<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=LievenDesmet</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=LievenDesmet"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/LievenDesmet"/>
		<updated>2026-04-22T16:39:46Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2019&amp;diff=256254</id>
		<title>Belgium Events 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2019&amp;diff=256254"/>
				<updated>2019-12-05T19:14:40Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2019 events of the [[Belgium|OWASP Belgium Chapter]]. &amp;lt;!-- Copy the source from [[Belgium Chapter Meeting Template]] to start a new chapter meeting event! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2018|2018]].&lt;br /&gt;
&amp;lt;!-- Next year: [[Belgium Events 2020|2020]].--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 25 November 2019 Meeting ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://www.radissonhotels.com/en-us/hotels/park-inn-leuven Park Inn by Radisson Leuven] The event is co-located  with [https://impulsprogramma-cybersecurity-2019-11-25.eventbrite.com/ a briefing and industry opportunity meeting of the  Flanders Cyber Security impuls program].  Feel free to [https://impulsprogramma-cybersecurity-2019-11-25.eventbrite.com/ register] for this co-located event if interested.&lt;br /&gt;
&lt;br /&gt;
* Address:&lt;br /&gt;
 Park Inn by Radisson Leuven&lt;br /&gt;
 Martelarenlaan 36&lt;br /&gt;
 3010  Leuven&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
*18h00 - 19h00: Welcome &amp;amp; networking&lt;br /&gt;
*19h00 - 19h10: ''[https://www.owasp.org/images/a/a3/Owasp_be_update_20191125.pdf OWASP Update]'' by Lieven Desmet (OWASP BE)&lt;br /&gt;
*19h10 - 20h00: ''[https://www.owasp.org/images/3/39/Owasp-be-20191125-deryck-recentevolutionsoauth.pdf Recent evolutions in the OAuth 2.0 and OpenID Connect landscape]'' by Philippe De Ryck (Founder of Pragmatic Web Security and Google Developer Expert)&lt;br /&gt;
*20u00 - 20u50: ''[https://www.owasp.org/images/2/23/Owasp-be-2019-11-25-desmet.pdf Detection and Prevention of DNS abuse in .eu TLD]'' by Lieven Desmet (DistriNet, KU Leuven)&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== Recent evolutions in the OAuth 2.0 and OpenID Connect landscape ====&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Ever since the introduction of OAuth 2.0, the framework has been in continuous evolution. The initial specification addressed a strong need for delegation. However, since then, various addendums focus on the needs of modern applications. Today, the suite of OAuth 2.0 specifications supports a broad spectrum of different scenarios. For each of these scenarios makes their security assumptions and defines a set of best practices.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will investigate a number of these recent additions. We look at the recently added “Proof of Key for Code Exchange” (PKCE) flow. We also investigate how it is becoming the default flow for Single Page Applications. We also extensively dive into “Proof of Possession” tokens. Their security properties are significantly better than bearer tokens. Consequentially, everyone should know what they entail, and how to use them. You will walk away with a solid overview of recent evolutions in OAuth 2.0, and where to use them in your applications.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Philippe De Ryck helps developers protect companies through better web security. As the founder of Pragmatic Web Security, he travels the world to train developers on web security and security engineering. His Ph.D. in web security from KU Leuven lies at the basis of his exceptional knowledge of the security landscape. Google recognizes Philippe as a Google Developer Expert for his work on security in Angular applications.&lt;br /&gt;
&lt;br /&gt;
==== Detection and Prevention of DNS abuse in .eu TLD ====&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
This session reports on an extensive analysis of 14 months of domain registration in the .eu TLD. In particular, we investigate domain names that are registered for malicious purposes (such as spam, phishing, botnets C&amp;amp;C, ...). The goal of our research is to understand and identify large-scale malicious campaigns, and to early detect and prevent malicious registrations.&lt;br /&gt;
&lt;br /&gt;
We explore the ecosystem and modus operandi of elaborate cyber criminal entities that recurrently register large amounts of domains for one-shot, malicious use. We further report on insights in the operational aspects of this business and observe, for instance, that their processes are only partially automated.&lt;br /&gt;
&lt;br /&gt;
Finally, we present our automatic prediction system, that classifies at registration time whether a domain name will be used maliciously or benign. As such, malicious domain registrations can effectively be prevented from doing any harm. As part of the talk, we discuss the first results of this prediction system, which currently runs in production at EURid, the registry of the .eu TLD.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Lieven Desmet is a Senior Research Manager on Secure Software in the imec-DistriNet Research Group at the Katholieke Universiteit Leuven (Belgium), where he outlines and implements the research strategy, coaches junior researchers in web and infrastructure security, and participates in dissemination, valorisation and spin-off activities.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration is via EventBrite: https://owasp-belgium-2019-11-25.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;br /&gt;
&lt;br /&gt;
== summit working session on OWASP SAMM ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium presents a summit working session on OWASP SAMM in Antwerp on 30 April: &lt;br /&gt;
&lt;br /&gt;
Registration via https://www.eventbrite.com/e/open-security-summit-working-session-tickets-60456102831&lt;br /&gt;
&lt;br /&gt;
== 20 February 2019 Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Burn-down list for customization:&lt;br /&gt;
- Replace LINK_PRESENTER_TALK_1&lt;br /&gt;
- Replace LINK_PRESENTER_TALK_2&lt;br /&gt;
- Replace OWASP_UPDATE_PRESENTATION, uncomment the link and delete the placeholder (italicized title)&lt;br /&gt;
- Replace SLIDES_TALK_1, uncomment the links and delete the placeholders (italicized title and &amp;quot;not yet available&amp;quot; in the talk's subsection)&lt;br /&gt;
- Replace SLIDES_TALK_2, uncomment the links and delete the placeholders (italicized title and &amp;quot;not yet available&amp;quot; in the talk's subsection)&lt;br /&gt;
- Provide coverage photos / links to blog posts etc.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2019-02-18 to 2018-02-22.)&lt;br /&gt;
&lt;br /&gt;
* Address ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions]):&lt;br /&gt;
 Department of Computer Science (foyer at ground floor)&lt;br /&gt;
 Celestijnenlaan 200 A&lt;br /&gt;
 3001 Heverlee&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
*18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
*19h00 - 19h10: ''[https://www.owasp.org/images/6/69/Owasp_Belgium_update_2019-02-20_v1.pdf OWASP Update]'' by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
*19h10 - 20h00: '[https://www.owasp.org/images/5/54/CSP_Martin_Johns_OWASP_BE.pdf 'CSP in the age of Script Gadgets]'' by Prof. Martin Johns (TU Braunschweig)&lt;br /&gt;
*20h00 - 20h10: Break&lt;br /&gt;
*20h10 - 21h00: ''Zero to DevSecOps - security in a DevOps world'' (part [https://www.owasp.org/images/7/7d/Zero-to-DevSecOps-OWASP-Meetup-02-19-19_-_part_0.pdf 1], [https://www.owasp.org/images/3/3a/Zero-to-DevSecOps-OWASP-Meetup-02-19-19_-_part_1.pdf 2], [https://www.owasp.org/images/0/0c/Zero-to-DevSecOps-OWASP-Meetup-02-19-19_-_part_2.pdf 3]) by Jimmy Mesta (CTO, Manicode Security)&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== CSP in the age of Script Gadgets ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: &amp;lt;!--[LINK_PRESENTER_TALK_1 Prof. Martin Johns]--&amp;gt; Prof. Martin Johns (TU Braunschweig)&lt;br /&gt;
* Presentation: &amp;lt;!--[[:File:SLIDES_TALK_1]]--&amp;gt; not yet available&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Content Security Policy (CSP) was first introduced in 2012. It should have been a silver-bullet defense against various injection attacks, including the rampant Cross-Site Scripting vulnerabilities. Unfortunately, modern development practices and legacy code bases proved to be substantial obstacles. New versions of CSP were released to address usability and compatibility for developers. Unfortunately, researchers discovered many bypasses and vulnerabilities in real-world CSP policies. The latest problem is known as script gadgets, where data is turned into code by legitimate functionality.&lt;br /&gt;
&lt;br /&gt;
In this session, we will take a look at the problems you might encounter when deploying CSP. We start at CSP level 1 and work towards the latest level 3 version. We discuss CSP's features, potential bypasses, and pitfalls to avoid. In the end, you will have gained the knowledge to deploy a secure and effective CSP policy.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Martin Johns is a full professor at the TU Braunschweig.&lt;br /&gt;
&lt;br /&gt;
==== Zero to DevSecOps - security in a DevOps world ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: &amp;lt;!--[LINK_PRESENTER_TALK_2 Jimmy Mesta]--&amp;gt; Jimmy Mesta (CTO, Manicode Security)&lt;br /&gt;
* Presentation: &amp;lt;!--[[:File:SLIDES_TALK_2]]--&amp;gt; not yet available&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
The way that software is being deployed is undergoing a massive transformation. As a result, security teams are at a point where they must adapt or be left in the dust. Traditional application security used to be heavyweight and human-driven. Tasks are more often than not mostly manual efforts. Time-consuming security testing often breaks down in an automated world. Dynamic vulnerability scanning and manual code reviews are incompatible with a world where code changes are automatically being pushed to production hundreds of times per day. &lt;br /&gt;
&lt;br /&gt;
This talk will share lessons learned from helping teams of all sizes and maturity levels with their transformation to a DevSecOps model where security goes from being a blocker to an enabler. Specifically, we will cover some of the tools and processes you can start using right now. These tools allow you to start adding real value to your organization through enhanced visibility, vulnerability discovery, and feedback loops. It is time to adapt and embrace a new era of security.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Jimmy Mesta is CTO at Manicode Security. He is a DevSecOps, Mobile, and Kubernetes Secure Coding Instructor.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration is via EventBrite: https://owasp-belgium-2019-02-20.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp_be_update_20191125.pdf&amp;diff=256253</id>
		<title>File:Owasp be update 20191125.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp_be_update_20191125.pdf&amp;diff=256253"/>
				<updated>2019-12-05T19:13:51Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp-be-20191125-deryck-recentevolutionsoauth.pdf&amp;diff=256252</id>
		<title>File:Owasp-be-20191125-deryck-recentevolutionsoauth.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp-be-20191125-deryck-recentevolutionsoauth.pdf&amp;diff=256252"/>
				<updated>2019-12-05T19:10:19Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: RECENT EVOLUTIONS IN THE OAUTH 2.0 AND OPENID CONNECT LANDSCAPE
Philippe De Ryck&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;RECENT EVOLUTIONS IN THE OAUTH 2.0 AND OPENID CONNECT LANDSCAPE&lt;br /&gt;
Philippe De Ryck&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp-be-2019-11-25-desmet.pdf&amp;diff=256251</id>
		<title>File:Owasp-be-2019-11-25-desmet.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp-be-2019-11-25-desmet.pdf&amp;diff=256251"/>
				<updated>2019-12-05T18:56:49Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: Detecting and preventing DNS abuse in .eu&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Detecting and preventing DNS abuse in .eu&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium&amp;diff=256044</id>
		<title>Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium&amp;diff=256044"/>
				<updated>2019-11-13T18:57:06Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Belgium|extra=The chapter leaders are [mailto:seba@owasp.org Sebastien Deleersnyder], [mailto:lieven.desmet@owasp.org Lieven Desmet] and [mailto:bart.dewin@owasp.org Bart De Win]&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} &lt;br /&gt;
