to secure applications. Previously, she worked as a security consultant in penetration testing. In her free time, she likes to play social deduction games, bake and eat cupcakes, and mentor.&lt;br /&gt;
&lt;br /&gt;
=== Izar Tarandach ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Izar Tarandach is Lead Product Security Architect at Autodesk inc.. Prior, he was the Security Architect for Enterprise Hybrid Cloud at Dell EMC, for long before a Security Consultant at the EMC Product Security Office. With more years than he’s willing to admit to in the information security arena, he is a member of SAFECode Technical Leadership Council and a founding contributor to the IEEE Center for Security Design. He holds a masters degree in Computer Science/Security from Boston University and has served &lt;br /&gt;
as an instructor in Digital Forensics at Boston University and in Secure Development at the University of Oregon.&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina Valdivieso is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
=== Roy Wattanasin ===&lt;br /&gt;
'''Information Security Professional'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Roy Wattanasin is a healthcare information security professional. You can find him on @wr0 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254792</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254792"/>
				<updated>2019-09-17T20:21:21Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Artie Jurgenson instead of Brian Fox&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Mansour Ahmadi ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Mansour Ahmadi is a research associate at Northeastern University. Before coming to Northeastern, he obtained a PhD in Computer Engineering from the University of Cagliari in 2017. His research is mainly focused in applying machine learning methods for systems security problems, especially malware detection and classification, and vulnerability discovery. He co-authored over 10 scientific papers. Also, He is the lead developer of IntelliAV, which is the first on-device machine learning-based mobile malware detector. &lt;br /&gt;
&lt;br /&gt;
=== Joel Carlson ===&lt;br /&gt;
'''Secure Code Warrior'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joel Carlson is a security professional with 15 years of experience in the security industry. Joel has a long history of connecting businesses with security tools to help them ensure a secure environment. He joined Secure Code Warrior earlier this year after previous success at Veracode, Dell and Bitsight. &lt;br /&gt;
&lt;br /&gt;
=== Chris Chagnon ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Chagnon is an ITSM Architect and developer who designs, develops, and maintains award-winning experiences for managing and carrying out the ITSM process. Chris has a Master of Science in Information Technology, and a bachelor’s degree in Visual Communications. In addition, Chris is a PhD Candidate studying Information Systems with a focus on user and service experience. As A Top 25 Thought Leader in ITSM, and an ALE IT Vanguard, Chris speaks nationally about the future of ITSM, practical applications of artificial intelligence and machine learning, gamification, continual service improvement, and customer service/experience. Follow Chris on Twitter @Chagn0n.&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Joshua Dow ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joshua Dow is a Security Consultant with NCC Group, joining the organization in Spring of 2019. Joshua has made contributions in his career as both a blue team practitioner and a red team operator. Joshua specializes in web application penetration testing, network penetration testing, and cloud security auditing. Joshua worked as a Senior Software Engineer prior to getting his start in Information Security.&lt;br /&gt;
&lt;br /&gt;
=== Kristofer Duer ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristofer Duer is the Lead Cognitive Researcher for AppScan Source. He has worked in the application security field for the last 8 years in the world of Static Application Security Testing (SAST) and researching language specific attack surfaces. His particular specialty deals with applying machine learning to solve some of the impossible problems which occur naturally in the world of SAST - namely Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).&lt;br /&gt;
&lt;br /&gt;
Outside of work he enjoys the gym, Disc Golf (super fun!) and spending time with his wife and two kids.&lt;br /&gt;
&lt;br /&gt;
=== Reza Mirzazade Farkhani ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Reza Mirzazade Farkhani is pursuing a PhD in Cybersecurity at Northeastern University. His research interests span a wide range of topics in systems security with a particular focus on software vulnerability detection, exploit mitigation techniques and binary analysis. Currently, Reza is focusing on developing novel techniques to protect applications against memory safety vulnerabilities. He is especially interested in new security features in ARM architecture to accelerate the performance and security of the current systems. &lt;br /&gt;
&lt;br /&gt;
=== Gabrielle E. Hempel, CHTI ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for an institutional review board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as a penetration tester for Black Mirage while pursuing a certificate in Advanced Computer Security at Stanford. She continues to serve as a genetic scientist for NIH-regulated recombinant genetic studies, and serves as an instructor and mentor for a student cohort of cybersecurity analysts through Cybrary. She recently obtained her Certified Human Trafficking Investigator (CHTI) credentials through the McAfee Institute, and works with various law enforcement groups and task forces in order to combat human trafficking through digital forensics and analysis. Her area of expertise lies in GDPR/HIPAA/regulatory compliance and medical device security.&lt;br /&gt;
&lt;br /&gt;
=== Kitty Huang ===&lt;br /&gt;
'''Communications Trainer and Relationship Coach'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kitty Huang is an award-winning speaker who has led several fun and effective communication workshops at MIT, Harvard University, and corporate training events. She has worked as a copywriter at advertising agencies, a screenwriter for a television situation comedy, and a newspaper journalist. Her perceptive mind and creative approaches have successfully helped many individuals to solve problems in professional relationships and personal relationships. &lt;br /&gt;
&lt;br /&gt;
=== Robert Hurlbut ===&lt;br /&gt;
'''Bank of America'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Robert Hurlbut, is a Threat Modeling Architect / Lead at Bank of America. Robert is a Microsoft MVP for Developer Security and Technologies and holds the (ISC)2 CSSLP security certification. Robert has 30 years of industry experience in secure security, software architecture, and software development. He speaks at user groups, national and international conferences, and has provided training for many companies in the past. Robert is also a co-host of the Application Security Podcast (Twitter - @AppSecPodcast). Follow Robert on Twitter at @RobertHurlbut.&lt;br /&gt;
&lt;br /&gt;
=== Prateek Jain ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Prateek Jain is a UX researcher currently pursuing Ph.D. in Innovation with User Experience at Worcester Polytechnic Institute. His Ph.D. research focuses on User Experience. His research interests are augmented reality, internet of things (IoT), accessibility and persona development. He is working on multiple research projects focusing on the use of augmented reality and IoT to improve the user experience of products and services. Along with that, he is also working on developing and testing different persona frameworks to help organizations make effective design decisions.&lt;br /&gt;
&lt;br /&gt;
=== Artie Jurgenson ===&lt;br /&gt;
'''Sonatype'''&amp;lt;br/&amp;gt;&lt;br /&gt;
I spend my day to day working with companies small and large to apply the principles of DevSecOps and automation to their software development supply chains.  This stems from an intense distaste of performing the same procedures more than once.  I look to resolve such redundancies both inside and out of my professional life which has led me down pursuits including: implementation of CI/CD toolchains and workflows from completely manual build/deploy processes, development and automation of crypto/forex trading algorithms, front-end test and deployment automation, container orchestration, API development, and computational scientific research optimized for supercomputer clusters.  Happy to talk about any of the above at the reception.&lt;br /&gt;
&lt;br /&gt;
=== Ryan LaMarche ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Ryan LaMarche is a digital transformation and design thinking expert that brings ideas to life with a focus on user experience, and smart system design. When Ryan isn’t building systems, he spends his time as a dual-enrolled Bachelor’s and Master’s student at Worcester Polytechnic Institute studying Computer Science and Innovation with UX. Ryan is also a founding member and CTO of Seldom Technologies where he works with companies to develop systems, applications, and websites and consult on process improvement in the ITSM space.&lt;br /&gt;
&lt;br /&gt;
=== Rami McCarthy ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rami McCarthy is a Security Consultant with NCC Group, joining with the acquisition of VSR in 2016. He's spent the past three years performing security assessments of all kinds, from SaaS products to cloud IoT platforms. In addition to client work, Rami has published research into misspelled security headers and Chromebook security. Rami got his start in security as an intern at a deep web threat analysis startup, and has a BS in CS from Northeastern University, with a concentration in cyber operations. He's currently working towards an MS from Brandeis University.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
In the past two years, Tal Melamed has been experimenting in offensive and defensive security for the serverless technology, as Head of Security Research at Protego Labs. He specializes in AppSec with more than 15 years of experience in security research and vulnerability assessment. Tal is also the leader and creator of the OWASP Serverless Top 10 and DVSA projects, and is a frequent speaker at security conferences, including DefCon, DerbyCon, OWASP, BSides and more. Follow Tal on Twitter at @_nu11p0inter&lt;br /&gt;
&lt;br /&gt;
=== Omid Mirzaei ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Omid Mirzaei is a postdoctoral research associate in the Systems Security (SecLab) and the Research in Software and Systems Security (RiS3) Labs at Northeastern University, working with Prof. Engin Kirda and Dr. Long Lu. Prior to this, Omid was an assistant professor in Universidad Carlos III de Madrid. Also, he spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and he received his PhD degree in Computer Science from the same university. Omid's thesis was mainly focused on Android malware analysis and triage. Generally speaking, Omid is working and conducting research in computer and cyber security. However, he is particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, he is eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources. Previously and as an undergraduate student, Omid worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Omid also developed several intelligent systems and passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.&lt;br /&gt;
&lt;br /&gt;
=== Carson E. Owlett, OSCP CEH ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Carson is a graduate of Connecticut College, where he studied Computer Science and Slavic Studies. After graduating, he obtained his OSCP and CEH and did a brief stint doing research for DARPA. He then founded Black Mirage in 2019, where he serves as the CEO and Assessment Team Lead for penetration tests, and he has been working to implement programs for offensive security education.&lt;br /&gt;
&lt;br /&gt;
=== Rashmi Patil ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rashmi is passionate about software engineering and applying it to solve complex problems in day to day life. She has a diverse set of work experience through past research, internships and full-time work experience that has really helped others in understanding the broader picture. In her free time, she volunteers and conducts educational workshops to teach young high school girls about the importance of Cybersecurity and encourage them to pursue a career in Computer Engineering. &lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Allison Schoenfield ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Allison Schoenfield is from Berkeley and also attended UC Berkeley, but is now a San Franciscan. She works as an Application Security Engineer at Autodesk. She enjoys threat modeling and working in partnership with developers to secure applications. Previously, she worked as a security consultant in penetration testing. In her free time, she likes to play social deduction games, bake and eat cupcakes, and mentor.&lt;br /&gt;
&lt;br /&gt;
=== Izar Tarandach ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Izar Tarandach is Lead Product Security Architect at Autodesk inc.. Prior, he was the Security Architect for Enterprise Hybrid Cloud at Dell EMC, for long before a Security Consultant at the EMC Product Security Office. With more years than he’s willing to admit to in the information security arena, he is a member of SAFECode Technical Leadership Council and a founding contributor to the IEEE Center for Security Design. He holds a masters degree in Computer Science/Security from Boston University and has served &lt;br /&gt;
as an instructor in Digital Forensics at Boston University and in Secure Development at the University of Oregon.&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina Valdivieso is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
=== Roy Wattanasin ===&lt;br /&gt;
'''Information Security Professional'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Roy Wattanasin is a healthcare information security professional. You can find him on @wr0 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Presentations&amp;diff=254791</id>
		<title>2019 BASC Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Presentations&amp;diff=254791"/>
				<updated>2019-09-17T20:17:51Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Brian Fox not avail so Artie Jurgenson in his place.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template|Presentations}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
We would like to thank our speakers for donating their time and effort to help make this conference successful.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|An Intelligent Approach to Upgrading OSS Libraries|Madison Cool| | | }}&lt;br /&gt;
Maintaining secure versions of third-party libraries is a repetitive and tedious task at best. At worst, with many interdependent internal projects (think microservices) and dozens of layers of transitive dependencies, it is a logistical nightmare. A top-down, ad hoc approach is often used to resolve vulnerable third-party libraries, prioritizing high-severity vulnerabilities or internal projects critical to business functions, but failing to address the larger impact of vulnerabilities. TraceLink is taking a different approach, utilizing the graph structure of interconnected projects to perform security upgrades in an informed order from the bottom up. This process aims to automate third-party library version maintenance as much as possible, aiding in the completion of vital security upgrades and compounding the effects of each individual upgrade to reduce overall work done.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|OWASP Serverless Top 10|Tal Melamed| | | }}&lt;br /&gt;
In moving to serverless, we shift some security responsibilities to the infrastructure provider by eliminating the need to manage servers. Unfortunately, that doesn’t mean we’re entirely absolved of all security duties. Serverless functions still execute code and can still be vulnerable to application-level attacks. As a new type of architecture, serverless presents new security challenges. Some are equal to traditional application development, but some take a new form. Attackers are thinking differently, and developers must do so as well to gain the upper hand. &lt;br /&gt;
&lt;br /&gt;
In this talk, I will dive into the Top 10 risks of the OWASP Serverless Top 10 project. I will discuss why these risks are different from traditional attacks and how we should protect our application against them. I will also introduce OWASP DVSA, a deliberately vulnerable tool, aiming to assist both security professionals and developers to better understand the implications and processes of serverless security.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Security Culture Hacking: Disrupting the Security Status Quo|Chris Romeo| | | }}&lt;br /&gt;
This session is an exploration into the world of security culture hacking. In the wake of the “data breach of the day”, organizations claim they are more serious about security. The truth is that many still have weak security cultures. At the end of the day, how much actual security culture change occurs post-breach? The answer is not enough. This session describes how to change security culture from the inside out, utilizing best practices and real-world examples. With security culture disruption, the security team attempts to impact employees through positive security learning and experience.&lt;br /&gt;
&lt;br /&gt;
The session begins by introducing the audience to the concepts of security culture and security culture hacking, and then explains the security status quo. Security culture hacking is the skills and creativity necessary to disrupt an existing culture and redirect it towards a more secure future. Security status quo is the idea that companies move in a herd mentality and believe that their security must only be an average of their peers. To prove this point, we profile some anonymous organizations based on their external security story versus reality. Next, we’ll discuss what makes a good security culture hacker, including the skills required for success in this type of endeavor.&lt;br /&gt;
&lt;br /&gt;
The middle of this session includes a how-to of hacking security culture. Each section includes various tips and stories from real life experience about how to influence security culture. The phases of security culture improvement are explored, including awareness, big learning, and community. In addition, a discussion of organizational reach, marketing, rewards, recognition, and metrics surrounding security culture improvement are explored. It’s time to make security fun.&lt;br /&gt;
&lt;br /&gt;
At the conclusion, a plan is laid out for how a learner could put true security culture change into practice in their organization. Audience members receive a 30-60-90-1-year plan for how to implement true security culture change.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Critical Thinking in Cybersecurity|Kristin Dahl| | | }}&lt;br /&gt;
Security's most important skill is overlooked – critical thinking. Keeping up with the latest technical tools and trends is only one contributor to success. Security is a constantly evolving field. Long-term success requires that we think on our feet—regardless of technology—to understand tools and how to apply them to the changing landscape.&lt;br /&gt;
&lt;br /&gt;
We often do not think about critical thinking. What does it feel like? How is &amp;quot;critical&amp;quot; thinking different from &amp;quot;normal&amp;quot; thinking? How do you develop these skills?  And how do you apply them to security?&lt;br /&gt;
&lt;br /&gt;
Critical thinking is part art, part science. It takes a combination of intuition, logic, and creativity to understand the 'why' and not just the 'how.' It should help us address the root cause of an issue and not just the symptoms.  In security it means decomposing a problem, analyzing objectively, evaluating a hypothesis, and recognizing context. This session will explore how to apply critical thinking in your day-to-day job pulling from my experience and observations across academia, industry, and government.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Open Source Security on a Shoestring|Paulina Valdivieso| | | }}&lt;br /&gt;
Securing assets is a difficult job without the appropriate support, be it from your superiors or having access to resources: getting what you need can be challenging, but that is no excuse to not securing it. In small and medium companies where technology departments are service oriented, security is often overlooked in favor of ease of access, forcing IT to compromise on solutions and, potentially, leave the organization vulnerable.&lt;br /&gt;
&lt;br /&gt;
This talk will explore the open source and open access tools available to the public, their pros and cons, the elements to consider when implementing and the hurdles along the way, covering basic aspects of security in a company: incident response, application security, network security, training, risk &amp;amp; compliance, among others. Analysts, engineers and technicians whose many hats may result in security holes benefit from the implementation of these tools… and managers from knowing alternatives to the increasingly costly solutions in the market.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Put that Cease and Desist Down: How to Train Your Org to Work with Hackers|Luke Tucker| | | }}&lt;br /&gt;
Before that hacker slides into your brand’s DMs, how do you prepare your organization to talk to researchers and spot vulnerability disclosure? Today, poorly handled disclosures can cause the same reputational damage as a public security incident. As security continues to climb the ranks of importance, more decision makers and stakeholders are involved in interactions that were once solely owned by security teams. The vulnerability reports are coming. Ready or not. Everyone is on the front lines of security and this includes researcher interactions. Are your executives, legal, PR, and social media teams prepared?&lt;br /&gt;
&lt;br /&gt;
Based on hundreds of hacker and company mediation request, this talk will look at common and extreme scenarios many are seeing for the first time. We will cover real-world communication failures, as well as the success stories you will never read about. Attendees will walk away with armed with practical tips to prepare their colleagues for the inevitable vulnerability report, starting with hacker motivations, what disclosure success looks like, and de-escalation tips. This talk will cover: Responding to vulnerabilities reported via social media; How to minimize the chances of your vulnerabilities ending up on Twitter; Tips for keeping the press out of your bug reporting workflow; Prepare your company to talk to a hacker who is requesting cash; De-escalation tips to find a happy f@%#&amp;amp;$* ending when tempers flare and you are caught in the middle; and How to advocate for security researchers without losing friends or your job.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Identifying Malicious Android Applications in the Presence of Adversaries: A Cat-and-Mouse Game|Omid Mirzaei| | | }}&lt;br /&gt;
Android is by far the leading operating system in smartphones. As of March 2019, 51% of US smartphone subscribers were using a Google Android device. This percentage is much higher in an international scale. Also, there are currently more than 2 million Android applications on the official Google Market, known as Google Play. As most of the functionalities of smartphones are provided to users via applications, this huge market with billions of users is tempting for attackers to develop and distribute their malicious applications (or malware).&lt;br /&gt;
&lt;br /&gt;
Mobile malware has raised explosively since 2009. Symantec reported an increase of 54% in the new mobile malware variants in 2017 as compared to the previous year. This rise has happened for Android malware as well since only 20% of devices are running the newest major version of Android OS based on Symantec report in 2018. Thus, detecting malicious and potentially risky applications in the Android platform is of the utmost importance. During this talk, I will summarize different automated techniques proposed for Android malware detection and risk assessment. Along with this, I will discuss how adversaries have tried to bypass these mechanisms.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Automate or Die - DevSecOps in the Age of Software Supply Chain Attacks|Artie Jurgenson| | | }}&lt;br /&gt;
As nimble organizations deliver new innovations, adversaries are also upping their game; something we’ve seen in recent high profile and devastating cyber attacks. Bad actors have the intent and ability to exploit security vulnerabilities in the software supply chain - and in some cases plant vulnerabilities themselves. They have increased scale through automation and improved breach success through precision targeting. If we don’t fight back by doing the same - automating security directly in the DevOps pipeline - then we’ll always be at the hackers’ mercy. This session will provide new research on the above, and details on how to get started.&lt;br /&gt;
&lt;br /&gt;
Key takeaways: Real-world examples of how large and small companies are implementing DevSecOps practices in their own delivery pipelines, and increasing developer awareness to risks; Key insights from the 2019 DevSecOps community report - including the top investments for automated security; A walkthrough of how security principles have been automated into a CICD pipeline and what standards for implementation are beginning to follow suite; Why DevSecOps is more than a buzzword, and why it’s vital to protecting your software supply chain; How automating security of policies makes it harder to ignore.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Finding Bugs Using Your Own Code: Machine Learning-based Inconsistent Code Detection|Mansour Ahmadi and Reza Mirzazade Farkhani| | | }}&lt;br /&gt;
Machine learning has shown success in detecting known types of software vulnerabilities in recent years, but they mostly need extensive specimens to train their models. &lt;br /&gt;
&lt;br /&gt;
As a new alternative to such approaches, we present a learning-based technique that can identify potentially buggy code snippets which deviate from most of the code snippets implementing similar functionalities. Our approach learns from a codebase itself without the need for the cumbersome task of gathering and cleansing training samples. The core idea is that various kinds of bugs can be viewed as inconsistencies that deviate from non-buggy code that implement the same or similar logic.&lt;br /&gt;
&lt;br /&gt;
More specifically, we design a two-step clustering technique to find functionally-similar yet inconsistent code in software. We implemented our system on top of LLVM, which makes our approach language-agnostic.&lt;br /&gt;
&lt;br /&gt;
We evaluated our tool on 4 popular open source security software codebases, such as OpenSSL, OpenSSH, WolfSSL, and Mbedtls. Our tool discovered 10 new unique deep bugs (some are exploitable), despite that some of these codebases are constantly undergoing vulnerability scans. All of the bugs have been confirmed by their developers and later fixed by either our pull requests or the developers.&lt;br /&gt;
&lt;br /&gt;
How does the system work really? How easy to find bugs by our approach and how much manual effort does it need? What is a proper code granularity for detecting inconsistencies?&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|SAST Triage Tricks of the Trade - How to Triage Before the Universe Dies Out|Kristofer Duer and Rashmi Patil| | | }}&lt;br /&gt;
Ever gotten a pile of SAST findings and wondered - what now? How do you possibly trim the fat of uninteresting findings down to a manageable set and get to work making the world a safer place? We will talk about some easy tips on how to prioritize and isolate those results which matter the most to your organization.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|The User Experience of Information Security|Chris Chagnon and Ryan LaMarche| | | }}&lt;br /&gt;
Targeted and increasingly sophisticated attacks are growing in popularity. With spear-phishing, ransomware, and a slew of other user-oriented attacks, our information security, particularly our operational security, relies on having our users on board. But training end-users can be difficult, and our response to mitigating these attacks can sometimes come at a great expense to UX. This session delves into the User Experience of Information Security, and provides attendees with insights into how some of our best laid security measures might actually increase our vulnerability to future attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template|Presentations}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=254790</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=254790"/>
				<updated>2019-09-17T18:55:43Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Fixed typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nccgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
        &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:blackduck-synopsys-299x91.png|link=https://www.blackducksoftware.com/|299x91px|Black Duck Software]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Optiv Logo.jpg|link=https://www.optiv.com/|299x91px|Optiv]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:CA_vanguard_417x124.png|link=http://www.veracode.com/|317x104px|Veracode]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|160x71px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:HackerOne_Logo_.jpg|link=https://www.hackerone.com/|170x50px|HackerOne]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_new.png|link=https://checkmarx.com|270x57px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TCell_V_GRD_CLR_RGB-800-160x128.png|link=https://www.tcell.io/|160x128px|tCell.io]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            [[File:AccuvantA10.png|link=https://www.accuvant.com/|170x78px|Accuvant]]&lt;br /&gt;
            &amp;amp;emsp;[[File:LOGOcontrast299x97.gif|link=http://contrastsecurity.com|299x97px|Contrast Security]]&lt;br /&gt;
            &amp;amp;emsp;&amp;amp;emsp;[[File:NetSPI Logo offset.jpg|link=http://netspi.com|180x90px|NetSPI]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Dell_Logo_Blue_rgb-125x125.png|link=http://www.dell.com/|125x125px|Dell]]&amp;lt;/span&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|243x77px|Qualys]]&lt;br /&gt;
            [[File:Nvisium-full_color-on_light_bg.png|link=https://nvisium.com|234x102px|nVisium]]&lt;br /&gt;
            [[File:GoSecure_Artboard_1@2x_(002)998x242.png|link=https://gosecure.net|250x280px|GoSecure]]&lt;br /&gt;
		&amp;lt;/p&amp;gt;&lt;br /&gt;
		&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 15%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
           &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TWM_logo_for_Boston_OWASP_2018_-_white_(CP).jpg|link=http://TokenizeWhatMatters.com//|160x71px|TWM]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Bugcrowd.jpg|link=http://www.bugcrowd.com/|248x49px|bugcrowd]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            [[File:Stormpath-blue-logo-218x52.png|link=https://www.stormpath.com/|218x52px|Stormpath]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Facebook.PNG|link=http://www.facebook.com|206x62px|Facebook]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Synopsys L|link=http://www.synopsys.com/home.aspx|150x45px|Synopsys]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
    &amp;lt;br/&amp;gt;Silver Sponsorships are available: See [[Media:BASCSponsorship2019.pdf|Sponsorship Kit]]&amp;lt;br/&amp;gt;&lt;br /&gt;
        &lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=254789</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=254789"/>
				<updated>2019-09-17T18:49:59Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Added Platinum NCC Group&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nncgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
        &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:blackduck-synopsys-299x91.png|link=https://www.blackducksoftware.com/|299x91px|Black Duck Software]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Optiv Logo.jpg|link=https://www.optiv.com/|299x91px|Optiv]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:CA_vanguard_417x124.png|link=http://www.veracode.com/|317x104px|Veracode]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|160x71px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:HackerOne_Logo_.jpg|link=https://www.hackerone.com/|170x50px|HackerOne]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_new.png|link=https://checkmarx.com|270x57px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TCell_V_GRD_CLR_RGB-800-160x128.png|link=https://www.tcell.io/|160x128px|tCell.io]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            [[File:AccuvantA10.png|link=https://www.accuvant.com/|170x78px|Accuvant]]&lt;br /&gt;
            &amp;amp;emsp;[[File:LOGOcontrast299x97.gif|link=http://contrastsecurity.com|299x97px|Contrast Security]]&lt;br /&gt;
            &amp;amp;emsp;&amp;amp;emsp;[[File:NetSPI Logo offset.jpg|link=http://netspi.com|180x90px|NetSPI]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Dell_Logo_Blue_rgb-125x125.png|link=http://www.dell.com/|125x125px|Dell]]&amp;lt;/span&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|243x77px|Qualys]]&lt;br /&gt;