&lt;br /&gt;
= Local News =&lt;br /&gt;
&lt;br /&gt;
== Upcoming Chapter Meetings ==&lt;br /&gt;
&lt;br /&gt;
* OWASP BE chapter meeting: registration via https://owasp-belgium-2019-11-25.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
See the {{#switchtablink:Chapter Meetings|Chapter Meetings}} tab for more details and older meetings.&lt;br /&gt;
&lt;br /&gt;
== Stay in Touch ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]] &lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].&lt;br /&gt;
&lt;br /&gt;
== Structural Sponsors 2019 ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2019 and the OWASP BeNeLux Days 2018: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Gold --&amp;gt;&lt;br /&gt;
[[File:Vest.jpg|250px|link=http://www.vest.nl]]&lt;br /&gt;
[[File:DavinsiLabs.png|250px|link=https://www.davinsilabs.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Silver --&amp;gt;&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|250px|link=http://www.nviso.be]] &lt;br /&gt;
&amp;amp;nbsp;[[File:LogoIngenicoGroup.png|250px|link=https://ingenico.be]]&lt;br /&gt;
&lt;br /&gt;
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]&lt;br /&gt;
&lt;br /&gt;
= Chapter Meetings =&lt;br /&gt;
&lt;br /&gt;
{{:Belgium_Events_2019}}&lt;br /&gt;
&lt;br /&gt;
== Previous Years ==&lt;br /&gt;
&lt;br /&gt;
Events held in&lt;br /&gt;
[[Belgium Events 2018|2018]],&lt;br /&gt;
[[Belgium Events 2017|2017]],&lt;br /&gt;
[[Belgium Events 2016|2016]],&lt;br /&gt;
[[Belgium Events 2015|2015]],&lt;br /&gt;
[[Belgium Events 2014|2014]],&lt;br /&gt;
[[Belgium Events 2013|2013]],&lt;br /&gt;
[[Belgium Events 2012|2012]],&lt;br /&gt;
[[Belgium Events 2011|2011]],&lt;br /&gt;
[[Belgium Events 2010|2010]],&lt;br /&gt;
[[Belgium Events 2009|2009]],&lt;br /&gt;
[[Belgium Events 2008|2008]],&lt;br /&gt;
[[Belgium Events 2007|2007]],&lt;br /&gt;
[[Belgium Events 2006|2006]],&lt;br /&gt;
[[Belgium Events 2005|2005]].&lt;br /&gt;
&lt;br /&gt;
= Belgium OWASP Chapter Leaders =&lt;br /&gt;
&lt;br /&gt;
The Belgium Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
Chapter Leaders&lt;br /&gt;
*Sebastien Deleersnyder, Toreon&lt;br /&gt;
*Lieven Desmet, KU Leuven &lt;br /&gt;
*Bart De Win, PWC&lt;br /&gt;
&lt;br /&gt;
Board Members&lt;br /&gt;
*Erwin Geirnaert, Zion Security&lt;br /&gt;
*David Mathy, Freelance&lt;br /&gt;
*Adolfo Solero, Freelance&lt;br /&gt;
*Stella Dineva, Ingenico Payment Services&lt;br /&gt;
*Thomas Herlea, NVISO&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2019&amp;diff=256043</id>
		<title>Belgium Events 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2019&amp;diff=256043"/>
				<updated>2019-11-13T18:55:40Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: update chapter meetings&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2019 events of the [[Belgium|OWASP Belgium Chapter]]. &amp;lt;!-- Copy the source from [[Belgium Chapter Meeting Template]] to start a new chapter meeting event! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2018|2018]].&lt;br /&gt;
&amp;lt;!-- Next year: [[Belgium Events 2020|2020]].--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 25 November 2019 Meeting ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://www.radissonhotels.com/en-us/hotels/park-inn-leuven Park Inn by Radisson Leuven] The event is co-located  with [https://impulsprogramma-cybersecurity-2019-11-25.eventbrite.com/ a briefing and industry opportunity meeting of the  Flanders Cyber Security impuls program].  Feel free to [https://impulsprogramma-cybersecurity-2019-11-25.eventbrite.com/ register] for this co-located event if interested.&lt;br /&gt;
&lt;br /&gt;
* Address:&lt;br /&gt;
 Park Inn by Radisson Leuven&lt;br /&gt;
 Martelarenlaan 36&lt;br /&gt;
 3010  Leuven&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
*18h00 - 19h00: Welcome &amp;amp; networking&lt;br /&gt;
*19h00 - 19h10: ''OWASP Update''&lt;br /&gt;
*19h10 - 20h00: ''Recent evolutions in the OAuth 2.0 and OpenID Connect landscape'' by Philippe De Ryck (Founder of Pragmatic Web Security and Google Developer Expert)&lt;br /&gt;
*20u00-20u50: ''Detection and Prevention of DNS abuse in .eu TLD'' by Lieven Desmet (DistriNet, KU Leuven)&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== Recent evolutions in the OAuth 2.0 and OpenID Connect landscape ====&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Ever since the introduction of OAuth 2.0, the framework has been in continuous evolution. The initial specification addressed a strong need for delegation. However, since then, various addendums focus on the needs of modern applications. Today, the suite of OAuth 2.0 specifications supports a broad spectrum of different scenarios. For each of these scenarios makes their security assumptions and defines a set of best practices.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will investigate a number of these recent additions. We look at the recently added “Proof of Key for Code Exchange” (PKCE) flow. We also investigate how it is becoming the default flow for Single Page Applications. We also extensively dive into “Proof of Possession” tokens. Their security properties are significantly better than bearer tokens. Consequentially, everyone should know what they entail, and how to use them. You will walk away with a solid overview of recent evolutions in OAuth 2.0, and where to use them in your applications.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Philippe De Ryck helps developers protect companies through better web security. As the founder of Pragmatic Web Security, he travels the world to train developers on web security and security engineering. His Ph.D. in web security from KU Leuven lies at the basis of his exceptional knowledge of the security landscape. Google recognizes Philippe as a Google Developer Expert for his work on security in Angular applications.&lt;br /&gt;
&lt;br /&gt;
==== Detection and Prevention of DNS abuse in .eu TLD ====&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
This session reports on an extensive analysis of 14 months of domain registration in the .eu TLD. In particular, we investigate domain names that are registered for malicious purposes (such as spam, phishing, botnets C&amp;amp;C, ...). The goal of our research is to understand and identify large-scale malicious campaigns, and to early detect and prevent malicious registrations.&lt;br /&gt;
&lt;br /&gt;
We explore the ecosystem and modus operandi of elaborate cyber criminal entities that recurrently register large amounts of domains for one-shot, malicious use. We further report on insights in the operational aspects of this business and observe, for instance, that their processes are only partially automated.&lt;br /&gt;
&lt;br /&gt;
Finally, we present our automatic prediction system, that classifies at registration time whether a domain name will be used maliciously or benign. As such, malicious domain registrations can effectively be prevented from doing any harm. As part of the talk, we discuss the first results of this prediction system, which currently runs in production at EURid, the registry of the .eu TLD.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Lieven Desmet is a Senior Research Manager on Secure Software in the imec-DistriNet Research Group at the Katholieke Universiteit Leuven (Belgium), where he outlines and implements the research strategy, coaches junior researchers in web and infrastructure security, and participates in dissemination, valorisation and spin-off activities.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration is via EventBrite: https://owasp-belgium-2019-11-25.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;br /&gt;
&lt;br /&gt;
== summit working session on OWASP SAMM ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium presents a summit working session on OWASP SAMM in Antwerp on 30 April: &lt;br /&gt;
&lt;br /&gt;
Registration via https://www.eventbrite.com/e/open-security-summit-working-session-tickets-60456102831&lt;br /&gt;
&lt;br /&gt;
== 20 February 2019 Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Burn-down list for customization:&lt;br /&gt;
- Replace LINK_PRESENTER_TALK_1&lt;br /&gt;
- Replace LINK_PRESENTER_TALK_2&lt;br /&gt;
- Replace OWASP_UPDATE_PRESENTATION, uncomment the link and delete the placeholder (italicized title)&lt;br /&gt;
- Replace SLIDES_TALK_1, uncomment the links and delete the placeholders (italicized title and &amp;quot;not yet available&amp;quot; in the talk's subsection)&lt;br /&gt;
- Replace SLIDES_TALK_2, uncomment the links and delete the placeholders (italicized title and &amp;quot;not yet available&amp;quot; in the talk's subsection)&lt;br /&gt;
- Provide coverage photos / links to blog posts etc.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2019-02-18 to 2018-02-22.)&lt;br /&gt;
&lt;br /&gt;
* Address ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions]):&lt;br /&gt;
 Department of Computer Science (foyer at ground floor)&lt;br /&gt;
 Celestijnenlaan 200 A&lt;br /&gt;
 3001 Heverlee&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
*18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
*19h00 - 19h10: ''[https://www.owasp.org/images/6/69/Owasp_Belgium_update_2019-02-20_v1.pdf OWASP Update]'' by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
*19h10 - 20h00: '[https://www.owasp.org/images/5/54/CSP_Martin_Johns_OWASP_BE.pdf 'CSP in the age of Script Gadgets]'' by Prof. Martin Johns (TU Braunschweig)&lt;br /&gt;
*20h00 - 20h10: Break&lt;br /&gt;
*20h10 - 21h00: ''Zero to DevSecOps - security in a DevOps world'' (part [https://www.owasp.org/images/7/7d/Zero-to-DevSecOps-OWASP-Meetup-02-19-19_-_part_0.pdf 1], [https://www.owasp.org/images/3/3a/Zero-to-DevSecOps-OWASP-Meetup-02-19-19_-_part_1.pdf 2], [https://www.owasp.org/images/0/0c/Zero-to-DevSecOps-OWASP-Meetup-02-19-19_-_part_2.pdf 3]) by Jimmy Mesta (CTO, Manicode Security)&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== CSP in the age of Script Gadgets ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: &amp;lt;!--[LINK_PRESENTER_TALK_1 Prof. Martin Johns]--&amp;gt; Prof. Martin Johns (TU Braunschweig)&lt;br /&gt;
* Presentation: &amp;lt;!--[[:File:SLIDES_TALK_1]]--&amp;gt; not yet available&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Content Security Policy (CSP) was first introduced in 2012. It should have been a silver-bullet defense against various injection attacks, including the rampant Cross-Site Scripting vulnerabilities. Unfortunately, modern development practices and legacy code bases proved to be substantial obstacles. New versions of CSP were released to address usability and compatibility for developers. Unfortunately, researchers discovered many bypasses and vulnerabilities in real-world CSP policies. The latest problem is known as script gadgets, where data is turned into code by legitimate functionality.&lt;br /&gt;
&lt;br /&gt;
In this session, we will take a look at the problems you might encounter when deploying CSP. We start at CSP level 1 and work towards the latest level 3 version. We discuss CSP's features, potential bypasses, and pitfalls to avoid. In the end, you will have gained the knowledge to deploy a secure and effective CSP policy.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Martin Johns is a full professor at the TU Braunschweig.&lt;br /&gt;
&lt;br /&gt;
==== Zero to DevSecOps - security in a DevOps world ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: &amp;lt;!--[LINK_PRESENTER_TALK_2 Jimmy Mesta]--&amp;gt; Jimmy Mesta (CTO, Manicode Security)&lt;br /&gt;
* Presentation: &amp;lt;!--[[:File:SLIDES_TALK_2]]--&amp;gt; not yet available&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
The way that software is being deployed is undergoing a massive transformation. As a result, security teams are at a point where they must adapt or be left in the dust. Traditional application security used to be heavyweight and human-driven. Tasks are more often than not mostly manual efforts. Time-consuming security testing often breaks down in an automated world. Dynamic vulnerability scanning and manual code reviews are incompatible with a world where code changes are automatically being pushed to production hundreds of times per day. &lt;br /&gt;
&lt;br /&gt;