            [[File:Nvisium-full_color-on_light_bg.png|link=https://nvisium.com|234x102px|nVisium]]&lt;br /&gt;
            [[File:GoSecure_Artboard_1@2x_(002)998x242.png|link=https://gosecure.net|250x280px|GoSecure]]&lt;br /&gt;
		&amp;lt;/p&amp;gt;&lt;br /&gt;
		&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 15%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
           &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TWM_logo_for_Boston_OWASP_2018_-_white_(CP).jpg|link=http://TokenizeWhatMatters.com//|160x71px|TWM]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Bugcrowd.jpg|link=http://www.bugcrowd.com/|248x49px|bugcrowd]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            [[File:Stormpath-blue-logo-218x52.png|link=https://www.stormpath.com/|218x52px|Stormpath]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Facebook.PNG|link=http://www.facebook.com|206x62px|Facebook]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Synopsys L|link=http://www.synopsys.com/home.aspx|150x45px|Synopsys]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
    &amp;lt;br/&amp;gt;Silver Sponsorships are available: See [[Media:BASCSponsorship2019.pdf|Sponsorship Kit]]&amp;lt;br/&amp;gt;&lt;br /&gt;
        &lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254776</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254776"/>
				<updated>2019-09-17T04:12:35Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Added Tal Melamed's bio.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Mansour Ahmadi ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Mansour Ahmadi is a research associate at Northeastern University. Before coming to Northeastern, he obtained a PhD in Computer Engineering from the University of Cagliari in 2017. His research is mainly focused in applying machine learning methods for systems security problems, especially malware detection and classification, and vulnerability discovery. He co-authored over 10 scientific papers. Also, He is the lead developer of IntelliAV, which is the first on-device machine learning-based mobile malware detector. &lt;br /&gt;
&lt;br /&gt;
=== Joel Carlson ===&lt;br /&gt;
'''Secure Code Warrior'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joel Carlson is a security professional with 15 years of experience in the security industry. Joel has a long history of connecting businesses with security tools to help them ensure a secure environment. He joined Secure Code Warrior earlier this year after previous success at Veracode, Dell and Bitsight. &lt;br /&gt;
&lt;br /&gt;
=== Chris Chagnon ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Chagnon is an ITSM Architect and developer who designs, develops, and maintains award-winning experiences for managing and carrying out the ITSM process. Chris has a Master of Science in Information Technology, and a bachelor’s degree in Visual Communications. In addition, Chris is a PhD Candidate studying Information Systems with a focus on user and service experience. As A Top 25 Thought Leader in ITSM, and an ALE IT Vanguard, Chris speaks nationally about the future of ITSM, practical applications of artificial intelligence and machine learning, gamification, continual service improvement, and customer service/experience. Follow Chris on Twitter @Chagn0n.&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Joshua Dow ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joshua Dow is a Security Consultant with NCC Group, joining the organization in Spring of 2019. Joshua has made contributions in his career as both a blue team practitioner and a red team operator. Joshua specializes in web application penetration testing, network penetration testing, and cloud security auditing. Joshua worked as a Senior Software Engineer prior to getting his start in Information Security.&lt;br /&gt;
&lt;br /&gt;
=== Kristofer Duer ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristofer Duer is the Lead Cognitive Researcher for AppScan Source. He has worked in the application security field for the last 8 years in the world of Static Application Security Testing (SAST) and researching language specific attack surfaces. His particular specialty deals with applying machine learning to solve some of the impossible problems which occur naturally in the world of SAST - namely Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).&lt;br /&gt;
&lt;br /&gt;
Outside of work he enjoys the gym, Disc Golf (super fun!) and spending time with his wife and two kids.&lt;br /&gt;
&lt;br /&gt;
=== Reza Mirzazade Farkhani ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Reza Mirzazade Farkhani is pursuing a PhD in Cybersecurity at Northeastern University. His research interests span a wide range of topics in systems security with a particular focus on software vulnerability detection, exploit mitigation techniques and binary analysis. Currently, Reza is focusing on developing novel techniques to protect applications against memory safety vulnerabilities. He is especially interested in new security features in ARM architecture to accelerate the performance and security of the current systems. &lt;br /&gt;
&lt;br /&gt;
=== Brian Fox ===&lt;br /&gt;
'''Sonatype'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Co-founder and CTO, Brian Fox is a member of the Apache Software Foundation and former Chair of the Apache Maven project. As a direct contributor to the Maven ecosystem, including the maven-dependency-plugin and maven-enforcer-plugin, he has over 20 years of experience driving the vision behind, as well as developing and leading the development of software for organizations ranging from startups to large enterprises. Brian is a frequent speaker at national and regional events including Java User Groups and other development related conferences.&lt;br /&gt;
&lt;br /&gt;
=== Gabrielle E. Hempel, CHTI ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for an institutional review board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as a penetration tester for Black Mirage while pursuing a certificate in Advanced Computer Security at Stanford. She continues to serve as a genetic scientist for NIH-regulated recombinant genetic studies, and serves as an instructor and mentor for a student cohort of cybersecurity analysts through Cybrary. She recently obtained her Certified Human Trafficking Investigator (CHTI) credentials through the McAfee Institute, and works with various law enforcement groups and task forces in order to combat human trafficking through digital forensics and analysis. Her area of expertise lies in GDPR/HIPAA/regulatory compliance and medical device security.&lt;br /&gt;
&lt;br /&gt;
=== Kitty Huang ===&lt;br /&gt;
'''Communications Trainer and Relationship Coach'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kitty Huang is an award-winning speaker who has led several fun and effective communication workshops at MIT, Harvard University, and corporate training events. She has worked as a copywriter at advertising agencies, a screenwriter for a television situation comedy, and a newspaper journalist. Her perceptive mind and creative approaches have successfully helped many individuals to solve problems in professional relationships and personal relationships. &lt;br /&gt;
&lt;br /&gt;
=== Robert Hurlbut ===&lt;br /&gt;
'''Bank of America'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Robert Hurlbut, is a Threat Modeling Architect / Lead at Bank of America. Robert is a Microsoft MVP for Developer Security and Technologies and holds the (ISC)2 CSSLP security certification. Robert has 30 years of industry experience in secure security, software architecture, and software development. He speaks at user groups, national and international conferences, and has provided training for many companies in the past. Robert is also a co-host of the Application Security Podcast (Twitter - @AppSecPodcast). Follow Robert on Twitter at @RobertHurlbut.&lt;br /&gt;
&lt;br /&gt;
=== Prateek Jain ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Prateek Jain is a UX researcher currently pursuing Ph.D. in Innovation with User Experience at Worcester Polytechnic Institute. His Ph.D. research focuses on User Experience. His research interests are augmented reality, internet of things (IoT), accessibility and persona development. He is working on multiple research projects focusing on the use of augmented reality and IoT to improve the user experience of products and services. Along with that, he is also working on developing and testing different persona frameworks to help organizations make effective design decisions.&lt;br /&gt;
&lt;br /&gt;
=== Ryan LaMarche ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Ryan LaMarche is a digital transformation and design thinking expert that brings ideas to life with a focus on user experience, and smart system design. When Ryan isn’t building systems, he spends his time as a dual-enrolled Bachelor’s and Master’s student at Worcester Polytechnic Institute studying Computer Science and Innovation with UX. Ryan is also a founding member and CTO of Seldom Technologies where he works with companies to develop systems, applications, and websites and consult on process improvement in the ITSM space.&lt;br /&gt;
&lt;br /&gt;
=== Rami McCarthy ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rami McCarthy is a Security Consultant with NCC Group, joining with the acquisition of VSR in 2016. He's spent the past three years performing security assessments of all kinds, from SaaS products to cloud IoT platforms. In addition to client work, Rami has published research into misspelled security headers and Chromebook security. Rami got his start in security as an intern at a deep web threat analysis startup, and has a BS in CS from Northeastern University, with a concentration in cyber operations. He's currently working towards an MS from Brandeis University.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
In the past two years, Tal Melamed has been experimenting in offensive and defensive security for the serverless technology, as Head of Security Research at Protego Labs. He specializes in AppSec with more than 15 years of experience in security research and vulnerability assessment. Tal is also the leader and creator of the OWASP Serverless Top 10 and DVSA projects, and is a frequent speaker at security conferences, including DefCon, DerbyCon, OWASP, BSides and more. Follow Tal on Twitter at @_nu11p0inter&lt;br /&gt;
&lt;br /&gt;
=== Omid Mirzaei ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Omid Mirzaei is a postdoctoral research associate in the Systems Security (SecLab) and the Research in Software and Systems Security (RiS3) Labs at Northeastern University, working with Prof. Engin Kirda and Dr. Long Lu. Prior to this, Omid was an assistant professor in Universidad Carlos III de Madrid. Also, he spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and he received his PhD degree in Computer Science from the same university. Omid's thesis was mainly focused on Android malware analysis and triage. Generally speaking, Omid is working and conducting research in computer and cyber security. However, he is particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, he is eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources. Previously and as an undergraduate student, Omid worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Omid also developed several intelligent systems and passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.&lt;br /&gt;
&lt;br /&gt;
=== Carson E. Owlett, OSCP CEH ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Carson is a graduate of Connecticut College, where he studied Computer Science and Slavic Studies. After graduating, he obtained his OSCP and CEH and did a brief stint doing research for DARPA. He then founded Black Mirage in 2019, where he serves as the CEO and Assessment Team Lead for penetration tests, and he has been working to implement programs for offensive security education.&lt;br /&gt;
&lt;br /&gt;
=== Rashmi Patil ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rashmi is passionate about software engineering and applying it to solve complex problems in day to day life. She has a diverse set of work experience through past research, internships and full-time work experience that has really helped others in understanding the broader picture. In her free time, she volunteers and conducts educational workshops to teach young high school girls about the importance of Cybersecurity and encourage them to pursue a career in Computer Engineering. &lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Allison Schoenfield ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Allison Schoenfield is from Berkeley and also attended UC Berkeley, but is now a San Franciscan. She works as an Application Security Engineer at Autodesk. She enjoys threat modeling and working in partnership with developers to secure applications. Previously, she worked as a security consultant in penetration testing. In her free time, she likes to play social deduction games, bake and eat cupcakes, and mentor.&lt;br /&gt;
&lt;br /&gt;
=== Izar Tarandach ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Izar Tarandach is Lead Product Security Architect at Autodesk inc.. Prior, he was the Security Architect for Enterprise Hybrid Cloud at Dell EMC, for long before a Security Consultant at the EMC Product Security Office. With more years than he’s willing to admit to in the information security arena, he is a member of SAFECode Technical Leadership Council and a founding contributor to the IEEE Center for Security Design. He holds a masters degree in Computer Science/Security from Boston University and has served &lt;br /&gt;
as an instructor in Digital Forensics at Boston University and in Secure Development at the University of Oregon.&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina Valdivieso is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
=== Roy Wattanasin ===&lt;br /&gt;
'''Information Security Professional'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Roy Wattanasin is a healthcare information security professional. You can find him on @wr0 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Workshops&amp;diff=254748</id>
		<title>2019 BASC Workshops</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Workshops&amp;diff=254748"/>
				<updated>2019-09-13T20:59:26Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Created the workshop page.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Workshops}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
We would like to thank our workshop leaders for donating their time and effort to help make this conference successful.&lt;br /&gt;
&lt;br /&gt;
== Morning Workshops ==&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|The Ultimate Secure Coding Showdown|Joel Carlson| | | }}&lt;br /&gt;
Are. You. Ready? Head to the AppSec battlefield and prove that you are the ultimate secure coding champion. Go head-to-head with your peers as you test your web application security knowledge of the OWASP Top 10. Strut your skills. Crush the competition. Score excellent prizes and take home the title of Secure Code Warrior!&lt;br /&gt;
&lt;br /&gt;
Players will be presented with a series of vulnerable code challenges that will ask them to identify the problem, locate the insecure code, and fix the vulnerability. Select from a range of software languages to complete the tournament, including Java EE, Java Spring, C# MVC, C# WebForms, Ruby on Rails, Python Django, Scala Play &amp;amp; Node.JS. It’s gamified, it’s relevant, but most of all - it’s fun.&lt;br /&gt;
&lt;br /&gt;
Watch as you earn points and climb to the top of the real-time leaderboard during the event. Prizes will be awarded to the top 3 point scorers, with one security superhero being crowned the ultimate Secure Code Warrior. Will it be you?&lt;br /&gt;
&lt;br /&gt;
Psst: Want to test your secure coding skills at your own pace, without the competition? You’re welcome to come along and join the fun.&lt;br /&gt;
&lt;br /&gt;
'''''Participants must bring a laptop.'''''  &lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Zero to Hero: Intro to Web App Pentesting|Carson Owlett and Gabrielle Hempel| | | }}&lt;br /&gt;
As more information and functionality moves to the internet, the interface between end users and web application servers becomes increasingly vulnerable. Because of these visible vulnerabilities, penetration testing skills are in high demand; however, courses catering to beginners and those wanting to get a “foot in the door” are scarce. In this workshop, you can utilize a custom environment and expertise in order to begin your journey into offensive security. We will focus on four areas of web application penetration testing: injection, XSS, XXE, and insecure deserialization. This course welcomes total beginners and will be largely oriented towards those wanting to build a foundation in web application pentesting. &lt;br /&gt;
&lt;br /&gt;
'''''Users should have a laptop equipped with BurpSuite.'''''&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Capture Ever-Evolving Security Needs of Users with IKE and Proto-Research Persona Development|Prateek Jain and Ryan Lamarche| | | }}&lt;br /&gt;
In this workshop, grounded in design thinking approach, we demonstrate the software platform IKE and its process framework for persona development, which facilitate a fast, effective, and relatively inexpensive way to inform design decisions, such as those needed to encourage and enable users to effectively utilize security features. The IKE software platform not only facilitates a deeper understanding of user needs but also provides a Key performance Indicator (KPI) that can measure an organizations’ performance in gauging its target market evolving security needs.&lt;br /&gt;
&lt;br /&gt;
Understanding customers and what their needs are is paramount to the success of any organization. In security and privacy industry, users and their needs vary drastically depending on various factors like age, education, technology use, etc. Persona development is one of the useful tools to capture these needs. It can reveal security needs, pain points, habits, security challenges, etc. of the user base. The traditional approach to persona development is rigorous but time-consuming and resource-intensive. It doesn't account for fast changes in the technological world of privacy and security. These personas become outdated as soon as they are developed. At UXDM lab, we created a unique approach to persona development. We also developed a software platform called IKE for developing and managing personas. IKE treats personas as living documents to make effective design decisions and to follow evolving user needs over time.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|How to Talk to Humans|Kitty Huang and Roy Wattanasin| | | }}&lt;br /&gt;
Do you feel frustrated sometimes trying to help non-technical users? Do you find it challenging asking for more resources from management? Effective communication can help IT professionals to be more productive and be heard. This workshop demonstrates communication skills through scenarios that IT security engineers encounter regularly. We will decode written and verbal scripts by technical engineers and translate them into a communication style that non-technical people can understand and appreciate.  These cases include asking for more resources from upper management, making a suggestion to implement better security, and verifying the legitimacy of an email with an employee. Excessive workload, pressing deadlines and the lack of support can make IT engineers feel exhausted, hopeless and frustrated. This workshop provides perspectives on viewing various work situations in a different light. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Afternoon Workshops ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Threat Modeling Workshop|Robert Hurlbut| | | }}&lt;br /&gt;
&lt;br /&gt;
Threat modeling is a way of thinking about what could go wrong and how to prevent it. Instinctively, we all think this way in regards to our own personal security and safety. When it comes to building software, some software shops either skip the important step of threat modeling in secure software design or, they have tried threat modeling before but haven't quite figured out how to connect the threat models to real world software development and its priorities. Threat modeling should be part of your secure software design process. Using threat modeling and some principals of risk management, you can design software in a way that makes security one of the top goals, along with performance, scalability, reliability, and maintenance.&lt;br /&gt;
&lt;br /&gt;
Objective: In this workshop, attendees will be introduced to Threat Modeling, learn how to conduct a Threat Modeling session, learn how to use practical strategies in finding Threats and proposing Countermeasures, and learn how to apply Risk Management in dealing with the threats. Depending on time, we will go through 1 or 2 Real World Threat Modeling case studies. Finally, we will end the day with the latest updates in Threat Modeling process, tools, etc.&lt;br /&gt;
&lt;br /&gt;
'''''Laptop recommended for some labs, but not required.'''''&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Effective Threat Modeling with CTM|Izar Tarandach and Allison Schoenfield| | | }}&lt;br /&gt;
Recently Autodesk open-sourced our Continuous Threat Modeling methodology, which aims to enable product teams to threat model every story in a quick and focused manner in order to scale the ability of an organization to keep up with rapid product changes, and enable developers to acquire a security &amp;quot;muscle memory&amp;quot; ability to really infuse their practices with security design capabilities. &lt;br /&gt;
&lt;br /&gt;
In this course you will learn how to perform and enable Continuous Threat Modeling in your organization and provide support to the learning curve of your product teams as a security SME.&lt;br /&gt;
&lt;br /&gt;
CTM is available at https://github.com/Autodesk/continuous-threat-modeling&lt;br /&gt;
A threat-modeling-as-code tool will also be introduced, available at https://github.com/izar/pytm&lt;br /&gt;
&lt;br /&gt;
'''''If you are new to the discipline of Threat Modeling we highly advise participating in the earlier Threat Modeling Workshop by Robert Hurlbut in order to solidify your understanding of the subject.'''''&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|AWS Cloud Security Fundamentals|Joshua Dow and Rami McCarthy | | | }}&lt;br /&gt;
As comfort and familiarity with cloud computing is now more mainstream, companies are leaning more and more on cloud resources to host and run even their most-sensitive technical assets. With these new technologies/innovations come new (and old!) security concerns. In this workshop, we will take participants through a baseline understanding of cloud security - with a focus on AWS security fundamentals. &lt;br /&gt;
&lt;br /&gt;
First, we will briefly outline the cloud security model, the similarities across platforms, and the shared responsibility model that Amazon employs. From there, we will introduce participants to open-source tooling for AWS account auditing and hardening, including NCC's own ScoutSuite. We will provide access to an intentionally vulnerable AWS environment, to allow workshop attendees to follow along and explore misconfigurations with their own eyes. We also will support attendees who want to immediately dive into auditing their own AWS accounts/environments. &lt;br /&gt;
&lt;br /&gt;
Next, we'll highlight easy wins for AWS security, that the audience will be able to immediately apply to their own environments. Following that, we'll speak to Amazon's built-in security tooling, including:&lt;br /&gt;
&lt;br /&gt;
* Security Hub&lt;br /&gt;
* Trusted Advisor&lt;br /&gt;
* CloudTrail&lt;br /&gt;
* Inspector&lt;br /&gt;
* GuardDuty&lt;br /&gt;
* Macie (and why it's probably wrong for you!)&lt;br /&gt;
&lt;br /&gt;
We'll focus on actionable guidance to walk away and be able to use these tools to harden your own posture. Subsequently, we'll work with attendees through the misconfigurations that led to the Capital One breach, via the CloudGoat scenario. Wrapping up, we'll provide a easy to follow cheatsheet of best practices, easy wins, and open source tools that attendees can reference to improve their own environments.&lt;br /&gt;
&lt;br /&gt;
'''''Users should bring a laptop having: administrator privileges, at least 8GB of RAM, 10GB of free disk space, the latest version of 64-bit Virtualbox installed, and USB ports for copying data.'''''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template|Workshops}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254747</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254747"/>
				<updated>2019-09-13T20:52:26Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Added almost all the workshop leaders.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Mansour Ahmadi ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Mansour Ahmadi is a research associate at Northeastern University. Before coming to Northeastern, he obtained a PhD in Computer Engineering from the University of Cagliari in 2017. His research is mainly focused in applying machine learning methods for systems security problems, especially malware detection and classification, and vulnerability discovery. He co-authored over 10 scientific papers. Also, He is the lead developer of IntelliAV, which is the first on-device machine learning-based mobile malware detector. &lt;br /&gt;
&lt;br /&gt;
=== Joel Carlson ===&lt;br /&gt;
'''Secure Code Warrior'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joel Carlson is a security professional with 15 years of experience in the security industry. Joel has a long history of connecting businesses with security tools to help them ensure a secure environment. He joined Secure Code Warrior earlier this year after previous success at Veracode, Dell and Bitsight. &lt;br /&gt;
&lt;br /&gt;
=== Chris Chagnon ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Chagnon is an ITSM Architect and developer who designs, develops, and maintains award-winning experiences for managing and carrying out the ITSM process. Chris has a Master of Science in Information Technology, and a bachelor’s degree in Visual Communications. In addition, Chris is a PhD Candidate studying Information Systems with a focus on user and service experience. As A Top 25 Thought Leader in ITSM, and an ALE IT Vanguard, Chris speaks nationally about the future of ITSM, practical applications of artificial intelligence and machine learning, gamification, continual service improvement, and customer service/experience. Follow Chris on Twitter @Chagn0n.&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Joshua Dow ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joshua Dow is a Security Consultant with NCC Group, joining the organization in Spring of 2019. Joshua has made contributions in his career as both a blue team practitioner and a red team operator. Joshua specializes in web application penetration testing, network penetration testing, and cloud security auditing. Joshua worked as a Senior Software Engineer prior to getting his start in Information Security.&lt;br /&gt;
&lt;br /&gt;
=== Kristofer Duer ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristofer Duer is the Lead Cognitive Researcher for AppScan Source. He has worked in the application security field for the last 8 years in the world of Static Application Security Testing (SAST) and researching language specific attack surfaces. His particular specialty deals with applying machine learning to solve some of the impossible problems which occur naturally in the world of SAST - namely Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).&lt;br /&gt;
&lt;br /&gt;
Outside of work he enjoys the gym, Disc Golf (super fun!) and spending time with his wife and two kids.&lt;br /&gt;
&lt;br /&gt;
=== Reza Mirzazade Farkhani ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Reza Mirzazade Farkhani is pursuing a PhD in Cybersecurity at Northeastern University. His research interests span a wide range of topics in systems security with a particular focus on software vulnerability detection, exploit mitigation techniques and binary analysis. Currently, Reza is focusing on developing novel techniques to protect applications against memory safety vulnerabilities. He is especially interested in new security features in ARM architecture to accelerate the performance and security of the current systems. &lt;br /&gt;
&lt;br /&gt;
=== Brian Fox ===&lt;br /&gt;
'''Sonatype'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Co-founder and CTO, Brian Fox is a member of the Apache Software Foundation and former Chair of the Apache Maven project. As a direct contributor to the Maven ecosystem, including the maven-dependency-plugin and maven-enforcer-plugin, he has over 20 years of experience driving the vision behind, as well as developing and leading the development of software for organizations ranging from startups to large enterprises. Brian is a frequent speaker at national and regional events including Java User Groups and other development related conferences.&lt;br /&gt;
&lt;br /&gt;
=== Gabrielle E. Hempel, CHTI ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for an institutional review board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as a penetration tester for Black Mirage while pursuing a certificate in Advanced Computer Security at Stanford. She continues to serve as a genetic scientist for NIH-regulated recombinant genetic studies, and serves as an instructor and mentor for a student cohort of cybersecurity analysts through Cybrary. She recently obtained her Certified Human Trafficking Investigator (CHTI) credentials through the McAfee Institute, and works with various law enforcement groups and task forces in order to combat human trafficking through digital forensics and analysis. Her area of expertise lies in GDPR/HIPAA/regulatory compliance and medical device security.&lt;br /&gt;
&lt;br /&gt;
=== Kitty Huang ===&lt;br /&gt;
'''Communications Trainer and Relationship Coach'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kitty Huang is an award-winning speaker who has led several fun and effective communication workshops at MIT, Harvard University, and corporate training events. She has worked as a copywriter at advertising agencies, a screenwriter for a television situation comedy, and a newspaper journalist. Her perceptive mind and creative approaches have successfully helped many individuals to solve problems in professional relationships and personal relationships. &lt;br /&gt;
&lt;br /&gt;
=== Robert Hurlbut ===&lt;br /&gt;
'''Bank of America'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Robert Hurlbut, is a Threat Modeling Architect / Lead at Bank of America. Robert is a Microsoft MVP for Developer Security and Technologies and holds the (ISC)2 CSSLP security certification. Robert has 30 years of industry experience in secure security, software architecture, and software development. He speaks at user groups, national and international conferences, and has provided training for many companies in the past. Robert is also a co-host of the Application Security Podcast (Twitter - @AppSecPodcast). Follow Robert on Twitter at @RobertHurlbut.&lt;br /&gt;
&lt;br /&gt;
=== Prateek Jain ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Prateek Jain is a UX researcher currently pursuing Ph.D. in Innovation with User Experience at Worcester Polytechnic Institute. His Ph.D. research focuses on User Experience. His research interests are augmented reality, internet of things (IoT), accessibility and persona development. He is working on multiple research projects focusing on the use of augmented reality and IoT to improve the user experience of products and services. Along with that, he is also working on developing and testing different persona frameworks to help organizations make effective design decisions.&lt;br /&gt;
&lt;br /&gt;
=== Ryan LaMarche ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Ryan LaMarche is a digital transformation and design thinking expert that brings ideas to life with a focus on user experience, and smart system design. When Ryan isn’t building systems, he spends his time as a dual-enrolled Bachelor’s and Master’s student at Worcester Polytechnic Institute studying Computer Science and Innovation with UX. Ryan is also a founding member and CTO of Seldom Technologies where he works with companies to develop systems, applications, and websites and consult on process improvement in the ITSM space.&lt;br /&gt;
&lt;br /&gt;
=== Rami McCarthy ===&lt;br /&gt;
'''NCC Group'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rami McCarthy is a Security Consultant with NCC Group, joining with the acquisition of VSR in 2016. He's spent the past three years performing security assessments of all kinds, from SaaS products to cloud IoT platforms. In addition to client work, Rami has published research into misspelled security headers and Chromebook security. Rami got his start in security as an intern at a deep web threat analysis startup, and has a BS in CS from Northeastern University, with a concentration in cyber operations. He's currently working towards an MS from Brandeis University.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Omid Mirzaei ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Omid Mirzaei is a postdoctoral research associate in the Systems Security (SecLab) and the Research in Software and Systems Security (RiS3) Labs at Northeastern University, working with Prof. Engin Kirda and Dr. Long Lu. Prior to this, Omid was an assistant professor in Universidad Carlos III de Madrid. Also, he spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and he received his PhD degree in Computer Science from the same university. Omid's thesis was mainly focused on Android malware analysis and triage. Generally speaking, Omid is working and conducting research in computer and cyber security. However, he is particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, he is eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources. Previously and as an undergraduate student, Omid worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Omid also developed several intelligent systems and passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.&lt;br /&gt;