This talk will share lessons learned from helping teams of all sizes and maturity levels with their transformation to a DevSecOps model where security goes from being a blocker to an enabler. Specifically, we will cover some of the tools and processes you can start using right now. These tools allow you to start adding real value to your organization through enhanced visibility, vulnerability discovery, and feedback loops. It is time to adapt and embrace a new era of security.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Jimmy Mesta is CTO at Manicode Security. He is a DevSecOps, Mobile, and Kubernetes Secure Coding Instructor.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration is via EventBrite: https://owasp-belgium-2019-02-20.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2019&amp;diff=256042</id>
		<title>Belgium Events 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2019&amp;diff=256042"/>
				<updated>2019-11-13T18:36:49Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: chapter meeting 25/11/2019&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2019 events of the [[Belgium|OWASP Belgium Chapter]]. &amp;lt;!-- Copy the source from [[Belgium Chapter Meeting Template]] to start a new chapter meeting event! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2018|2018]].&lt;br /&gt;
&amp;lt;!-- Next year: [[Belgium Events 2020|2020]].--&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 25 November 2019 Meeting ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://www.radissonhotels.com/en-us/hotels/park-inn-leuven Park Inn by Radisson Leuven] The event is co-located  with [https://impulsprogramma-cybersecurity-2019-11-25.eventbrite.com/ a briefing and industry opportunity meeting of the  Flanders Cyber Security impuls program].  Feel free to [https://impulsprogramma-cybersecurity-2019-11-25.eventbrite.com/ register] for this co-located event if interested.&lt;br /&gt;
&lt;br /&gt;
* Address:&lt;br /&gt;
 Park Inn by Radisson Leuven&lt;br /&gt;
 Martelarenlaan 36&lt;br /&gt;
 3010  Leuven&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
*18h00 - 19h00: Welcome &amp;amp; networking&lt;br /&gt;
*19h00 - 19h10: ''OWASP Update''&lt;br /&gt;
*19h10 - 20h00: ''Recent evolutions in the OAuth 2.0 and OpenID Connect landscape'' by Philippe De Ryck (Founder of Pragmatic Web Security and Google Developer Expert)&lt;br /&gt;
*20u00-20u50: ''Detection and Prevention of DNS abuse in .eu TLD'' by Lieven Desmet (DistriNet, KU Leuven)&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== Recent evolutions in the OAuth 2.0 and OpenID Connect landscape ====&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Ever since the introduction of OAuth 2.0, the framework has been in continuous evolution. The initial specification addressed a strong need for delegation. However, since then, various addendums focus on the needs of modern applications. Today, the suite of OAuth 2.0 specifications supports a broad spectrum of different scenarios. For each of these scenarios makes their security assumptions and defines a set of best practices.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will investigate a number of these recent additions. We look at the recently added “Proof of Key for Code Exchange” (PKCE) flow. We also investigate how it is becoming the default flow for Single Page Applications. We also extensively dive into “Proof of Possession” tokens. Their security properties are significantly better than bearer tokens. Consequentially, everyone should know what they entail, and how to use them. You will walk away with a solid overview of recent evolutions in OAuth 2.0, and where to use them in your applications.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Philippe De Ryck helps developers protect companies through better web security. As the founder of Pragmatic Web Security, he travels the world to train developers on web security and security engineering. His Ph.D. in web security from KU Leuven lies at the basis of his exceptional knowledge of the security landscape. Google recognizes Philippe as a Google Developer Expert for his work on security in Angular applications.&lt;br /&gt;
&lt;br /&gt;
==== Detection and Prevention of DNS abuse in .eu TLD ====&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
This session reports on an extensive analysis of 14 months of domain registration in the .eu TLD. In particular, we investigate domain names that are registered for malicious purposes (such as spam, phishing, botnets C&amp;amp;C, ...). The goal of our research is to understand and identify large-scale malicious campaigns, and to early detect and prevent malicious registrations.&lt;br /&gt;
&lt;br /&gt;
We explore the ecosystem and modus operandi of elaborate cyber criminal entities that recurrently register large amounts of domains for one-shot, malicious use. We further report on insights in the operational aspects of this business and observe, for instance, that their processes are only partially automated.&lt;br /&gt;
&lt;br /&gt;
Finally, we present our automatic prediction system, that classifies at registration time whether a domain name will be used maliciously or benign. As such, malicious domain registrations can effectively be prevented from doing any harm. As part of the talk, we discuss the first results of this prediction system, which currently runs in production at EURid, the registry of the .eu TLD.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Lieven Desmet is a Senior Research Manager on Secure Software in the imec-DistriNet Research Group at the Katholieke Universiteit Leuven (Belgium), where he outlines and implements the research strategy, coaches junior researchers in web and infrastructure security, and participates in dissemination, valorisation and spin-off activities.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration is via EventBrite: https://owasp-belgium-2019-11-25.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 20 February 2019 Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Burn-down list for customization:&lt;br /&gt;
- Replace LINK_PRESENTER_TALK_1&lt;br /&gt;
- Replace LINK_PRESENTER_TALK_2&lt;br /&gt;
- Replace OWASP_UPDATE_PRESENTATION, uncomment the link and delete the placeholder (italicized title)&lt;br /&gt;
- Replace SLIDES_TALK_1, uncomment the links and delete the placeholders (italicized title and &amp;quot;not yet available&amp;quot; in the talk's subsection)&lt;br /&gt;
- Replace SLIDES_TALK_2, uncomment the links and delete the placeholders (italicized title and &amp;quot;not yet available&amp;quot; in the talk's subsection)&lt;br /&gt;
- Provide coverage photos / links to blog posts etc.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2019-02-18 to 2018-02-22.)&lt;br /&gt;
&lt;br /&gt;
* Address ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions]):&lt;br /&gt;
 Department of Computer Science (foyer at ground floor)&lt;br /&gt;
 Celestijnenlaan 200 A&lt;br /&gt;
 3001 Heverlee&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
*18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
*19h00 - 19h10: ''[https://www.owasp.org/images/6/69/Owasp_Belgium_update_2019-02-20_v1.pdf OWASP Update]'' by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
*19h10 - 20h00: '[https://www.owasp.org/images/5/54/CSP_Martin_Johns_OWASP_BE.pdf 'CSP in the age of Script Gadgets]'' by Prof. Martin Johns (TU Braunschweig)&lt;br /&gt;
*20h00 - 20h10: Break&lt;br /&gt;
*20h10 - 21h00: ''Zero to DevSecOps - security in a DevOps world'' (part [https://www.owasp.org/images/7/7d/Zero-to-DevSecOps-OWASP-Meetup-02-19-19_-_part_0.pdf 1], [https://www.owasp.org/images/3/3a/Zero-to-DevSecOps-OWASP-Meetup-02-19-19_-_part_1.pdf 2], [https://www.owasp.org/images/0/0c/Zero-to-DevSecOps-OWASP-Meetup-02-19-19_-_part_2.pdf 3]) by Jimmy Mesta (CTO, Manicode Security)&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== CSP in the age of Script Gadgets ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: &amp;lt;!--[LINK_PRESENTER_TALK_1 Prof. Martin Johns]--&amp;gt; Prof. Martin Johns (TU Braunschweig)&lt;br /&gt;
* Presentation: &amp;lt;!--[[:File:SLIDES_TALK_1]]--&amp;gt; not yet available&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Content Security Policy (CSP) was first introduced in 2012. It should have been a silver-bullet defense against various injection attacks, including the rampant Cross-Site Scripting vulnerabilities. Unfortunately, modern development practices and legacy code bases proved to be substantial obstacles. New versions of CSP were released to address usability and compatibility for developers. Unfortunately, researchers discovered many bypasses and vulnerabilities in real-world CSP policies. The latest problem is known as script gadgets, where data is turned into code by legitimate functionality.&lt;br /&gt;
&lt;br /&gt;
In this session, we will take a look at the problems you might encounter when deploying CSP. We start at CSP level 1 and work towards the latest level 3 version. We discuss CSP's features, potential bypasses, and pitfalls to avoid. In the end, you will have gained the knowledge to deploy a secure and effective CSP policy.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Martin Johns is a full professor at the TU Braunschweig.&lt;br /&gt;
&lt;br /&gt;
==== Zero to DevSecOps - security in a DevOps world ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: &amp;lt;!--[LINK_PRESENTER_TALK_2 Jimmy Mesta]--&amp;gt; Jimmy Mesta (CTO, Manicode Security)&lt;br /&gt;
* Presentation: &amp;lt;!--[[:File:SLIDES_TALK_2]]--&amp;gt; not yet available&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
The way that software is being deployed is undergoing a massive transformation. As a result, security teams are at a point where they must adapt or be left in the dust. Traditional application security used to be heavyweight and human-driven. Tasks are more often than not mostly manual efforts. Time-consuming security testing often breaks down in an automated world. Dynamic vulnerability scanning and manual code reviews are incompatible with a world where code changes are automatically being pushed to production hundreds of times per day. &lt;br /&gt;
&lt;br /&gt;
This talk will share lessons learned from helping teams of all sizes and maturity levels with their transformation to a DevSecOps model where security goes from being a blocker to an enabler. Specifically, we will cover some of the tools and processes you can start using right now. These tools allow you to start adding real value to your organization through enhanced visibility, vulnerability discovery, and feedback loops. It is time to adapt and embrace a new era of security.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Jimmy Mesta is CTO at Manicode Security. He is a DevSecOps, Mobile, and Kubernetes Secure Coding Instructor.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration is via EventBrite: https://owasp-belgium-2019-02-20.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium&amp;diff=247133</id>
		<title>Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium&amp;diff=247133"/>
				<updated>2019-02-06T09:20:23Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Upcoming Chapter Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Belgium|extra=The chapter leaders are [mailto:seba@owasp.org Sebastien Deleersnyder], [mailto:lieven.desmet@owasp.org Lieven Desmet] and [mailto:bart.dewin@owasp.org Bart De Win]&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} &lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
== Upcoming Chapter Meetings ==&lt;br /&gt;
&lt;br /&gt;
* The next chapter meeting will be in '''February 20 2019 in Leuven''': Registration via https://owasp-belgium-2019-02-20.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
See https://www.owasp.org/index.php/Belgium#Chapter_Meetings for more details and older meetings.&lt;br /&gt;
&lt;br /&gt;
== Stay in Touch ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]] &lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].&lt;br /&gt;
&lt;br /&gt;
== Structural Sponsors 2019  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2019 and the OWASP BeNeLux Days 2018: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Gold --&amp;gt;&lt;br /&gt;
[[File:Vest.jpg|250px|link=http://www.vest.nl]]&lt;br /&gt;
[[File:DavinsiLabs.png|250px|link=https://www.davinsilabs.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Silver --&amp;gt;&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|250px|link=http://www.nviso.be]] &lt;br /&gt;
&amp;amp;nbsp;[[File:LogoIngenicoGroup.png|250px|link=https://ingenico.be]]&lt;br /&gt;
&lt;br /&gt;
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]&lt;br /&gt;
&lt;br /&gt;
= Chapter Meetings  =&lt;br /&gt;
&lt;br /&gt;
{{:Belgium_Events_2019}}&lt;br /&gt;
&lt;br /&gt;
== Previous Years  ==&lt;br /&gt;
&lt;br /&gt;
Events held in&lt;br /&gt;
[[Belgium Events 2018|2018]],&lt;br /&gt;
[[Belgium Events 2017|2017]],&lt;br /&gt;
[[Belgium Events 2016|2016]],&lt;br /&gt;
[[Belgium Events 2015|2015]],&lt;br /&gt;