&lt;br /&gt;
=== Carson E. Owlett, OSCP CEH ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Carson is a graduate of Connecticut College, where he studied Computer Science and Slavic Studies. After graduating, he obtained his OSCP and CEH and did a brief stint doing research for DARPA. He then founded Black Mirage in 2019, where he serves as the CEO and Assessment Team Lead for penetration tests, and he has been working to implement programs for offensive security education.&lt;br /&gt;
&lt;br /&gt;
=== Rashmi Patil ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rashmi is passionate about software engineering and applying it to solve complex problems in day to day life. She has a diverse set of work experience through past research, internships and full-time work experience that has really helped others in understanding the broader picture. In her free time, she volunteers and conducts educational workshops to teach young high school girls about the importance of Cybersecurity and encourage them to pursue a career in Computer Engineering. &lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Allison Schoenfield ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Allison Schoenfield is from Berkeley and also attended UC Berkeley, but is now a San Franciscan. She works as an Application Security Engineer at Autodesk. She enjoys threat modeling and working in partnership with developers to secure applications. Previously, she worked as a security consultant in penetration testing. In her free time, she likes to play social deduction games, bake and eat cupcakes, and mentor.&lt;br /&gt;
&lt;br /&gt;
=== Izar Tarandach ===&lt;br /&gt;
'''Autodesk Inc.'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Izar Tarandach is Lead Product Security Architect at Autodesk inc.. Prior, he was the Security Architect for Enterprise Hybrid Cloud at Dell EMC, for long before a Security Consultant at the EMC Product Security Office. With more years than he’s willing to admit to in the information security arena, he is a member of SAFECode Technical Leadership Council and a founding contributor to the IEEE Center for Security Design. He holds a masters degree in Computer Science/Security from Boston University and has served &lt;br /&gt;
as an instructor in Digital Forensics at Boston University and in Secure Development at the University of Oregon.&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina Valdivieso is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
=== Roy Wattanasin ===&lt;br /&gt;
'''Information Security Professional'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Roy Wattanasin is a healthcare information security professional. You can find him on @wr0 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254746</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254746"/>
				<updated>2019-09-13T20:28:17Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Added Morning Workshop Leaders&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Mansour Ahmadi ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Mansour Ahmadi is a research associate at Northeastern University. Before coming to Northeastern, he obtained a PhD in Computer Engineering from the University of Cagliari in 2017. His research is mainly focused in applying machine learning methods for systems security problems, especially malware detection and classification, and vulnerability discovery. He co-authored over 10 scientific papers. Also, He is the lead developer of IntelliAV, which is the first on-device machine learning-based mobile malware detector. &lt;br /&gt;
&lt;br /&gt;
=== Joel Carlson ===&lt;br /&gt;
'''Secure Code Warrior'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Joel Carlson is a security professional with 15 years of experience in the security industry. Joel has a long history of connecting businesses with security tools to help them ensure a secure environment. He joined Secure Code Warrior earlier this year after previous success at Veracode, Dell and Bitsight. &lt;br /&gt;
&lt;br /&gt;
=== Chris Chagnon ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Chagnon is an ITSM Architect and developer who designs, develops, and maintains award-winning experiences for managing and carrying out the ITSM process. Chris has a Master of Science in Information Technology, and a bachelor’s degree in Visual Communications. In addition, Chris is a PhD Candidate studying Information Systems with a focus on user and service experience. As A Top 25 Thought Leader in ITSM, and an ALE IT Vanguard, Chris speaks nationally about the future of ITSM, practical applications of artificial intelligence and machine learning, gamification, continual service improvement, and customer service/experience. Follow Chris on Twitter @Chagn0n.&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Kristofer Duer ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristofer Duer is the Lead Cognitive Researcher for AppScan Source. He has worked in the application security field for the last 8 years in the world of Static Application Security Testing (SAST) and researching language specific attack surfaces. His particular specialty deals with applying machine learning to solve some of the impossible problems which occur naturally in the world of SAST - namely Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).&lt;br /&gt;
&lt;br /&gt;
Outside of work he enjoys the gym, Disc Golf (super fun!) and spending time with his wife and two kids.&lt;br /&gt;
&lt;br /&gt;
=== Reza Mirzazade Farkhani ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Reza Mirzazade Farkhani is pursuing a PhD in Cybersecurity at Northeastern University. His research interests span a wide range of topics in systems security with a particular focus on software vulnerability detection, exploit mitigation techniques and binary analysis. Currently, Reza is focusing on developing novel techniques to protect applications against memory safety vulnerabilities. He is especially interested in new security features in ARM architecture to accelerate the performance and security of the current systems. &lt;br /&gt;
&lt;br /&gt;
=== Brian Fox ===&lt;br /&gt;
'''Sonatype'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Co-founder and CTO, Brian Fox is a member of the Apache Software Foundation and former Chair of the Apache Maven project. As a direct contributor to the Maven ecosystem, including the maven-dependency-plugin and maven-enforcer-plugin, he has over 20 years of experience driving the vision behind, as well as developing and leading the development of software for organizations ranging from startups to large enterprises. Brian is a frequent speaker at national and regional events including Java User Groups and other development related conferences.&lt;br /&gt;
&lt;br /&gt;
=== Gabrielle E. Hempel, CHTI ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She worked for an institutional review board in regulatory pharmaceutical and medical device compliance, and led specialized committees targeting Phase I research and emergency research. She moved to IT consulting in 2018, and currently works as a penetration tester for Black Mirage while pursuing a certificate in Advanced Computer Security at Stanford. She continues to serve as a genetic scientist for NIH-regulated recombinant genetic studies, and serves as an instructor and mentor for a student cohort of cybersecurity analysts through Cybrary. She recently obtained her Certified Human Trafficking Investigator (CHTI) credentials through the McAfee Institute, and works with various law enforcement groups and task forces in order to combat human trafficking through digital forensics and analysis. Her area of expertise lies in GDPR/HIPAA/regulatory compliance and medical device security.&lt;br /&gt;
&lt;br /&gt;
=== Kitty Huang ===&lt;br /&gt;
'''Communications Trainer and Relationship Coach'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kitty Huang is an award-winning speaker who has led several fun and effective communication workshops at MIT, Harvard University, and corporate training events. She has worked as a copywriter at advertising agencies, a screenwriter for a television situation comedy, and a newspaper journalist. Her perceptive mind and creative approaches have successfully helped many individuals to solve problems in professional relationships and personal relationships. &lt;br /&gt;
&lt;br /&gt;
=== Prateek Jain ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Prateek Jain is a UX researcher currently pursuing Ph.D. in Innovation with User Experience at Worcester Polytechnic Institute. His Ph.D. research focuses on User Experience. His research interests are augmented reality, internet of things (IoT), accessibility and persona development. He is working on multiple research projects focusing on the use of augmented reality and IoT to improve the user experience of products and services. Along with that, he is also working on developing and testing different persona frameworks to help organizations make effective design decisions.&lt;br /&gt;
&lt;br /&gt;
=== Ryan LaMarche ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Ryan LaMarche is a digital transformation and design thinking expert that brings ideas to life with a focus on user experience, and smart system design. When Ryan isn’t building systems, he spends his time as a dual-enrolled Bachelor’s and Master’s student at Worcester Polytechnic Institute studying Computer Science and Innovation with UX. Ryan is also a founding member and CTO of Seldom Technologies where he works with companies to develop systems, applications, and websites and consult on process improvement in the ITSM space.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Omid Mirzaei ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Omid Mirzaei is a postdoctoral research associate in the Systems Security (SecLab) and the Research in Software and Systems Security (RiS3) Labs at Northeastern University, working with Prof. Engin Kirda and Dr. Long Lu. Prior to this, Omid was an assistant professor in Universidad Carlos III de Madrid. Also, he spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and he received his PhD degree in Computer Science from the same university. Omid's thesis was mainly focused on Android malware analysis and triage. Generally speaking, Omid is working and conducting research in computer and cyber security. However, he is particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, he is eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources. Previously and as an undergraduate student, Omid worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Omid also developed several intelligent systems and passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.&lt;br /&gt;
&lt;br /&gt;
=== Carson E. Owlett, OSCP CEH ===&lt;br /&gt;
'''Black Mirage'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Carson is a graduate of Connecticut College, where he studied Computer Science and Slavic Studies. After graduating, he obtained his OSCP and CEH and did a brief stint doing research for DARPA. He then founded Black Mirage in 2019, where he serves as the CEO and Assessment Team Lead for penetration tests, and he has been working to implement programs for offensive security education.&lt;br /&gt;
&lt;br /&gt;
=== Rashmi Patil ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rashmi is passionate about software engineering and applying it to solve complex problems in day to day life. She has a diverse set of work experience through past research, internships and full-time work experience that has really helped others in understanding the broader picture. In her free time, she volunteers and conducts educational workshops to teach young high school girls about the importance of Cybersecurity and encourage them to pursue a career in Computer Engineering. &lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina Valdivieso is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
=== Roy Wattanasin ===&lt;br /&gt;
'''Information Security Professional'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Roy Wattanasin is a healthcare information security professional. You can find him on @wr0 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254742</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254742"/>
				<updated>2019-09-13T19:44:16Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Mansour Ahmadi ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Mansour Ahmadi is a research associate at Northeastern University. Before coming to Northeastern, he obtained a PhD in Computer Engineering from the University of Cagliari in 2017. His research is mainly focused in applying machine learning methods for systems security problems, especially malware detection and classification, and vulnerability discovery. He co-authored over 10 scientific papers. Also, He is the lead developer of IntelliAV, which is the first on-device machine learning-based mobile malware detector. &lt;br /&gt;
&lt;br /&gt;
=== Chris Chagnon ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Chagnon is an ITSM Architect and developer who designs, develops, and maintains award-winning experiences for managing and carrying out the ITSM process. Chris has a Master of Science in Information Technology, and a bachelor’s degree in Visual Communications. In addition, Chris is a PhD Candidate studying Information Systems with a focus on user and service experience. As A Top 25 Thought Leader in ITSM, and an ALE IT Vanguard, Chris speaks nationally about the future of ITSM, practical applications of artificial intelligence and machine learning, gamification, continual service improvement, and customer service/experience. Follow Chris on Twitter @Chagn0n.&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Kristofer Duer ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristofer Duer is the Lead Cognitive Researcher for AppScan Source. He has worked in the application security field for the last 8 years in the world of Static Application Security Testing (SAST) and researching language specific attack surfaces. His particular specialty deals with applying machine learning to solve some of the impossible problems which occur naturally in the world of SAST - namely Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).&lt;br /&gt;
&lt;br /&gt;
Outside of work he enjoys the gym, Disc Golf (super fun!) and spending time with his wife and two kids.&lt;br /&gt;
&lt;br /&gt;
=== Reza Mirzazade Farkhani ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Reza Mirzazade Farkhani is pursuing a PhD in Cybersecurity at Northeastern University. His research interests span a wide range of topics in systems security with a particular focus on software vulnerability detection, exploit mitigation techniques and binary analysis. Currently, Reza is focusing on developing novel techniques to protect applications against memory safety vulnerabilities. He is especially interested in new security features in ARM architecture to accelerate the performance and security of the current systems. &lt;br /&gt;
&lt;br /&gt;
=== Brian Fox ===&lt;br /&gt;
'''Sonatype'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Co-founder and CTO, Brian Fox is a member of the Apache Software Foundation and former Chair of the Apache Maven project. As a direct contributor to the Maven ecosystem, including the maven-dependency-plugin and maven-enforcer-plugin, he has over 20 years of experience driving the vision behind, as well as developing and leading the development of software for organizations ranging from startups to large enterprises. Brian is a frequent speaker at national and regional events including Java User Groups and other development related conferences.&lt;br /&gt;
&lt;br /&gt;
=== Ryan LaMarche ===&lt;br /&gt;
'''UXDM Lab at Worcester Polytechnic Institute'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Ryan LaMarche is a digital transformation and design thinking expert that brings ideas to life with a focus on user experience, and smart system design. When Ryan isn’t building systems, he spends his time as a dual-enrolled Bachelor’s and Master’s student at Worcester Polytechnic Institute studying Computer Science and Innovation with UX. Ryan is also a founding member and CTO of Seldom Technologies where he works with companies to develop systems, applications, and websites and consult on process improvement in the ITSM space.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Omid Mirzaei ===&lt;br /&gt;
'''Northeastern University'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Omid Mirzaei is a postdoctoral research associate in the Systems Security (SecLab) and the Research in Software and Systems Security (RiS3) Labs at Northeastern University, working with Prof. Engin Kirda and Dr. Long Lu. Prior to this, Omid was an assistant professor in Universidad Carlos III de Madrid. Also, he spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and he received his PhD degree in Computer Science from the same university. Omid's thesis was mainly focused on Android malware analysis and triage. Generally speaking, Omid is working and conducting research in computer and cyber security. However, he is particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, he is eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources. Previously and as an undergraduate student, Omid worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Omid also developed several intelligent systems and passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.&lt;br /&gt;
&lt;br /&gt;
=== Rashmi Patil ===&lt;br /&gt;
'''HCL'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Rashmi is passionate about software engineering and applying it to solve complex problems in day to day life. She has a diverse set of work experience through past research, internships and full-time work experience that has really helped others in understanding the broader picture. In her free time, she volunteers and conducts educational workshops to teach young high school girls about the importance of Cybersecurity and encourage them to pursue a career in Computer Engineering. &lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina Valdivieso is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Presentations&amp;diff=254740</id>
		<title>2019 BASC Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Presentations&amp;diff=254740"/>
				<updated>2019-09-13T19:42:20Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Finished adding all but one presentation (waiting up updated abstract).&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template|Presentations}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
We would like to thank our speakers for donating their time and effort to help make this conference successful.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|An Intelligent Approach to Upgrading OSS Libraries|Madison Cool| | | }}&lt;br /&gt;
Maintaining secure versions of third-party libraries is a repetitive and tedious task at best. At worst, with many interdependent internal projects (think microservices) and dozens of layers of transitive dependencies, it is a logistical nightmare. A top-down, ad hoc approach is often used to resolve vulnerable third-party libraries, prioritizing high-severity vulnerabilities or internal projects critical to business functions, but failing to address the larger impact of vulnerabilities. TraceLink is taking a different approach, utilizing the graph structure of interconnected projects to perform security upgrades in an informed order from the bottom up. This process aims to automate third-party library version maintenance as much as possible, aiding in the completion of vital security upgrades and compounding the effects of each individual upgrade to reduce overall work done.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|OWASP Serverless Top 10|Tal Melamed| | | }}&lt;br /&gt;
In moving to serverless, we shift some security responsibilities to the infrastructure provider by eliminating the need to manage servers. Unfortunately, that doesn’t mean we’re entirely absolved of all security duties. Serverless functions still execute code and can still be vulnerable to application-level attacks. As a new type of architecture, serverless presents new security challenges. Some are equal to traditional application development, but some take a new form. Attackers are thinking differently, and developers must do so as well to gain the upper hand. &lt;br /&gt;
&lt;br /&gt;
In this talk, I will dive into the Top 10 risks of the OWASP Serverless Top 10 project. I will discuss why these risks are different from traditional attacks and how we should protect our application against them. I will also introduce OWASP DVSA, a deliberately vulnerable tool, aiming to assist both security professionals and developers to better understand the implications and processes of serverless security.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Security Culture Hacking: Disrupting the Security Status Quo|Chris Romeo| | | }}&lt;br /&gt;
This session is an exploration into the world of security culture hacking. In the wake of the “data breach of the day”, organizations claim they are more serious about security. The truth is that many still have weak security cultures. At the end of the day, how much actual security culture change occurs post-breach? The answer is not enough. This session describes how to change security culture from the inside out, utilizing best practices and real-world examples. With security culture disruption, the security team attempts to impact employees through positive security learning and experience.&lt;br /&gt;
&lt;br /&gt;
The session begins by introducing the audience to the concepts of security culture and security culture hacking, and then explains the security status quo. Security culture hacking is the skills and creativity necessary to disrupt an existing culture and redirect it towards a more secure future. Security status quo is the idea that companies move in a herd mentality and believe that their security must only be an average of their peers. To prove this point, we profile some anonymous organizations based on their external security story versus reality. Next, we’ll discuss what makes a good security culture hacker, including the skills required for success in this type of endeavor.&lt;br /&gt;
&lt;br /&gt;
The middle of this session includes a how-to of hacking security culture. Each section includes various tips and stories from real life experience about how to influence security culture. The phases of security culture improvement are explored, including awareness, big learning, and community. In addition, a discussion of organizational reach, marketing, rewards, recognition, and metrics surrounding security culture improvement are explored. It’s time to make security fun.&lt;br /&gt;
&lt;br /&gt;
At the conclusion, a plan is laid out for how a learner could put true security culture change into practice in their organization. Audience members receive a 30-60-90-1-year plan for how to implement true security culture change.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Critical Thinking in Cybersecurity|Kristin Dahl| | | }}&lt;br /&gt;
Security's most important skill is overlooked – critical thinking. Keeping up with the latest technical tools and trends is only one contributor to success. Security is a constantly evolving field. Long-term success requires that we think on our feet—regardless of technology—to understand tools and how to apply them to the changing landscape.&lt;br /&gt;
&lt;br /&gt;
We often do not think about critical thinking. What does it feel like? How is &amp;quot;critical&amp;quot; thinking different from &amp;quot;normal&amp;quot; thinking? How do you develop these skills?  And how do you apply them to security?&lt;br /&gt;
&lt;br /&gt;
Critical thinking is part art, part science. It takes a combination of intuition, logic, and creativity to understand the 'why' and not just the 'how.' It should help us address the root cause of an issue and not just the symptoms.  In security it means decomposing a problem, analyzing objectively, evaluating a hypothesis, and recognizing context. This session will explore how to apply critical thinking in your day-to-day job pulling from my experience and observations across academia, industry, and government.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Open Source Security on a Shoestring|Paulina Valdivieso| | | }}&lt;br /&gt;
Securing assets is a difficult job without the appropriate support, be it from your superiors or having access to resources: getting what you need can be challenging, but that is no excuse to not securing it. In small and medium companies where technology departments are service oriented, security is often overlooked in favor of ease of access, forcing IT to compromise on solutions and, potentially, leave the organization vulnerable.&lt;br /&gt;
&lt;br /&gt;
This talk will explore the open source and open access tools available to the public, their pros and cons, the elements to consider when implementing and the hurdles along the way, covering basic aspects of security in a company: incident response, application security, network security, training, risk &amp;amp; compliance, among others. Analysts, engineers and technicians whose many hats may result in security holes benefit from the implementation of these tools… and managers from knowing alternatives to the increasingly costly solutions in the market.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Put that Cease and Desist Down: How to Train Your Org to Work with Hackers|Luke Tucker| | | }}&lt;br /&gt;
Before that hacker slides into your brand’s DMs, how do you prepare your organization to talk to researchers and spot vulnerability disclosure? Today, poorly handled disclosures can cause the same reputational damage as a public security incident. As security continues to climb the ranks of importance, more decision makers and stakeholders are involved in interactions that were once solely owned by security teams. The vulnerability reports are coming. Ready or not. Everyone is on the front lines of security and this includes researcher interactions. Are your executives, legal, PR, and social media teams prepared?&lt;br /&gt;
&lt;br /&gt;
Based on hundreds of hacker and company mediation request, this talk will look at common and extreme scenarios many are seeing for the first time. We will cover real-world communication failures, as well as the success stories you will never read about. Attendees will walk away with armed with practical tips to prepare their colleagues for the inevitable vulnerability report, starting with hacker motivations, what disclosure success looks like, and de-escalation tips. This talk will cover: Responding to vulnerabilities reported via social media; How to minimize the chances of your vulnerabilities ending up on Twitter; Tips for keeping the press out of your bug reporting workflow; Prepare your company to talk to a hacker who is requesting cash; De-escalation tips to find a happy f@%#&amp;amp;$* ending when tempers flare and you are caught in the middle; and How to advocate for security researchers without losing friends or your job.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Identifying Malicious Android Applications in the Presence of Adversaries: A Cat-and-Mouse Game|Omid Mirzaei| | | }}&lt;br /&gt;
Android is by far the leading operating system in smartphones. As of March 2019, 51% of US smartphone subscribers were using a Google Android device. This percentage is much higher in an international scale. Also, there are currently more than 2 million Android applications on the official Google Market, known as Google Play. As most of the functionalities of smartphones are provided to users via applications, this huge market with billions of users is tempting for attackers to develop and distribute their malicious applications (or malware).&lt;br /&gt;
&lt;br /&gt;
Mobile malware has raised explosively since 2009. Symantec reported an increase of 54% in the new mobile malware variants in 2017 as compared to the previous year. This rise has happened for Android malware as well since only 20% of devices are running the newest major version of Android OS based on Symantec report in 2018. Thus, detecting malicious and potentially risky applications in the Android platform is of the utmost importance. During this talk, I will summarize different automated techniques proposed for Android malware detection and risk assessment. Along with this, I will discuss how adversaries have tried to bypass these mechanisms.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Automate or Die - DevSecOps in the Age of Software Supply Chain Attacks|Brian Fox| | | }}&lt;br /&gt;
As nimble organizations deliver new innovations, adversaries are also upping their game; something we’ve seen in recent high profile and devastating cyber attacks. Bad actors have the intent and ability to exploit security vulnerabilities in the software supply chain - and in some cases plant vulnerabilities themselves. They have increased scale through automation and improved breach success through precision targeting. If we don’t fight back by doing the same - automating security directly in the DevOps pipeline - then we’ll always be at the hackers’ mercy. This session will provide new research on the above, and details on how to get started.&lt;br /&gt;
&lt;br /&gt;
Key takeaways: Real-world examples of how large and small companies are implementing DevSecOps practices in their own delivery pipelines, and increasing developer awareness to risks; Key insights from the 2019 DevSecOps community report - including the top investments for automated security; A walkthrough of how security principles have been automated into a CICD pipeline and what standards for implementation are beginning to follow suite; Why DevSecOps is more than a buzzword, and why it’s vital to protecting your software supply chain; How automating security of policies makes it harder to ignore.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Finding Bugs Using Your Own Code: Machine Learning-based Inconsistent Code Detection|Mansour Ahmadi and Reza Mirzazade Farkhani| | | }}&lt;br /&gt;
Machine learning has shown success in detecting known types of software vulnerabilities in recent years, but they mostly need extensive specimens to train their models. &lt;br /&gt;
&lt;br /&gt;
As a new alternative to such approaches, we present a learning-based technique that can identify potentially buggy code snippets which deviate from most of the code snippets implementing similar functionalities. Our approach learns from a codebase itself without the need for the cumbersome task of gathering and cleansing training samples. The core idea is that various kinds of bugs can be viewed as inconsistencies that deviate from non-buggy code that implement the same or similar logic.&lt;br /&gt;
&lt;br /&gt;
More specifically, we design a two-step clustering technique to find functionally-similar yet inconsistent code in software. We implemented our system on top of LLVM, which makes our approach language-agnostic.&lt;br /&gt;
&lt;br /&gt;
We evaluated our tool on 4 popular open source security software codebases, such as OpenSSL, OpenSSH, WolfSSL, and Mbedtls. Our tool discovered 10 new unique deep bugs (some are exploitable), despite that some of these codebases are constantly undergoing vulnerability scans. All of the bugs have been confirmed by their developers and later fixed by either our pull requests or the developers.&lt;br /&gt;
&lt;br /&gt;
How does the system work really? How easy to find bugs by our approach and how much manual effort does it need? What is a proper code granularity for detecting inconsistencies?&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|SAST Triage Tricks of the Trade - How to Triage Before the Universe Dies Out|Kristofer Duer and Rashmi Patil| | | }}&lt;br /&gt;
Ever gotten a pile of SAST findings and wondered - what now? How do you possibly trim the fat of uninteresting findings down to a manageable set and get to work making the world a safer place? We will talk about some easy tips on how to prioritize and isolate those results which matter the most to your organization.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|The User Experience of Information Security|Chris Chagnon and Ryan LaMarche| | | }}&lt;br /&gt;
Targeted and increasingly sophisticated attacks are growing in popularity. With spear-phishing, ransomware, and a slew of other user-oriented attacks, our information security, particularly our operational security, relies on having our users on board. But training end-users can be difficult, and our response to mitigating these attacks can sometimes come at a great expense to UX. This session delves into the User Experience of Information Security, and provides attendees with insights into how some of our best laid security measures might actually increase our vulnerability to future attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template|Presentations}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254738</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254738"/>
				<updated>2019-09-13T18:54:26Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: First half of speakers added.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
=== Kristin Dahl ===&lt;br /&gt;