[[Belgium Events 2014|2014]],&lt;br /&gt;
[[Belgium Events 2013|2013]],&lt;br /&gt;
[[Belgium Events 2012|2012]],&lt;br /&gt;
[[Belgium Events 2011|2011]],&lt;br /&gt;
[[Belgium Events 2010|2010]],&lt;br /&gt;
[[Belgium Events 2009|2009]],&lt;br /&gt;
[[Belgium Events 2008|2008]],&lt;br /&gt;
[[Belgium Events 2007|2007]],&lt;br /&gt;
[[Belgium Events 2006|2006]],&lt;br /&gt;
[[Belgium Events 2005|2005]].&lt;br /&gt;
&lt;br /&gt;
= Belgium OWASP Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Belgium Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
Chapter Leaders&lt;br /&gt;
*Sebastien Deleersnyder, Toreon&lt;br /&gt;
*Lieven Desmet, KU Leuven &lt;br /&gt;
*Bart De Win, PWC&lt;br /&gt;
&lt;br /&gt;
Board Members&lt;br /&gt;
*Erwin Geirnaert, Zion Security&lt;br /&gt;
*David Mathy, Freelance&lt;br /&gt;
*Adolfo Solero, Freelance&lt;br /&gt;
*Stella Dineva, Ingenico Payment Services&lt;br /&gt;
*Thomas Herlea, NVISO&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium&amp;diff=247131</id>
		<title>Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium&amp;diff=247131"/>
				<updated>2019-02-06T09:19:49Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* OWASP BeNeLux Days */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Belgium|extra=The chapter leaders are [mailto:seba@owasp.org Sebastien Deleersnyder], [mailto:lieven.desmet@owasp.org Lieven Desmet] and [mailto:bart.dewin@owasp.org Bart De Win]&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} &lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
== Upcoming Chapter Meetings ==&lt;br /&gt;
&lt;br /&gt;
* The next chapter meeting will be in February 20 2019 in Leuven: Registration via https://owasp-belgium-2019-02-20.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
See https://www.owasp.org/index.php/Belgium#Chapter_Meetings for more details and older meetings.&lt;br /&gt;
&lt;br /&gt;
== Stay in Touch ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]] &lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].&lt;br /&gt;
&lt;br /&gt;
== Structural Sponsors 2019  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2019 and the OWASP BeNeLux Days 2018: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Gold --&amp;gt;&lt;br /&gt;
[[File:Vest.jpg|250px|link=http://www.vest.nl]]&lt;br /&gt;
[[File:DavinsiLabs.png|250px|link=https://www.davinsilabs.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Silver --&amp;gt;&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|250px|link=http://www.nviso.be]] &lt;br /&gt;
&amp;amp;nbsp;[[File:LogoIngenicoGroup.png|250px|link=https://ingenico.be]]&lt;br /&gt;
&lt;br /&gt;
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]&lt;br /&gt;
&lt;br /&gt;
= Chapter Meetings  =&lt;br /&gt;
&lt;br /&gt;
{{:Belgium_Events_2019}}&lt;br /&gt;
&lt;br /&gt;
== Previous Years  ==&lt;br /&gt;
&lt;br /&gt;
Events held in&lt;br /&gt;
[[Belgium Events 2018|2018]],&lt;br /&gt;
[[Belgium Events 2017|2017]],&lt;br /&gt;
[[Belgium Events 2016|2016]],&lt;br /&gt;
[[Belgium Events 2015|2015]],&lt;br /&gt;
[[Belgium Events 2014|2014]],&lt;br /&gt;
[[Belgium Events 2013|2013]],&lt;br /&gt;
[[Belgium Events 2012|2012]],&lt;br /&gt;
[[Belgium Events 2011|2011]],&lt;br /&gt;
[[Belgium Events 2010|2010]],&lt;br /&gt;
[[Belgium Events 2009|2009]],&lt;br /&gt;
[[Belgium Events 2008|2008]],&lt;br /&gt;
[[Belgium Events 2007|2007]],&lt;br /&gt;
[[Belgium Events 2006|2006]],&lt;br /&gt;
[[Belgium Events 2005|2005]].&lt;br /&gt;
&lt;br /&gt;
= Belgium OWASP Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Belgium Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
Chapter Leaders&lt;br /&gt;
*Sebastien Deleersnyder, Toreon&lt;br /&gt;
*Lieven Desmet, KU Leuven &lt;br /&gt;
*Bart De Win, PWC&lt;br /&gt;
&lt;br /&gt;
Board Members&lt;br /&gt;
*Erwin Geirnaert, Zion Security&lt;br /&gt;
*David Mathy, Freelance&lt;br /&gt;
*Adolfo Solero, Freelance&lt;br /&gt;
*Stella Dineva, Ingenico Payment Services&lt;br /&gt;
*Thomas Herlea, NVISO&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium&amp;diff=247130</id>
		<title>Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium&amp;diff=247130"/>
				<updated>2019-02-06T09:19:12Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Belgium|extra=The chapter leaders are [mailto:seba@owasp.org Sebastien Deleersnyder], [mailto:lieven.desmet@owasp.org Lieven Desmet] and [mailto:bart.dewin@owasp.org Bart De Win]&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} &lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux Days ==&lt;br /&gt;
&lt;br /&gt;
* Our latest event, [[OWASP BeNeLux-Days 2018|OWASP BeNeLux Days]], took place on 29-30 November in the LAMOT conference center in Mechelen, Belgium.&lt;br /&gt;
&lt;br /&gt;
== Upcoming Chapter Meetings ==&lt;br /&gt;
&lt;br /&gt;
* The next chapter meeting will be in February 20 2019 in Leuven: Registration via https://owasp-belgium-2019-02-20.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
See https://www.owasp.org/index.php/Belgium#Chapter_Meetings for more details and older meetings.&lt;br /&gt;
&lt;br /&gt;
== Stay in Touch ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]] &lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].&lt;br /&gt;
&lt;br /&gt;
== Structural Sponsors 2019  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2019 and the OWASP BeNeLux Days 2018: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Gold --&amp;gt;&lt;br /&gt;
[[File:Vest.jpg|250px|link=http://www.vest.nl]]&lt;br /&gt;
[[File:DavinsiLabs.png|250px|link=https://www.davinsilabs.com]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Silver --&amp;gt;&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|250px|link=http://www.nviso.be]] &lt;br /&gt;
&amp;amp;nbsp;[[File:LogoIngenicoGroup.png|250px|link=https://ingenico.be]]&lt;br /&gt;
&lt;br /&gt;
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]&lt;br /&gt;
&lt;br /&gt;
= Chapter Meetings  =&lt;br /&gt;
&lt;br /&gt;
{{:Belgium_Events_2019}}&lt;br /&gt;
&lt;br /&gt;
== Previous Years  ==&lt;br /&gt;
&lt;br /&gt;
Events held in&lt;br /&gt;
[[Belgium Events 2018|2018]],&lt;br /&gt;
[[Belgium Events 2017|2017]],&lt;br /&gt;
[[Belgium Events 2016|2016]],&lt;br /&gt;
[[Belgium Events 2015|2015]],&lt;br /&gt;
[[Belgium Events 2014|2014]],&lt;br /&gt;
[[Belgium Events 2013|2013]],&lt;br /&gt;
[[Belgium Events 2012|2012]],&lt;br /&gt;
[[Belgium Events 2011|2011]],&lt;br /&gt;
[[Belgium Events 2010|2010]],&lt;br /&gt;
[[Belgium Events 2009|2009]],&lt;br /&gt;
[[Belgium Events 2008|2008]],&lt;br /&gt;
[[Belgium Events 2007|2007]],&lt;br /&gt;
[[Belgium Events 2006|2006]],&lt;br /&gt;
[[Belgium Events 2005|2005]].&lt;br /&gt;
&lt;br /&gt;
= Belgium OWASP Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Belgium Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
Chapter Leaders&lt;br /&gt;
*Sebastien Deleersnyder, Toreon&lt;br /&gt;
*Lieven Desmet, KU Leuven &lt;br /&gt;
*Bart De Win, PWC&lt;br /&gt;
&lt;br /&gt;
Board Members&lt;br /&gt;
*Erwin Geirnaert, Zion Security&lt;br /&gt;
*David Mathy, Freelance&lt;br /&gt;
*Adolfo Solero, Freelance&lt;br /&gt;
*Stella Dineva, Ingenico Payment Services&lt;br /&gt;
*Thomas Herlea, NVISO&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2019&amp;diff=247129</id>
		<title>Belgium Events 2019</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2019&amp;diff=247129"/>
				<updated>2019-02-06T09:14:56Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: Created page with &amp;quot;== 20 February 2019 Meeting ==  === Where  ===  * Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www....&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== 20 February 2019 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2019-02-18 to 2018-02-22.)&lt;br /&gt;
&lt;br /&gt;
* Address ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions]):&lt;br /&gt;
 Department of Computer Science (foyer at ground floor)&lt;br /&gt;
 Celestijnenlaan 200 A&lt;br /&gt;
 3001 Heverlee&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
*18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
*19h10 - 20h00: '''CSP in the age of Script Gadgets''' by Prof. Martin Johns (TU Braunschweig)&lt;br /&gt;
*20h00 - 20h10: Break&lt;br /&gt;
*20h10 - 21h00: '''Zero to DevSecOps - security in a DevOps world''' by Jimmy Mesta (CTO, Manicode Security)&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== CSP in the age of Script Gadgets ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Prof. Martin Johns (TU Braunschweig)&lt;br /&gt;
* Presentation: (will be uploaded later)&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Content Security Policy (CSP) was first introduced in 2012. It should have been a silver-bullet defense against various injection attacks, including the rampant Cross-Site Scripting vulnerabilities. Unfortunately, modern development practices and legacy code bases proved to be substantial obstacles. New versions of CSP were released to address usability and compatibility for developers. Unfortunately, researchers discovered many bypasses and vulnerabilities in real-world CSP policies. The latest problem is known as script gadgets, where data is turned into code by legitimate functionality.&lt;br /&gt;
&lt;br /&gt;
In this session, we will take a look at the problems you might encounter when deploying CSP. We start at CSP level 1 and work towards the latest level 3 version. We discuss CSP's features, potential bypasses, and pitfalls to avoid. In the end, you will have gained the knowledge to deploy a secure and effective CSP policy.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Martin Johns is a full professor at the TU Braunschweig.&lt;br /&gt;
&lt;br /&gt;
==== Zero to DevSecOps - security in a DevOps world ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Jimmy Mesta (CTO, Manicode Security)&lt;br /&gt;
* Presentation: (will be uploaded later)&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
The way that software is being deployed is undergoing a massive transformation. As a result, security teams are at a point where they must adapt or be left in the dust. Traditional application security used to be heavyweight and human-driven. Tasks are more often than not mostly manual efforts. Time-consuming security testing often breaks down in an automated world. Dynamic vulnerability scanning and manual code reviews are incompatible with a world where code changes are automatically being pushed to production hundreds of times per day. &lt;br /&gt;
&lt;br /&gt;
This talk will share lessons learned from helping teams of all sizes and maturity levels with their transformation to a DevSecOps model where security goes from being a blocker to an enabler. Specifically, we will cover some of the tools and processes you can start using right now. These tools allow you to start adding real value to your organization through enhanced visibility, vulnerability discovery, and feedback loops. It is time to adapt and embrace a new era of security.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Jimmy Mesta is CTO at Manicode Security. He is a DevSecOps, Mobile, and Kubernetes Secure Coding Instructor.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration via EventBrite: https://owasp-belgium-2019-02-20.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Days_2018&amp;diff=245640</id>
		<title>OWASP BeNeLux-Days 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Days_2018&amp;diff=245640"/>
				<updated>2018-11-29T06:04:55Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OBNL18 Banner v2.png]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
== Keynote Speaker ==&lt;br /&gt;
&lt;br /&gt;
{{#switchtablink:Conference Day|&amp;lt;p&amp;gt;&lt;br /&gt;
*  TBD&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== Confirmed Conference Speakers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--{{#switchtablink:Conference_Day|&amp;lt;p&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* David Scrobonia&lt;br /&gt;
* Niels Tanis&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Björn Kimminich&lt;br /&gt;
* Ralph Moonen&lt;br /&gt;
* Jo Van Bulck&lt;br /&gt;
* Lennert Wouters&lt;br /&gt;
* Nick Drage&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed Trainers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
{{#switchtablink:Training Day|&amp;lt;p&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* Andrew Martin&lt;br /&gt;
* David Scrobonia&lt;br /&gt;
* Jeroen Beckers - Stephanie Vanroelen&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |alt=Register NOW! | Register NOW! ]]&lt;br /&gt;
&lt;br /&gt;
'''To support the OWASP organisation, consider to become a member, it's only US$50! Check out the [[Membership]] page to find out more.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
&lt;br /&gt;
* Sebastien Deleersnyder / Lieven Desmet / David Mathy / Thomas Herlea / Stella Dineva / Adolfo Solero / Bart De Win, [[Belgium|OWASP Belgium]]&lt;br /&gt;
* Martin Knobloch / Joren Poll / Edwin Goweling, [[Netherlands|OWASP Netherlands]]&lt;br /&gt;
* [[Luxembourg|OWASP Luxembourg]]&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl17 #owaspbnl18]&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference and training days are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |alt=Register NOW! | Register NOW! ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''To support the OWASP organisation, consider to become a member, it's only US$50! Check out the [[Membership]] page to find out more.''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Address ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;50%&amp;quot;&amp;gt;&lt;br /&gt;
=== Training venue ===&lt;br /&gt;
&lt;br /&gt;
 '''Novotel Mechelen Centrum'''&lt;br /&gt;
 Van Beethovenstraat 1&lt;br /&gt;
 2800 Mechelen&lt;br /&gt;
 Belgium&lt;br /&gt;
&lt;br /&gt;
[https://goo.gl/maps/WxErtbWADqC2 Google maps]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;50%&amp;quot;&amp;gt;&lt;br /&gt;
=== Conference venue ===&lt;br /&gt;
&lt;br /&gt;
 '''Congres- en Erfgoedcentrum Lamot'''&lt;br /&gt;
 Van Beethovenstraat 8-10&lt;br /&gt;
 2800 Mechelen&lt;br /&gt;
 Belgium&lt;br /&gt;
&lt;br /&gt;
[https://goo.gl/maps/gZ9icR178w52 Google map]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
[[File:Mechelen-Lamot.jpg|350px|Lamot conference center]]&lt;br /&gt;
[[File:Mechelen-lamot-center-auditorium.jpg|350px|Auditorium]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Parking:&amp;lt;br /&amp;gt;&lt;br /&gt;
[[File:Parking lots around Lamot Conference center Mechelen.png|500px|Parking facilities]]&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://goo.gl/maps/Q5TD7hoTuUu Find your parking on Google Maps]&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== Public transport ====&lt;br /&gt;
&lt;br /&gt;
You can reach the Mechelen's train station from Antwerpen or Brussels.&lt;br /&gt;
The Lamot conference center is 10 min away by bus (line 1).&lt;br /&gt;
&lt;br /&gt;
Or you can choose to walk for 15 min (1.2 km).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
&lt;br /&gt;
===== From Brussels: =====&lt;br /&gt;
Follow the E19 Brussels / Antwerpen and take the exit 10. &amp;lt;br&amp;gt; Follow the N1 until the R12 (take a left) and turn to the right at the &amp;quot;Brusselpoort&amp;quot; into the Hoogstraat to reach one of the parkings.&lt;br /&gt;
&lt;br /&gt;
===== From Antwerpen: =====&lt;br /&gt;
Follow the E19 Brussels / Antwerpen and take the exit 9. &amp;lt;br&amp;gt; Follow the N16 until the R12 (take a right) and turn to the left at the &amp;quot;Brusselpoort&amp;quot; into the Hoogstraat to reach one of the parkings. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Hotels Nearby ===&lt;br /&gt;
[https://www.google.com/maps/d/viewer?mid=1eYMYmwXKuAsTilKgpAtyYtfMA7A&amp;amp;ll=51.02648134397288%2C4.47819800000002&amp;amp;z=15 Hotels around the Lamot conference center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Training Day =&lt;br /&gt;
&lt;br /&gt;
'''Training Day is November 29th'''&lt;br /&gt;
&lt;br /&gt;
== Training Venue ==&lt;br /&gt;
&lt;br /&gt;
The trainings will take place in the '''Novotel Mechelen Centrum''' hotel:&amp;lt;br&amp;gt;&lt;br /&gt;
Van Beethovenstraat 1&amp;lt;br&amp;gt;&lt;br /&gt;
2800 Mechelen&amp;lt;br&amp;gt;&lt;br /&gt;
[https://goo.gl/maps/WxErtbWADqC2 Google maps]&lt;br /&gt;
&lt;br /&gt;
== Agenda==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Training 1 !! Training 2 !! Training 3&lt;br /&gt;
|-&lt;br /&gt;
! !!  !! (Hof van Busleyden 1) !! (Hof van Busleyden 2) !! (Hof van Kamerijk) &lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_1 | Kubernetes security]] by Andrew Martin&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_2 | OWASP Zap Training]] by David Scrobonia&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_3 | Android security workshop]] by Jeroen Beckers &amp;amp; Stephanie Vanroelen&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;Choose the most appropriate training as they will be hosted at the same time.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Trainings ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_1&amp;quot;&amp;gt;Training 1 - Kubernetes security by Andrew Martin&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
===== Course Description =====&lt;br /&gt;
The course guides attendees through Linux container security in general, and progresses to advanced Kubernetes cluster security. It emphasises pragmatic threat modelling and risk assessment based on an understanding of the tools and primitives available, rather than dogmatic dos and don’ts.&lt;br /&gt;
&lt;br /&gt;
===== Course Outline =====&lt;br /&gt;
* How to attack containerised workloads&lt;br /&gt;
* Enhanced container security&lt;br /&gt;
* How to attack Kubernetes&lt;br /&gt;
* Interactive production cluster hacking&lt;br /&gt;
* Hardening Kubernetes&lt;br /&gt;
* Locking down applications&lt;br /&gt;
* Security tooling and vendor landscape&lt;br /&gt;
&lt;br /&gt;
===== Who Should Attend =====&lt;br /&gt;
This course is suitable for intermediate to advanced Kubernetes users who want to strengthen their security understanding. It is particularly beneficial for those operating Kubernetes in a high-compliance domain, or for established security professionals looking to update their skills for the cloud native world.&lt;br /&gt;
&lt;br /&gt;
===== Participant requirements =====&lt;br /&gt;
Just a laptop with an SSH client please, ssh or PuTTY.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Andrew has a strong test-first engineering ethos gained architecting and deploying high-traffic web applications. Proficient in systems development, testing, and maintenance, he is comfortable profiling and securing every tier of a bare metal or cloud native application, and has battle-hardened experience delivering containerised solutions to enterprise clients. He is a co-founder at https://control-plane.io&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_2&amp;quot;&amp;gt;Training 2 - OWASP Zap Training by David Scrobonia&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
This hands on course will start with the basics of using ZAP attack proxy and finish with leveraging it's API to integrate ZAP within you CI/CD processes. Along the way we will be practicing techniques by attacking the OWASP JuiceShop, an intentionally vulnerable web application. &lt;br /&gt;
&lt;br /&gt;
==== Audience ====&lt;br /&gt;
&lt;br /&gt;
This couse is designed for both new and experienced users. No knowledge or experience with ZAP is required, but even those familiar with ZAP will learn something new.&lt;br /&gt;
&lt;br /&gt;
==== Contents ====&lt;br /&gt;
# Basic Techniques &amp;amp; Manual Testing &lt;br /&gt;
# Advanced Techniques &amp;amp; Automated Testing&lt;br /&gt;
# Scripting with ZAP&lt;br /&gt;
# Using ZAP within your CI/CD Pipeline&lt;br /&gt;
 &lt;br /&gt;
===== Participant requirements =====&lt;br /&gt;
Please come prepared with the following tools installed:&lt;br /&gt;
* ZAP (https://github.com/zaproxy/zaproxy/wiki/Downloads#zap-270-standard)&lt;br /&gt;
* docker&lt;br /&gt;
&lt;br /&gt;
If you have any trouble with the setup please feel free to reach out to davidscrobonia at gmail with questions. &lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
David Scrobonia is a part of the Security Engineering team at Segment working to secure modern web apps and AWS infrastructure. He contributes to open source in his spare time and is a core team member of the OWASP ZAP project.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_3&amp;quot;&amp;gt;Training 3 - Android security workshop by Jeroen Beckers &amp;amp; Stephanie Vanroelen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
In this workshop, participants will come in contact with the basics of&lt;br /&gt;
Android application security. Through hands-on exercises, Jeroen and&lt;br /&gt;
Stephanie will show which mistakes can be made, both at the design and&lt;br /&gt;
implementation level, that can compromise the security of both the&lt;br /&gt;
application and the backend server. Although no real prior experience&lt;br /&gt;
with Android is needed, some basic knowledge on programming is advised.&lt;br /&gt;
&lt;br /&gt;
==== Participation requirements ====&lt;br /&gt;
* Basic linux / terminal knowledge&lt;br /&gt;
* Be able to understand the OWASP Top 10 (Not Mobile)&lt;br /&gt;
* Laptop with VirtualBox / VMWare (At least 8GB of RAM)&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jeroen Beckers is a security researcher at NVISO. He focusses mainly on&lt;br /&gt;
mobile applications for Android/iOS and sometimes even Windows Phone&lt;br /&gt;
(yes, some people actually use it!). Apart from breaking mobile&lt;br /&gt;
applications, he also gives security trainings and presentations at&lt;br /&gt;
conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Stephanie Vanroelen is an IT security consultant currently focussing on Web and&lt;br /&gt;
Mobile Application Security. Her experiences in organizing IT Security&lt;br /&gt;
conferences such as BruCON and CyberSKool help her with project&lt;br /&gt;
management and communication skills. In her free time she pretends to be&lt;br /&gt;
Godzilla :).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Day =&lt;br /&gt;
&lt;br /&gt;
'''Conference Day is November 30th'''&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;190pt&amp;quot; | Speaker &lt;br /&gt;
! width=&amp;quot;400pt&amp;quot; | Topic&lt;br /&gt;
&amp;lt;!-- ! width=&amp;quot;100pt&amp;quot; -- ! | Media --&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h15&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration / [[#CyberWayFinder | Women in cybersecurity (CyberWayFinder)]]''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 09h30&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Opening''&lt;br /&gt;
|- &lt;br /&gt;
| 09h30 - 10h15&lt;br /&gt;
| [[#TALK_0930 | Lennert Wouters]]&lt;br /&gt;
| [[#TALK_0930 | Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_0915_SLIDES|Slides]] [TALK_0915_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 11h00&lt;br /&gt;
| [[#TALK_1015 | Ralph Moonen]]&lt;br /&gt;
| [[#TALK_1015 | Weaknesses in our voice communications network: from Blue Boxing to VoLTE]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1000_SLIDES|Slides]] [TALK_1000_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h15&lt;br /&gt;
| [[#TALK_1130 | Niels Tanis]]&lt;br /&gt;
| [[#TALK_1130 | When Serverless Met Security… Serverless Security &amp;amp; Functions-as-a-Service (FaaS)]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1115_SLIDES|Slides]] [TALK_1115_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h15 - 13h00&lt;br /&gt;
| [[#TALK_1215 | David Scrobonia]]&lt;br /&gt;
| [[#TALK_1215 | OWASP Zap]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1200_SLIDES|Slides]] [TALK_1200_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 14h45&lt;br /&gt;
| [[#TALK_1400 | Björn Kimminich]]&lt;br /&gt;
| [[#TALK_1400 | Juice Shop: OWASP's most broken Flagship]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1345_SLIDES|Slides]] [TALK_1345_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h45 - 15h30&lt;br /&gt;
| [[#TALK_1445 | Jo Van Bulck]]&lt;br /&gt;
| [[#TALK_1445 | Leaky Processors: Stealing Your Secrets with Foreshadow]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1430_SLIDES|Slides]] [TALK_1430_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Afternoon Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 16h45&lt;br /&gt;
| [[#TALK_1600 | Jeroen Willemsen]]&lt;br /&gt;
| [[#TALK_1600 | Fast forwarding Mobile Security with the MSTG]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1545_SLIDES|Slides]] [TALK_1545_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 16h45 - 17h30&lt;br /&gt;
| [[#TALK_1645 | Nick Drage]]&lt;br /&gt;
| [[#TALK_1645 | Lessons from the legion (The OWASP BeNeLux Remix)]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1630_SLIDES|Slides]] [TALK_1630_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 17h30 - 17h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Closing'' &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_0930&amp;quot;&amp;gt;Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars by Lennert Wouters&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