'''IBM X-Force IRIS'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Kristin Dahl is a cyber security consultant with IBM X-Force IRIS and former research staff member at MIT Lincoln Laboratory. Kristin’s experience includes investigative research, policy development, threat assessment, and security operations across the defense sectors, critical systems, academia, and private industry. Kristin has worked collaboratively with multiple stakeholders and federal agencies, including the Department of Defense, the Department of Homeland Security, and the Department of Energy.&lt;br /&gt;
&lt;br /&gt;
=== Tal Melamed ===&lt;br /&gt;
'''Protego Labs'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Chris Romeo ===&lt;br /&gt;
'''Security Journey'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Chris Romeo is CEO and co-founder of Security Journey where he creates and deploys security culture influencing training, consults, and speaks. His passion is to bring security culture change to all organizations large and small through the creation and design of gamified security education. He was the Chief Security Advocate at Cisco for five years, where he empowered engineers to shift security left in all products at Cisco and led the creation of Cisco’s security belt program. Chris has twenty years of experience in security, holding positions across the gamut, including application security, penetration testing, and incident response. Chris holds the CISSP and CSSLP certifications.  Find Chris on Twitter, @edgeroute, or on LinkedIN, https://www.linkedin.com/in/securityjourney/&lt;br /&gt;
&lt;br /&gt;
=== Luke Tucker ===&lt;br /&gt;
'''HackerOne'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Luke Tucker is the Senior Director of Community at HackerOne — the leading hacker-powered security platform with the largest community of hackers in the world. A seasoned community engagement professional, he is passionate about helping identify and nurture what makes people and communities tick, so understanding how hackers feel and how they are seen is his bread and butter. He is the Creator and Editor of the Zero Daily Newsletter, which provides daily application security, hacker and bug bounty news. Previously at HackerOne, Luke oversaw all B2B content marketing efforts, brand voice and social media management, and educational content development for the growing community of hackers. Prior to HackerOne, he served in several creative roles including Captricity and Sultan Ventures. &lt;br /&gt;
&lt;br /&gt;
=== Paulina Valdivieso ===&lt;br /&gt;
'''Bennington College'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Paulina is a senior undergrad in Computer Science and Public Policy, studying the intersections between Cybersecurity, Law and Politics. Interested in hacking, information security, programming and general electronic shenanigans, she recently started to apply all of this knowledge into the workplace, centering on network and application security. She is an advocate for open access and privacy, using and committing to open source tools whenever possible and making sure people understand the implications and dark side of the tools they use everyday.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Presentations&amp;diff=254737</id>
		<title>2019 BASC Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Presentations&amp;diff=254737"/>
				<updated>2019-09-13T18:53:09Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: First half of presentations added.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template|Presentations}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
We would like to thank our speakers for donating their time and effort to help make this conference successful.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|An Intelligent Approach to Upgrading OSS Libraries|Madison Cool| | | }}&lt;br /&gt;
Maintaining secure versions of third-party libraries is a repetitive and tedious task at best. At worst, with many interdependent internal projects (think microservices) and dozens of layers of transitive dependencies, it is a logistical nightmare. A top-down, ad hoc approach is often used to resolve vulnerable third-party libraries, prioritizing high-severity vulnerabilities or internal projects critical to business functions, but failing to address the larger impact of vulnerabilities. TraceLink is taking a different approach, utilizing the graph structure of interconnected projects to perform security upgrades in an informed order from the bottom up. This process aims to automate third-party library version maintenance as much as possible, aiding in the completion of vital security upgrades and compounding the effects of each individual upgrade to reduce overall work done.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|OWASP Serverless Top 10|Tal Melamed| | | }}&lt;br /&gt;
In moving to serverless, we shift some security responsibilities to the infrastructure provider by eliminating the need to manage servers. Unfortunately, that doesn’t mean we’re entirely absolved of all security duties. Serverless functions still execute code and can still be vulnerable to application-level attacks. As a new type of architecture, serverless presents new security challenges. Some are equal to traditional application development, but some take a new form. Attackers are thinking differently, and developers must do so as well to gain the upper hand. &lt;br /&gt;
&lt;br /&gt;
In this talk, I will dive into the Top 10 risks of the OWASP Serverless Top 10 project. I will discuss why these risks are different from traditional attacks and how we should protect our application against them. I will also introduce OWASP DVSA, a deliberately vulnerable tool, aiming to assist both security professionals and developers to better understand the implications and processes of serverless security.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Security Culture Hacking: Disrupting the Security Status Quo|Chris Romeo| | | }}&lt;br /&gt;
This session is an exploration into the world of security culture hacking. In the wake of the “data breach of the day”, organizations claim they are more serious about security. The truth is that many still have weak security cultures. At the end of the day, how much actual security culture change occurs post-breach? The answer is not enough. This session describes how to change security culture from the inside out, utilizing best practices and real-world examples. With security culture disruption, the security team attempts to impact employees through positive security learning and experience.&lt;br /&gt;
&lt;br /&gt;
The session begins by introducing the audience to the concepts of security culture and security culture hacking, and then explains the security status quo. Security culture hacking is the skills and creativity necessary to disrupt an existing culture and redirect it towards a more secure future. Security status quo is the idea that companies move in a herd mentality and believe that their security must only be an average of their peers. To prove this point, we profile some anonymous organizations based on their external security story versus reality. Next, we’ll discuss what makes a good security culture hacker, including the skills required for success in this type of endeavor.&lt;br /&gt;
&lt;br /&gt;
The middle of this session includes a how-to of hacking security culture. Each section includes various tips and stories from real life experience about how to influence security culture. The phases of security culture improvement are explored, including awareness, big learning, and community. In addition, a discussion of organizational reach, marketing, rewards, recognition, and metrics surrounding security culture improvement are explored. It’s time to make security fun.&lt;br /&gt;
&lt;br /&gt;
At the conclusion, a plan is laid out for how a learner could put true security culture change into practice in their organization. Audience members receive a 30-60-90-1-year plan for how to implement true security culture change.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Critical Thinking in Cybersecurity|Kristin Dahl| | | }}&lt;br /&gt;
Security's most important skill is overlooked – critical thinking. Keeping up with the latest technical tools and trends is only one contributor to success. Security is a constantly evolving field. Long-term success requires that we think on our feet—regardless of technology—to understand tools and how to apply them to the changing landscape.&lt;br /&gt;
&lt;br /&gt;
We often do not think about critical thinking. What does it feel like? How is &amp;quot;critical&amp;quot; thinking different from &amp;quot;normal&amp;quot; thinking? How do you develop these skills?  And how do you apply them to security?&lt;br /&gt;
&lt;br /&gt;
Critical thinking is part art, part science. It takes a combination of intuition, logic, and creativity to understand the 'why' and not just the 'how.' It should help us address the root cause of an issue and not just the symptoms.  In security it means decomposing a problem, analyzing objectively, evaluating a hypothesis, and recognizing context. This session will explore how to apply critical thinking in your day-to-day job pulling from my experience and observations across academia, industry, and government.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Open Source Security on a Shoestring|Paulina Valdivieso| | | }}&lt;br /&gt;
Securing assets is a difficult job without the appropriate support, be it from your superiors or having access to resources: getting what you need can be challenging, but that is no excuse to not securing it. In small and medium companies where technology departments are service oriented, security is often overlooked in favor of ease of access, forcing IT to compromise on solutions and, potentially, leave the organization vulnerable.&lt;br /&gt;
&lt;br /&gt;
This talk will explore the open source and open access tools available to the public, their pros and cons, the elements to consider when implementing and the hurdles along the way, covering basic aspects of security in a company: incident response, application security, network security, training, risk &amp;amp; compliance, among others. Analysts, engineers and technicians whose many hats may result in security holes benefit from the implementation of these tools… and managers from knowing alternatives to the increasingly costly solutions in the market.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|Put that Cease and Desist Down: How to Train Your Org to Work with Hackers|Luke Tucker| | | }}&lt;br /&gt;
Before that hacker slides into your brand’s DMs, how do you prepare your organization to talk to researchers and spot vulnerability disclosure? Today, poorly handled disclosures can cause the same reputational damage as a public security incident. As security continues to climb the ranks of importance, more decision makers and stakeholders are involved in interactions that were once solely owned by security teams. The vulnerability reports are coming. Ready or not. Everyone is on the front lines of security and this includes researcher interactions. Are your executives, legal, PR, and social media teams prepared?&lt;br /&gt;
&lt;br /&gt;
Based on hundreds of hacker and company mediation request, this talk will look at common and extreme scenarios many are seeing for the first time. We will cover real-world communication failures, as well as the success stories you will never read about. Attendees will walk away with armed with practical tips to prepare their colleagues for the inevitable vulnerability report, starting with hacker motivations, what disclosure success looks like, and de-escalation tips. This talk will cover: Responding to vulnerabilities reported via social media; How to minimize the chances of your vulnerabilities ending up on Twitter; Tips for keeping the press out of your bug reporting workflow; Prepare your company to talk to a hacker who is requesting cash; De-escalation tips to find a happy f@%#&amp;amp;$* ending when tempers flare and you are caught in the middle; and How to advocate for security researchers without losing friends or your job.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template|Presentations}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254735</id>
		<title>2019 BASC Speakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Speakers&amp;diff=254735"/>
				<updated>2019-09-13T18:14:22Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Create Initial 2019 Speakers page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Speakers/Trainers}}&lt;br /&gt;
&lt;br /&gt;
=== Madison Cool ===&lt;br /&gt;
'''TraceLink'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Madison Cool is an associate AppSec engineer at TraceLink, delivering a secure platform for the Pharmaceutical Supply Chain. She works with the TraceLink team to make &amp;quot;TraceLink = Trusted&amp;quot; by ensuring that customers, partners and internal engineering can meet and exceed best security practices. Their goal is to make security accessible and understandable by both the security-minded and the security-unaware.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Speakers/Trainers}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Presentations&amp;diff=254734</id>
		<title>2019 BASC Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Presentations&amp;diff=254734"/>
				<updated>2019-09-13T18:12:37Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Create initial 2019 Presentations page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template|Presentations}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
We would like to thank our speakers for donating their time and effort to help make this conference successful.&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Presentaton_Info_Template|An Intelligent Approach to Upgrading OSS Libraries|Madison Cool| | | }}&lt;br /&gt;
Maintaining secure versions of third-party libraries is a repetitive and tedious task at best. At worst, with many interdependent internal projects (think microservices) and dozens of layers of transitive dependencies, it is a logistical nightmare. A top-down, ad hoc approach is often used to resolve vulnerable third-party libraries, prioritizing high-severity vulnerabilities or internal projects critical to business functions, but failing to address the larger impact of vulnerabilities. TraceLink is taking a different approach, utilizing the graph structure of interconnected projects to perform security upgrades in an informed order from the bottom up. This process aims to automate third-party library version maintenance as much as possible, aiding in the completion of vital security upgrades and compounding the effects of each individual upgrade to reduce overall work done.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template|Presentations}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Presentaton_Info_Template&amp;diff=254733</id>
		<title>Template:2019 BASC:Presentaton Info Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Presentaton_Info_Template&amp;diff=254733"/>
				<updated>2019-09-13T18:05:26Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Created page with &amp;quot;&amp;lt;!--     Parameters:       1=title       2=Speaker Name __EXACTLY__ as it appears on the speaker page       3=optional extra such as | Media:2016_BASC_Succeeding_with_Automa...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- &lt;br /&gt;
   Parameters:&lt;br /&gt;
      1=title&lt;br /&gt;
      2=Speaker Name __EXACTLY__ as it appears on the speaker page&lt;br /&gt;
      3=optional extra such as | [[Media:2016_BASC_Succeeding_with_Automation.pptx|Slides]]&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
==={{{1}}}===&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin-left: 10px;&amp;quot;&amp;gt;'''Presented by:''' [[2019_BASC_Speakers#{{{2}}}|{{{2}}}]]{{{3}}}&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Footer_Template&amp;diff=254732</id>
		<title>Template:2019 BASC:Footer Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Footer_Template&amp;diff=254732"/>
				<updated>2019-09-13T17:33:15Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;You can find out more about this conference at the [[2019 BASC Homepage]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;or by emailing [mailto:boston-leaders@owasp.org boston-leaders@owasp.org]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:twitter_32.png|link=https://twitter.com/@BASConf]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Massachusetts]]&lt;br /&gt;
[[Category:2019 BASC]]&lt;br /&gt;
[[Category:Boston]]&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Homepage&amp;diff=254731</id>
		<title>2019 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Homepage&amp;diff=254731"/>
				<updated>2019-09-13T17:29:47Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Only Silver Sponsorships remain&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Home}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== Welcome   ==&lt;br /&gt;
This is the homepage for the 2019 Boston Application Security Conference (BASC). Conference will take place 8:30am to 6:30pm on Saturday, October 19&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at &lt;br /&gt;