The security of immobiliser and Remote Keyless Entry systems has been extensively studied over the past years. Passive Keyless Entry and Start systems, which are currently deployed in luxury vehicles, have not received as much attention.&lt;br /&gt;
During this presentation we will share the techniques used in reverse engineering the Tesla Model S Passive Keyless Entry and Start system. We will discuss multiple security weaknesses in the system including the use of an inadequate proprietary cipher using 40-bit keys, the lack of mutual authentication in the challenge-response protocol, hardware configuration mistakes and the absence of security partitioning.&amp;lt;br&amp;gt;&lt;br /&gt;
We verified our findings by implementing a proof of concept attack allowing us to clone a Tesla Model S key fob in a matter of seconds with low cost commercial off the shelf equipment.&amp;lt;br&amp;gt;&lt;br /&gt;
Finally, we will share our experience with the responsible disclosure of these finding to Tesla Motors and other likely affected manufacturers such as McLaren, Karma Automotive and Triumph Motorcycles as they all use the same system developed by Pektron.&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
Lennert Wouters is a PhD researcher at the Computer Security and Industrial Cryptography (COSIC) research group at KU Leuven. His research interests involve hardware security of connected embedded devices and side channel attacks.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1015&amp;quot;&amp;gt;Weaknesses in our voice communications network: from Blue Boxing to VoLTE by Ralph Moonen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Voice over 4G, or VoLTE, brings back the phreaking 80's. Once again, after 3 decades, the signaling path of telephony is accessible to end users. No more R1, R2, C4 or C5 however: we now have SIP. As it turns out, the implementations of SIP and VoLTE in various European providers' 4G infrastructures, open up a host of possibilities. During our research over the past few years we have identified vulnerabilities in implementations such as txt message spoofing, subscriber enumeration, location determination (leakage of cell-ID and LAC), IMEI leakage and a potential SIM-card sharing attack.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk we will begin with a little historic stroll of phone phreaking through notable events and discoveries over the years. Bridging the narrative over the last few decades, new technologies such as VoIP, Volte, and VoWiFi are introduced, explaining the 4G and VoLTE infrastructure components and protocols. Next, on a rooted Android phone, we will show what control the user has over the VoLTE stack using some standard tools and the IPv6 stack. This includes hidden activities in Android and extraction of IPsec keys from the VoLTE stack. We will show that it is possible to import keys to Wireshark and monitor the IPv6 SIP traffic and components. Finally, examples of the vulnerabilities in implementations such as txt message spoofing, subscriber enumeration, location determination (leakage of cell-ID and LAC), IMEI leakage and a potential SIM-card sharing attack will be explained.&amp;lt;br&amp;gt;&lt;br /&gt;
Yes, a slightly technical nugget of knowledge, yet very accessible and a lot of fun!&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Importance of presentation for involved audience'''&amp;lt;br&amp;gt;&lt;br /&gt;
The phone systems of the world have always been of interest to everyone: from users who expect privacy, to intelligence agencies who want access. The privacy, integrity and confidentiality of voice communications over telecommunication networks is therefore of interest to anyone who uses mobile phones (i.e.: everyone). It is also typically a closed subject with very little research being done, relative to other security topics such as malware and application vulnerabilities. The combination of little research and high impact on everyone, makes that this topic deserves much more attention than it currently does. The VoLTE weaknesses we will describe are implementation dependent, and largely unpublished (i.e. new).&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Ralph Moonen CISSP is Technical Director at Secura. Ralph is an old-school ethical hacker with 3 decades of experience as penetration tester, IT-auditor and security consultant. Now, as Technical Director, he is responsible for topics such as R&amp;amp;D and technical projects at Secura.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1130&amp;quot;&amp;gt;When Serverless Met Security… Serverless Security &amp;amp; Functions-as-a-Service (FaaS) by Niels Tanis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Serverless is a design pattern for writing scalable applications in which Functions as a Service (FaaS) is one of the key building blocks. Every mayor Cloud Provider has got his own FaaS available. On Microsoft Azure there is Azure Functions, AWS has got Lambda and Cloud Functions can be used on the Google Cloud. All of these have a lot of similarities in the way they allow developers to create small event driven services. &amp;lt;br&amp;gt;&lt;br /&gt;
From security perspective there are a lot of benefits when moving to a serverless architecture. There is no need to manage any of the machines and the underlying infrastructure. Dealing with updates, patches and infrastructure is the responsibility of the platform provider. FaaS are short lived processes which will be instantiated and destroyed in a matter of milliseconds making it more resilient to denial-of-services (DoS) and also makes it harder to attack and compromise. &amp;lt;br&amp;gt;&lt;br /&gt;
But will all of this be sufficient to be ’secure’ or should we be worried about more? With serverless there is still a piece of software that will be developed, build, deployed and executed. It will also introduce a more complex architecture with corresponding attack surface which also makes it hard to monitor. What about the software supply chain and delivery pipeline? There still will be a need to patch your software for vulnerabilities in code and used 3rd party libraries. In this talk we will identify the security area’s we do need to focus on when developing serverless and define possible solutions for dealing with those problems.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Niels Tanis has got a background in .NET development, pentesting and security consultancy. He also holds the CSSLP certification and has been involved in breaking, defending and building secure applications. He joined Veracode in 2015 and right now he works as a security researcher on a variant of languages and technologies related to Veracode’s Binary Static Analysis service. He is married, father of 2 and lives in a small village just outside Amersfoort, The Netherlands.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1215&amp;quot;&amp;gt;OWASP Zap by David Scrobonia&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Intoducing security testing tools to a QA or developers workflow can be difficult when the tools aren't easy or intuitive to use. Even for security professionals, the friction of cumbersome security tooling can prevent them from getting the most from a tool or being effective with their time.&amp;lt;br&amp;gt;&lt;br /&gt;
The OWASP ZAP team is working to help enable developers, QA, and hackers alike with the ZAP Heads Up Display, a more user friendly way to engage with the security testing tool. The Heads Up Displays integrates ZAP directly in the browser providing all of the funcitonality of the tool via a heads up display. The goal is to make ZAP more accessible and enabling users, especially developers, to integrate security in their daily workflows.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk will discuss the importance of usable tools, design tradeoffs made to improve usability, the various browser technologies powering the HUD, and how you can start hacking with a heads up display.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
David Scrobonia is a part of the Security Engineering team at Segment working to secure modern web apps and AWS infrastructure. He contributes to open source in his spare time and is a core team member of the OWASP ZAP project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1400&amp;quot;&amp;gt;Juice Shop: OWASP's most broken Flagship by Björn Kimminich&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
OWASP Juice Shop is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and many more severe security flaws. In this talk, you'll learn about this open-source project and its capabilities first-hand from its creator. Join a “happy shopper round trip,” enjoy a hacking demo of some of the built-in challenges, witness how to re-theme the Juice Shop into a security awareness booster for your own company, and learn how to set it up for a capture-the-flag (CTF) event in less than 5 minutes!&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
Björn Kimminich is responsible for global IT architecture and application security at Kuehne + Nagel. On the side, he gives IT security lectures at the non-profit private university Nordakademie. Björn also is the project leader of the OWASP Juice Shop and a board member for the German OWASP chapter. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:GitHub-Mark_no_background.png|25px|link=https://github.com/bkimminich|GitHub]]&lt;br /&gt;
[[File:TwitterLogo.png|25px|link=http://twitter.com/bkimminich|Twitter]]&lt;br /&gt;
[[File:LinkedinSquareLogo.png|25px|link=https://www.linkedin.com/in/bkimminich|LinkedIn]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1445&amp;quot;&amp;gt;Leaky Processors: Stealing Your Secrets with Foreshadow by Jo Van Bulck&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
For decades, memory isolation has been one of the key principles of&lt;br /&gt;
secure system design. The recent wave of speculative execution attacks,&lt;br /&gt;
including Meltdown, Spectre, and Foreshadow abruptly showed, however,&lt;br /&gt;
that performance optimizations in modern processors fundamentally&lt;br /&gt;
undermine application security.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk will review how speculative execution attacks work. What makes&lt;br /&gt;
them dangerous, and why they require a paradigm shift in the way we&lt;br /&gt;
think about application security. The talk will have a special focus on&lt;br /&gt;
the recently disclosed Foreshadow CPU vulnerability, which led to a&lt;br /&gt;
complete collapse of state-of-the-art Intel SGX technology, and&lt;br /&gt;
necessitated hardware and software patches for all major operating&lt;br /&gt;
systems and virtual machine hypervisors.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jo Van Bulck is a PhD researcher at imec-DistriNet, KU Leuven, where he&lt;br /&gt;
investigates hardware-level trusted computing from an integrated attack&lt;br /&gt;
and defense perspective. His work resulted in a.o., the high-impact&lt;br /&gt;
Foreshadow CPU vulnerability announced in August 2018, and several&lt;br /&gt;
open-source secure processor prototypes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1600&amp;quot;&amp;gt;Fast forwarding Mobile Security with the MSTG by Jeroen Willemsen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
After the startup of the mobile security project in 2010, the mobile security project and its testing guides have seen quiet some evolution. All of this changed quiet intensively when, in 2016, the Mobile Application Security Verification Standard (MASVS) and the Mobile Application Security Testing Guide (MSTG) were created. Now, two years fast forward: where are we now? How can you use it as a pentester or a developer? We will start with introducing the current state of the MSTG and its side-projects and then show various demos on iOS.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jeroen Willemsen is a Principal Security Architect at Xebia. With a love for mobile security, he recently became one of the projectleaders for the OMTG project (MASVS &amp;amp; MSTG). Jeroen is more or less a jack of all trades with interest in infrastructure security, risk management and application security.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1645&amp;quot;&amp;gt;Lessons From The Legion (The OWASP BeNeLux Remix) by Nick Drage&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Look at your job, your colleagues, your industry. Very smart people, working very hard... and yet it feels like we're losing.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Why?''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Cyber security has always been a technology driven, engineer led industry - self-taught practitioners have chosen tactics and point solutions based on what fits in with their preferred ways of working and studying. We need better strategies to make use of those tactics. We can learn those strategies from other contexts and conflicts to improve our own methods and practices.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Would you like to start winning?''&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
Nick is the Director of Path Dependence Limited, and has over two decades of experience in the cyber security field… previously he was &amp;quot;SecOps” before the term was invented, as well as having been a SysAdmin, PCI QSA, pre-sales analyst, CHECK Team Leader, and various other less well defined roles. Nick is currently a Cyber Security Consultant and Penetration Tester, with occasional forays into being a Wargame Umpire, Adversarial Analyst, or Professional Wildcard.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;CyberWayFinder&amp;quot;&amp;gt;Women in cybersecurity (CyberWayFinder)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
OWASP BeNeLux and CyberWayFinder would like to invite you to a '''breakfast with other women in cybersecurity'''.&amp;lt;br&amp;gt;&lt;br /&gt;
Since women make up 7% of the cybersecurity work force, they are a rare breed, and don't often meet each other. That is why &amp;quot;women in cybersecurity breakfasts&amp;quot; are popping up in conferences around the world.&lt;br /&gt;
A small gathering with the women who will be present at our OWASP conference in the morning provides an excellent network opportunity to meet one another. We'll make sure you don't start out the day on an empty stomach, and provide you with some contacts, without missing out on the rest of the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
join us as of 08h30 at Lamot conference center, and also hear about the CyberWayFinder training program which is being created to help women transition their career into cybersecurity.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
'''The Social Event is on Thursday, November 29th'''&lt;br /&gt;
&lt;br /&gt;
The social event will be a unique opportunity to meet some of the trainers and speakers, as well the organisers or even peers.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The social event will take place in restaurant [http://www.puro-mechelen.be/english Puro Mechelen], a couple of minutes from the conference center, on Thursday 29/11 at 19h00.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
There is a fixed group menu (meat or fish) for '''59€/person''', drinks included.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Link to the [https://static1.squarespace.com/static/53bedc63e4b051fad94ee1f7/t/59b7d81ea803bbc8f65d85ee/1505220639318/Puro-groepsmenu.pdf Menus] (page 1), and the [https://static1.squarespace.com/static/53bedc63e4b051fad94ee1f7/t/54b57100e4b0ab0673e80e8d/1421177088856/drankenformules.doc.pdf drinks].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Any participant pays individually. &amp;lt;br&amp;gt;Reservation via the form you'll receive after conference registration is mandatory.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''If you want to join the social event, don't forget to register for it via the registration:'''&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |200px|alt=Register for the OWASP BeNeLux Day 2018 | Register for the OWASP BeNeLux Day 2018 ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Address: TBD&lt;br /&gt;
&lt;br /&gt;
Menu:TBD&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
''' Become a sponsor of OWASP BeNeLux! '''&lt;br /&gt;
&lt;br /&gt;
There are 3 combined sponsorship packages (Gold, Silver or Bronze) that cover the BeNeLux chapter meetings 2019 and the BeNeLux OWASP Days 2018.&lt;br /&gt;
&lt;br /&gt;
Download our [https://www.owasp.org/images/8/8e/OWASP_BeNeLux_2018_Sponsorship_Form_v20181004.pdf sponsor brochure] and contact [mailto:seba@owasp.org us] for questions or sponsorship confirmation!&lt;br /&gt;
&lt;br /&gt;
Your sponsorship will be invested directly in the chapter meetings, supporting speaker and catering expenses. &lt;br /&gt;
&lt;br /&gt;
The sponsorship will also be dedicated to cover the costs of the OWASP 2018 BeNeLux event.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
&lt;br /&gt;
==== Gold ====&lt;br /&gt;
&lt;br /&gt;
[[File:DavinsiLabs.png|250px|link=https://www.davinsilabs.com]]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Silver ====&lt;br /&gt;
&lt;br /&gt;
[[File:LogoIngenicoGroup.png|250px|link=https://ingenico.be]]&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:LogoSynopsys.png|250px|link=https://www.synopsys.com]]&lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|250px|link=http://www.nviso.be]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Bronze ====&lt;br /&gt;
&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] &lt;br /&gt;
[[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Days_2018&amp;diff=245615</id>
		<title>OWASP BeNeLux-Days 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Days_2018&amp;diff=245615"/>
				<updated>2018-11-28T12:33:01Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Trainings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OBNL18 Banner v2.png]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
== Keynote Speaker ==&lt;br /&gt;
&lt;br /&gt;
{{#switchtablink:Conference Day|&amp;lt;p&amp;gt;&lt;br /&gt;
*  TBD&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== Confirmed Conference Speakers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--{{#switchtablink:Conference_Day|&amp;lt;p&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* David Scrobonia&lt;br /&gt;
* Niels Tanis&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Björn Kimminich&lt;br /&gt;
* Ralph Moonen&lt;br /&gt;
* Jo Van Bulck&lt;br /&gt;
* Lennert Wouters&lt;br /&gt;
* Nick Drage&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed Trainers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
{{#switchtablink:Training Day|&amp;lt;p&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* Andrew Martin&lt;br /&gt;
* David Scrobonia&lt;br /&gt;
* Jeroen Beckers - Stephanie Vanroelen&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |alt=Register NOW! | Register NOW! ]]&lt;br /&gt;
&lt;br /&gt;
'''To support the OWASP organisation, consider to become a member, it's only US$50! Check out the [[Membership]] page to find out more.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
&lt;br /&gt;
* Sebastien Deleersnyder / Lieven Desmet / David Mathy / Thomas Herlea / Stella Dineva / Adolfo Solero / Bart De Win, [[Belgium|OWASP Belgium]]&lt;br /&gt;
* Martin Knobloch / Joren Poll / Edwin Goweling, [[Netherlands|OWASP Netherlands]]&lt;br /&gt;
* [[Luxembourg|OWASP Luxembourg]]&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl17 #owaspbnl18]&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference and training days are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |alt=Register NOW! | Register NOW! ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''To support the OWASP organisation, consider to become a member, it's only US$50! Check out the [[Membership]] page to find out more.''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Address ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;50%&amp;quot;&amp;gt;&lt;br /&gt;
=== Training venue ===&lt;br /&gt;
&lt;br /&gt;
 '''Novotel Mechelen Centrum'''&lt;br /&gt;
 Van Beethovenstraat 1&lt;br /&gt;
 2800 Mechelen&lt;br /&gt;
 Belgium&lt;br /&gt;
&lt;br /&gt;
[https://goo.gl/maps/WxErtbWADqC2 Google maps]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;50%&amp;quot;&amp;gt;&lt;br /&gt;
=== Conference venue ===&lt;br /&gt;
&lt;br /&gt;
 '''Congres- en Erfgoedcentrum Lamot'''&lt;br /&gt;
 Van Beethovenstraat 8-10&lt;br /&gt;
 2800 Mechelen&lt;br /&gt;
 Belgium&lt;br /&gt;
&lt;br /&gt;
[https://goo.gl/maps/gZ9icR178w52 Google map]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
[[File:Mechelen-Lamot.jpg|350px|Lamot conference center]]&lt;br /&gt;
[[File:Mechelen-lamot-center-auditorium.jpg|350px|Auditorium]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Parking:&amp;lt;br /&amp;gt;&lt;br /&gt;
[[File:Parking lots around Lamot Conference center Mechelen.png|500px|Parking facilities]]&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://goo.gl/maps/Q5TD7hoTuUu Find your parking on Google Maps]&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== Public transport ====&lt;br /&gt;
&lt;br /&gt;
You can reach the Mechelen's train station from Antwerpen or Brussels.&lt;br /&gt;
The Lamot conference center is 10 min away by bus (line 1).&lt;br /&gt;
&lt;br /&gt;
Or you can choose to walk for 15 min (1.2 km).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
&lt;br /&gt;
===== From Brussels: =====&lt;br /&gt;
Follow the E19 Brussels / Antwerpen and take the exit 10. &amp;lt;br&amp;gt; Follow the N1 until the R12 (take a left) and turn to the right at the &amp;quot;Brusselpoort&amp;quot; into the Hoogstraat to reach one of the parkings.&lt;br /&gt;
&lt;br /&gt;
===== From Antwerpen: =====&lt;br /&gt;
Follow the E19 Brussels / Antwerpen and take the exit 9. &amp;lt;br&amp;gt; Follow the N16 until the R12 (take a right) and turn to the left at the &amp;quot;Brusselpoort&amp;quot; into the Hoogstraat to reach one of the parkings. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Hotels Nearby ===&lt;br /&gt;
[https://www.google.com/maps/d/viewer?mid=1eYMYmwXKuAsTilKgpAtyYtfMA7A&amp;amp;ll=51.02648134397288%2C4.47819800000002&amp;amp;z=15 Hotels around the Lamot conference center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Training Day =&lt;br /&gt;
&lt;br /&gt;
'''Training Day is November 29th'''&lt;br /&gt;
&lt;br /&gt;
== Training Venue ==&lt;br /&gt;
&lt;br /&gt;
The trainings will take place in the '''Novotel Mechelen Centrum''' hotel:&amp;lt;br&amp;gt;&lt;br /&gt;
Van Beethovenstraat 1&amp;lt;br&amp;gt;&lt;br /&gt;
2800 Mechelen&amp;lt;br&amp;gt;&lt;br /&gt;
[https://goo.gl/maps/WxErtbWADqC2 Google maps]&lt;br /&gt;
&lt;br /&gt;
== Agenda==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Training 1 !! Training 2 !! Training 3&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_1 | Kubernetes security]] by Andrew Martin&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_2 | OWASP Zap Training]] by David Scrobonia&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_3 | Android security workshop]] by Jeroen Beckers &amp;amp; Stephanie Vanroelen&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;Choose the most appropriate training as they will be hosted at the same time.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Trainings ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_1&amp;quot;&amp;gt;Training 1 - Kubernetes security by Andrew Martin&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
===== Course Description =====&lt;br /&gt;
The course guides attendees through Linux container security in general, and progresses to advanced Kubernetes cluster security. It emphasises pragmatic threat modelling and risk assessment based on an understanding of the tools and primitives available, rather than dogmatic dos and don’ts.&lt;br /&gt;
&lt;br /&gt;
===== Course Outline =====&lt;br /&gt;
* How to attack containerised workloads&lt;br /&gt;
* Enhanced container security&lt;br /&gt;
* How to attack Kubernetes&lt;br /&gt;
* Interactive production cluster hacking&lt;br /&gt;
* Hardening Kubernetes&lt;br /&gt;
* Locking down applications&lt;br /&gt;
* Security tooling and vendor landscape&lt;br /&gt;
&lt;br /&gt;
===== Who Should Attend =====&lt;br /&gt;
This course is suitable for intermediate to advanced Kubernetes users who want to strengthen their security understanding. It is particularly beneficial for those operating Kubernetes in a high-compliance domain, or for established security professionals looking to update their skills for the cloud native world.&lt;br /&gt;
&lt;br /&gt;
===== Participant requirements =====&lt;br /&gt;
Just a laptop with an SSH client please, ssh or PuTTY.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Andrew has a strong test-first engineering ethos gained architecting and deploying high-traffic web applications. Proficient in systems development, testing, and maintenance, he is comfortable profiling and securing every tier of a bare metal or cloud native application, and has battle-hardened experience delivering containerised solutions to enterprise clients. He is a co-founder at https://control-plane.io&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_2&amp;quot;&amp;gt;Training 2 - OWASP Zap Training by David Scrobonia&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