* Location: [https://goo.gl/maps/MErChZ3cX5B2 5 Wayside Road Burlington, MA]  &lt;br /&gt;
&lt;br /&gt;
The BASC will be a free*, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: * Some workshops and training may have a separate fee.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== Call for Papers/Workshops ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/BASC_2019_Call_For_Papers CFP/CFW link]  &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
[https:// COMING SOON]  &lt;br /&gt;
&lt;br /&gt;
Registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited.&lt;br /&gt;
&lt;br /&gt;
You may also register for one or more workshops, but workshop tickets are limited.  Please be considerate of others and '''only register for a workshop if you plan to attend'''.  If your plans change, please cancel your ticket to free the space up for others.  Do not sign up for more than one session of the same workshop, or for workshops whose times overlap.   If you do, conference organizers will cancel your ticket orders.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Keynotes ==&lt;br /&gt;
&lt;br /&gt;
'''The Internet Sucks.  Should we replace it?'''&lt;br /&gt;
&lt;br /&gt;
'''Andy Ellis,''' Akamai&lt;br /&gt;
&lt;br /&gt;
[[File:Andy-ellis_0532_1-2.jpg|left|frameless]]&lt;br /&gt;
&lt;br /&gt;
50 years into the Internet, it’s become very clear that there are virtually no security goals designed into the underpinnings of the Internet, and even higher level protocols suffer from this lack.  As a result, existing on the Internet makes the Wild West look like a tame environment.  Should we attempt to redesign the Internet, and make it secure by default?  Let’s explore the dystopian world of an alternate Internet, and see why the Internet we have might actually be the best Internet we could hope for.&lt;br /&gt;
&lt;br /&gt;
Andy Ellis is Akamai’s Chief Security Officer, and his mission is “making the Internet suck less.” Governing cybersecurity, compliance, and safety for Akamai’s planetary-scale cloud platform since 2000, he has also designed and brought to market Akamai’s TLS acceleration network, its DDoS defense offerings, and several of the core technologies behind its security solutions. Andy has also guided Akamai’s IT transformation from a flat password-based network to a distributed, zero-trust enterprise based on strong authentication.&lt;br /&gt;
&lt;br /&gt;
Andy is a graduate of MIT with a degree in computer science, and has served as an officer in the United States Air Force with the 609th Information Warfare Squadron and the Electronic Systems Center.&lt;br /&gt;
&lt;br /&gt;
Also active in Internet policy and governance circles, Andy has supported past and present Akamai CEOs in roles on the NIAC and NSTAC, as well as serving on the FCC’s Communications Security, Reliability, and Interoperability Council. He is an affiliate of Harvard’s Berkman Klein Center, and a guest lecturer in executive education at MIT and the Harvard Kennedy School. He is a frequent speaker on topics of Internet security, anthropocentric risk management, and security governance; and occasionally blogs at www.csoandy.com. He can be found on Twitter as @csoandy, where he discusses security, wine, American football, and hairstyling.&lt;br /&gt;
&lt;br /&gt;
Andy is also an Advisor to YL Ventures’ YLV3 Fund, Uptycs, and Vulcan Cyber.&lt;br /&gt;
&lt;br /&gt;
Andy has received The Spirit of Disneyland Award, The Wine Spectator’s Award of Excellence (as The Arlington Inn), the US Air Force Commendation Medal, and the CSO Compass Award.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Sandcastles in a Storm: Application Vulnerabilities and how they weaken our organizations'''&lt;br /&gt;
&lt;br /&gt;
'''Kevin Johnson,''' Secure Ideas&lt;br /&gt;
&lt;br /&gt;
[[File:KevinJohnson.jpg|175px|left|frameless]]&lt;br /&gt;
&lt;br /&gt;
In this presentation Kevin will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things.   We will explore the vulnerabilities, how they are attacked, and what it means to all of us.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions for large enterprises and penetration testing everything from government agencies to Fortune 100 companies. In addition, Kevin is a faculty member at IANS and was an instructor and author for the SANS Institute.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In his free time, Kevin enjoys spending time with his family and is an avid Star Wars fan and member of the 501st Legion (Star Wars charity group)&lt;br /&gt;
&lt;br /&gt;
Kevin is also very involved in the open source community. He runs a number of open source projects. These include SamuraiWTF; a web pen-testing environment, Laudanum; a collection of injectable web payloads, Yokoso; an infrastructure fingerprinting project and a number of others. Kevin is also involved in MobiSec and SH5ARK. Kevin was the founder and lead of the BASE project for Snort before transitioning that to another developer.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
&lt;br /&gt;
*  Only Silver Sponsorships Remain [https://www.owasp.org/images/9/94/BASCSponsorship2019.pdf Sponsorship Kit]&lt;br /&gt;
* [[2019_BASC_Presentations | Presentations]]&lt;br /&gt;
* [[2019_BASC_Workshops | Workshops]]&lt;br /&gt;
* [[2019_BASC_Speakers | Speakers]]&lt;br /&gt;
* [[2019_BASC_Agenda | Agenda]]&lt;br /&gt;
* Twitter: Follow [https://twitter.com/BASConf @BASConf] @[https://twitter.com/owaspboston OWASPBoston] HashTag: #basc2019&lt;br /&gt;
&lt;br /&gt;
== OWASP Boston Chapter ==&lt;br /&gt;
BASC is presented by the [https://www.owasp.org/index.php/Boston OWASP Boston] chapter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2019_BASC_Homepage&amp;diff=254491</id>
		<title>2019 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2019_BASC_Homepage&amp;diff=254491"/>
				<updated>2019-09-04T01:47:58Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Andy's Abstract was missing.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Home}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== Welcome   ==&lt;br /&gt;
This is the homepage for the 2019 Boston Application Security Conference (BASC). Conference will take place 8:30am to 6:30pm on Saturday, October 19&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at &lt;br /&gt;
* Location: [https://goo.gl/maps/MErChZ3cX5B2 5 Wayside Road Burlington, MA]  &lt;br /&gt;
&lt;br /&gt;
The BASC will be a free*, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NOTE: * Some workshops and training may have a separate fee.&lt;br /&gt;
&lt;br /&gt;
== Call for Papers/Workshops ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/BASC_2019_Call_For_Papers CFP/CFW link]  &lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
[https:// COMING SOON]  &lt;br /&gt;
&lt;br /&gt;
Registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited.&lt;br /&gt;
&lt;br /&gt;
You may also register for one or more workshops, but workshop tickets are limited.  Please be considerate of others and '''only register for a workshop if you plan to attend'''.  If your plans change, please cancel your ticket to free the space up for others.  Do not sign up for more than one session of the same workshop, or for workshops whose times overlap.   If you do, conference organizers will cancel your ticket orders.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Keynotes ==&lt;br /&gt;
&lt;br /&gt;
'''The Internet Sucks.  Should we replace it?'''&lt;br /&gt;
&lt;br /&gt;
'''Andy Ellis,''' Akamai&lt;br /&gt;
&lt;br /&gt;
[[File:Andy-ellis_0532_1-2.jpg|left|frameless]]&lt;br /&gt;
&lt;br /&gt;
50 years into the Internet, it’s become very clear that there are virtually no security goals designed into the underpinnings of the Internet, and even higher level protocols suffer from this lack.  As a result, existing on the Internet makes the Wild West look like a tame environment.  Should we attempt to redesign the Internet, and make it secure by default?  Let’s explore the dystopian world of an alternate Internet, and see why the Internet we have might actually be the best Internet we could hope for.&lt;br /&gt;
&lt;br /&gt;
Andy Ellis is Akamai’s Chief Security Officer, and his mission is “making the Internet suck less.” Governing cybersecurity, compliance, and safety for Akamai’s planetary-scale cloud platform since 2000, he has also designed and brought to market Akamai’s TLS acceleration network, its DDoS defense offerings, and several of the core technologies behind its security solutions. Andy has also guided Akamai’s IT transformation from a flat password-based network to a distributed, zero-trust enterprise based on strong authentication.&lt;br /&gt;
&lt;br /&gt;
Andy is a graduate of MIT with a degree in computer science, and has served as an officer in the United States Air Force with the 609th Information Warfare Squadron and the Electronic Systems Center.&lt;br /&gt;
&lt;br /&gt;
Also active in Internet policy and governance circles, Andy has supported past and present Akamai CEOs in roles on the NIAC and NSTAC, as well as serving on the FCC’s Communications Security, Reliability, and Interoperability Council. He is an affiliate of Harvard’s Berkman Klein Center, and a guest lecturer in executive education at MIT and the Harvard Kennedy School. He is a frequent speaker on topics of Internet security, anthropocentric risk management, and security governance; and occasionally blogs at www.csoandy.com. He can be found on Twitter as @csoandy, where he discusses security, wine, American football, and hairstyling.&lt;br /&gt;
&lt;br /&gt;
Andy is also an Advisor to YL Ventures’ YLV3 Fund, Uptycs, and Vulcan Cyber.&lt;br /&gt;
&lt;br /&gt;
Andy has received The Spirit of Disneyland Award, The Wine Spectator’s Award of Excellence (as The Arlington Inn), the US Air Force Commendation Medal, and the CSO Compass Award.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Sandcastles in a Storm: Application Vulnerabilities and how they weaken our organizations'''&lt;br /&gt;
&lt;br /&gt;
'''Kevin Johnson,''' Secure Ideas&lt;br /&gt;
&lt;br /&gt;
[[File:KevinJohnson.jpg|175px|left|frameless]]&lt;br /&gt;
&lt;br /&gt;
In this presentation Kevin will walk through some of the issues we face as we move more and more of our life into applications and the Internet of Things.   We will explore the vulnerabilities, how they are attacked, and what it means to all of us.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions for large enterprises and penetration testing everything from government agencies to Fortune 100 companies. In addition, Kevin is a faculty member at IANS and was an instructor and author for the SANS Institute.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In his free time, Kevin enjoys spending time with his family and is an avid Star Wars fan and member of the 501st Legion (Star Wars charity group)&lt;br /&gt;
&lt;br /&gt;
Kevin is also very involved in the open source community. He runs a number of open source projects. These include SamuraiWTF; a web pen-testing environment, Laudanum; a collection of injectable web payloads, Yokoso; an infrastructure fingerprinting project and a number of others. Kevin is also involved in MobiSec and SH5ARK. Kevin was the founder and lead of the BASE project for Snort before transitioning that to another developer.&lt;br /&gt;
&lt;br /&gt;
== Details ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[2019_BASC_Workshops | Workshops]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* [https://www.owasp.org/images/9/94/BASCSponsorship2019.pdf Sponsorship Kit]&lt;br /&gt;
* [[2019_BASC_Presentations | Presentations]]&lt;br /&gt;
* [[2019_BASC_Workshops | Workshops]]&lt;br /&gt;
* [[2019_BASC_Speakers | Speakers]]&lt;br /&gt;
* [[2019_BASC_Agenda | Agenda]]&lt;br /&gt;
* Twitter: Follow [https://twitter.com/BASConf @BASConf] @[https://twitter.com/owaspboston OWASPBoston] HashTag: #basc2019&lt;br /&gt;
&lt;br /&gt;
== OWASP Boston Chapter ==&lt;br /&gt;
BASC is presented by the [https://www.owasp.org/index.php/Boston OWASP Boston] chapter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BASC_2019_Call_For_Papers&amp;diff=253803</id>
		<title>BASC 2019 Call For Papers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BASC_2019_Call_For_Papers&amp;diff=253803"/>
				<updated>2019-08-16T15:23:26Z</updated>
		
		<summary type="html">&lt;p&gt;Laberdale: Updated deadline at bottom of page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2019_BASC:Header_Template | Home}}&lt;br /&gt;
&lt;br /&gt;
== Submit Your Proposal ==&lt;br /&gt;
&lt;br /&gt;
Please use [https://docs.google.com/forms/d/e/1FAIpQLSef_pgvIUZtXl7wpiCUmx93ZKog9BQPk9fkX100TaG7ynBO4g/viewform?usp=sf_link this form] to submit your proposal for a presentation.&lt;br /&gt;
&lt;br /&gt;
Please use [https://forms.gle/6tJgrmxqt8sWkKbMA this form] to submit your proposal for a workshop.&lt;br /&gt;
&lt;br /&gt;
Deadline for proposals: Midnight on August 25, 2019&lt;br /&gt;
&lt;br /&gt;
Conference date: October 19, 2019&lt;br /&gt;
&lt;br /&gt;
== About BASC == &lt;br /&gt;
&lt;br /&gt;
The [[Boston | OWASP Boston chapter]] would like to announce a call for papers and free workshops for the Boston Application Security Conference. This our 9th annual conference.&lt;br /&gt;
&lt;br /&gt;
The OWASP BASC (Boston Application Security Conference) will be a free*, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide range of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors will come to the BASC to learn, interact and hopefully enjoy themselves at the same time. We encourage local students, security professionals and academics to present papers as a way to gain exposure and experience in presenting at security conferences.  *Note that some workshops or training may require a fee.&lt;br /&gt;
&lt;br /&gt;
We expect over 200 attendees this year. Publicity includes the OWASP Boston wiki site (run by OWASP Foundation), OWASP Boston Meetup, OWASP Boston Linkedin group, OWASP Boston mailing list, Eventbrite and Twitter.&lt;br /&gt;
==Past conference presentations==&lt;br /&gt;
[[2018 BASC Presentations]]  &amp;amp;middot; [[2017 BASC Presentations]]  &amp;amp;middot;[[2016 BASC Presentations]]  &amp;amp;middot; [[2015 BASC Presentations]] &amp;amp;middot; [[2014 BASC Presentations]] &amp;amp;middot; [[2012 BASC Presentations]] &amp;amp;middot; [[2011 BASC Presentations]] &amp;amp;middot; [[2010 BASC Presentations]]&lt;br /&gt;
&lt;br /&gt;
==Guidelines==&lt;br /&gt;
Last year, there were two tracks:&lt;br /&gt;
&lt;br /&gt;
Track 1 - Basic/Current Application Security&lt;br /&gt;
&lt;br /&gt;
Track 2 - Information Security/Frameworks/Professional Development&lt;br /&gt;
&lt;br /&gt;
Each presentation will be 45 minutes.&lt;br /&gt;
&lt;br /&gt;
We attract both people who are new to application security as well as people who are experienced in application security.&lt;br /&gt;
&lt;br /&gt;
We encourage first time presenters: students, researchers, working application security folks etc. to submit presentations.&lt;br /&gt;
&lt;br /&gt;
==Some Suggested Topics==&lt;br /&gt;
&amp;lt;div style=&amp;quot;column-count:3;-moz-column-count:3;-webkit-column-count:3&amp;quot;&amp;gt;&lt;br /&gt;
*Mobile app security, forensics&lt;br /&gt;
&lt;br /&gt;
*Javascript servers, apps, frameworks: Node.js, Angular&lt;br /&gt;
&lt;br /&gt;
*Language Framework (in)security – Hibernate, Grails, Ruby etc.&lt;br /&gt;
&lt;br /&gt;
*Security for NFC, Bluetooth LE apps&lt;br /&gt;
&lt;br /&gt;
*Google Glass app security&lt;br /&gt;
&lt;br /&gt;
*OWASP ESAPI&lt;br /&gt;
&lt;br /&gt;
*Measurable security - advanced threat modelling&lt;br /&gt;
&lt;br /&gt;
*Web API security REST, JSON&lt;br /&gt;
&lt;br /&gt;
*Application Architecture security&lt;br /&gt;
&lt;br /&gt;
*Web security testing in a DevOps organization&lt;br /&gt;
&lt;br /&gt;
*Building web app security expertise in engineering teams&lt;br /&gt;
&lt;br /&gt;
*Conducting lightweight threat modeling&lt;br /&gt;
&lt;br /&gt;
*Vulnerability Management - Process &amp;amp; Tools&lt;br /&gt;
&lt;br /&gt;
*Developing your own web app security development standard&lt;br /&gt;
&lt;br /&gt;
*Security test automation with OWASP ZAP and Zest scripting language&lt;br /&gt;
&lt;br /&gt;
*Authentication &amp;amp; Enterprise Web Applications (incl. Federation, 2 Factor Auth, SSO)&lt;br /&gt;
&lt;br /&gt;
*Open Source Identity Management&lt;br /&gt;
&lt;br /&gt;
*Open Source Static Analysis&lt;br /&gt;
&lt;br /&gt;
*Security Unit testing with Selenium&lt;br /&gt;
&lt;br /&gt;
*Effective static code analysis tools&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Submit==&lt;br /&gt;
&lt;br /&gt;
Please see above for links.&lt;br /&gt;
&lt;br /&gt;
Deadline for proposals: August 25, 2019&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please email [mailto:boston-leaders@owasp.org boston-leaders@owasp.org].&lt;br /&gt;
&lt;br /&gt;
{{2019_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Laberdale</name></author>	</entry>

	</feed>