This hands on course will start with the basics of using ZAP attack proxy and finish with leveraging it's API to integrate ZAP within you CI/CD processes. Along the way we will be practicing techniques by attacking the OWASP JuiceShop, an intentionally vulnerable web application. &lt;br /&gt;
&lt;br /&gt;
==== Audience ====&lt;br /&gt;
&lt;br /&gt;
This couse is designed for both new and experienced users. No knowledge or experience with ZAP is required, but even those familiar with ZAP will learn something new.&lt;br /&gt;
&lt;br /&gt;
==== Contents ====&lt;br /&gt;
# Basic Techniques &amp;amp; Manual Testing &lt;br /&gt;
# Advanced Techniques &amp;amp; Automated Testing&lt;br /&gt;
# Scripting with ZAP&lt;br /&gt;
# Using ZAP within your CI/CD Pipeline&lt;br /&gt;
 &lt;br /&gt;
===== Participant requirements =====&lt;br /&gt;
Please come prepared with the following tools installed:&lt;br /&gt;
* ZAP (https://github.com/zaproxy/zaproxy/wiki/Downloads#zap-270-standard)&lt;br /&gt;
* docker&lt;br /&gt;
&lt;br /&gt;
If you have any trouble with the setup please feel free to reach out to davidscrobonia at gmail with questions. &lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
David Scrobonia is a part of the Security Engineering team at Segment working to secure modern web apps and AWS infrastructure. He contributes to open source in his spare time and is a core team member of the OWASP ZAP project.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_3&amp;quot;&amp;gt;Training 3 - Android security workshop by Jeroen Beckers &amp;amp; Stephanie Vanroelen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
In this workshop, participants will come in contact with the basics of&lt;br /&gt;
Android application security. Through hands-on exercises, Jeroen and&lt;br /&gt;
Stephanie will show which mistakes can be made, both at the design and&lt;br /&gt;
implementation level, that can compromise the security of both the&lt;br /&gt;
application and the backend server. Although no real prior experience&lt;br /&gt;
with Android is needed, some basic knowledge on programming is advised.&lt;br /&gt;
&lt;br /&gt;
==== Participation requirements ====&lt;br /&gt;
* Basic linux / terminal knowledge&lt;br /&gt;
* Be able to understand the OWASP Top 10 (Not Mobile)&lt;br /&gt;
* Laptop with VirtualBox / VMWare (At least 8GB of RAM)&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jeroen Beckers is a security researcher at NVISO. He focusses mainly on&lt;br /&gt;
mobile applications for Android/iOS and sometimes even Windows Phone&lt;br /&gt;
(yes, some people actually use it!). Apart from breaking mobile&lt;br /&gt;
applications, he also gives security trainings and presentations at&lt;br /&gt;
conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Stephanie Vanroelen is an IT security consultant currently focussing on Web and&lt;br /&gt;
Mobile Application Security. Her experiences in organizing IT Security&lt;br /&gt;
conferences such as BruCON and CyberSKool help her with project&lt;br /&gt;
management and communication skills. In her free time she pretends to be&lt;br /&gt;
Godzilla :).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Day =&lt;br /&gt;
&lt;br /&gt;
'''Conference Day is November 30th'''&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;190pt&amp;quot; | Speaker &lt;br /&gt;
! width=&amp;quot;400pt&amp;quot; | Topic&lt;br /&gt;
&amp;lt;!-- ! width=&amp;quot;100pt&amp;quot; -- ! | Media --&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h15&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration / [[#CyberWayFinder | Women in cybersecurity (CyberWayFinder)]]''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 09h30&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Opening''&lt;br /&gt;
|- &lt;br /&gt;
| 09h30 - 10h15&lt;br /&gt;
| [[#TALK_0930 | Lennert Wouters]]&lt;br /&gt;
| [[#TALK_0930 | Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_0915_SLIDES|Slides]] [TALK_0915_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 11h00&lt;br /&gt;
| [[#TALK_1015 | Ralph Moonen]]&lt;br /&gt;
| [[#TALK_1015 | Weaknesses in our voice communications network: from Blue Boxing to VoLTE]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1000_SLIDES|Slides]] [TALK_1000_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h15&lt;br /&gt;
| [[#TALK_1130 | Niels Tanis]]&lt;br /&gt;
| [[#TALK_1130 | When Serverless Met Security… Serverless Security &amp;amp; Functions-as-a-Service (FaaS)]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1115_SLIDES|Slides]] [TALK_1115_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h15 - 13h00&lt;br /&gt;
| [[#TALK_1215 | David Scrobonia]]&lt;br /&gt;
| [[#TALK_1215 | OWASP Zap]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1200_SLIDES|Slides]] [TALK_1200_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 14h45&lt;br /&gt;
| [[#TALK_1400 | Björn Kimminich]]&lt;br /&gt;
| [[#TALK_1400 | Juice Shop: OWASP's most broken Flagship]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1345_SLIDES|Slides]] [TALK_1345_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h45 - 15h30&lt;br /&gt;
| [[#TALK_1445 | Jo Van Bulck]]&lt;br /&gt;
| [[#TALK_1445 | Leaky Processors: Stealing Your Secrets with Foreshadow]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1430_SLIDES|Slides]] [TALK_1430_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Afternoon Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 16h45&lt;br /&gt;
| [[#TALK_1600 | Jeroen Willemsen]]&lt;br /&gt;
| [[#TALK_1600 | Fast forwarding Mobile Security with the MSTG]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1545_SLIDES|Slides]] [TALK_1545_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 16h45 - 17h30&lt;br /&gt;
| [[#TALK_1645 | Nick Drage]]&lt;br /&gt;
| [[#TALK_1645 | Lessons from the legion (The OWASP BeNeLux Remix)]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1630_SLIDES|Slides]] [TALK_1630_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 17h30 - 17h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Closing'' &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_0930&amp;quot;&amp;gt;Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars by Lennert Wouters&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
The security of immobiliser and Remote Keyless Entry systems has been extensively studied over the past years. Passive Keyless Entry and Start systems, which are currently deployed in luxury vehicles, have not received as much attention.&lt;br /&gt;
During this presentation we will share the techniques used in reverse engineering the Tesla Model S Passive Keyless Entry and Start system. We will discuss multiple security weaknesses in the system including the use of an inadequate proprietary cipher using 40-bit keys, the lack of mutual authentication in the challenge-response protocol, hardware configuration mistakes and the absence of security partitioning.&amp;lt;br&amp;gt;&lt;br /&gt;
We verified our findings by implementing a proof of concept attack allowing us to clone a Tesla Model S key fob in a matter of seconds with low cost commercial off the shelf equipment.&amp;lt;br&amp;gt;&lt;br /&gt;
Finally, we will share our experience with the responsible disclosure of these finding to Tesla Motors and other likely affected manufacturers such as McLaren, Karma Automotive and Triumph Motorcycles as they all use the same system developed by Pektron.&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
Lennert Wouters is a PhD researcher at the Computer Security and Industrial Cryptography (COSIC) research group at KU Leuven. His research interests involve hardware security of connected embedded devices and side channel attacks.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1015&amp;quot;&amp;gt;Weaknesses in our voice communications network: from Blue Boxing to VoLTE by Ralph Moonen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Voice over 4G, or VoLTE, brings back the phreaking 80's. Once again, after 3 decades, the signaling path of telephony is accessible to end users. No more R1, R2, C4 or C5 however: we now have SIP. As it turns out, the implementations of SIP and VoLTE in various European providers' 4G infrastructures, open up a host of possibilities. During our research over the past few years we have identified vulnerabilities in implementations such as txt message spoofing, subscriber enumeration, location determination (leakage of cell-ID and LAC), IMEI leakage and a potential SIM-card sharing attack.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk we will begin with a little historic stroll of phone phreaking through notable events and discoveries over the years. Bridging the narrative over the last few decades, new technologies such as VoIP, Volte, and VoWiFi are introduced, explaining the 4G and VoLTE infrastructure components and protocols. Next, on a rooted Android phone, we will show what control the user has over the VoLTE stack using some standard tools and the IPv6 stack. This includes hidden activities in Android and extraction of IPsec keys from the VoLTE stack. We will show that it is possible to import keys to Wireshark and monitor the IPv6 SIP traffic and components. Finally, examples of the vulnerabilities in implementations such as txt message spoofing, subscriber enumeration, location determination (leakage of cell-ID and LAC), IMEI leakage and a potential SIM-card sharing attack will be explained.&amp;lt;br&amp;gt;&lt;br /&gt;
Yes, a slightly technical nugget of knowledge, yet very accessible and a lot of fun!&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Importance of presentation for involved audience'''&amp;lt;br&amp;gt;&lt;br /&gt;
The phone systems of the world have always been of interest to everyone: from users who expect privacy, to intelligence agencies who want access. The privacy, integrity and confidentiality of voice communications over telecommunication networks is therefore of interest to anyone who uses mobile phones (i.e.: everyone). It is also typically a closed subject with very little research being done, relative to other security topics such as malware and application vulnerabilities. The combination of little research and high impact on everyone, makes that this topic deserves much more attention than it currently does. The VoLTE weaknesses we will describe are implementation dependent, and largely unpublished (i.e. new).&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Ralph Moonen CISSP is Technical Director at Secura. Ralph is an old-school ethical hacker with 3 decades of experience as penetration tester, IT-auditor and security consultant. Now, as Technical Director, he is responsible for topics such as R&amp;amp;D and technical projects at Secura.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1130&amp;quot;&amp;gt;When Serverless Met Security… Serverless Security &amp;amp; Functions-as-a-Service (FaaS) by Niels Tanis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Serverless is a design pattern for writing scalable applications in which Functions as a Service (FaaS) is one of the key building blocks. Every mayor Cloud Provider has got his own FaaS available. On Microsoft Azure there is Azure Functions, AWS has got Lambda and Cloud Functions can be used on the Google Cloud. All of these have a lot of similarities in the way they allow developers to create small event driven services. &amp;lt;br&amp;gt;&lt;br /&gt;
From security perspective there are a lot of benefits when moving to a serverless architecture. There is no need to manage any of the machines and the underlying infrastructure. Dealing with updates, patches and infrastructure is the responsibility of the platform provider. FaaS are short lived processes which will be instantiated and destroyed in a matter of milliseconds making it more resilient to denial-of-services (DoS) and also makes it harder to attack and compromise. &amp;lt;br&amp;gt;&lt;br /&gt;
But will all of this be sufficient to be ’secure’ or should we be worried about more? With serverless there is still a piece of software that will be developed, build, deployed and executed. It will also introduce a more complex architecture with corresponding attack surface which also makes it hard to monitor. What about the software supply chain and delivery pipeline? There still will be a need to patch your software for vulnerabilities in code and used 3rd party libraries. In this talk we will identify the security area’s we do need to focus on when developing serverless and define possible solutions for dealing with those problems.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Niels Tanis has got a background in .NET development, pentesting and security consultancy. He also holds the CSSLP certification and has been involved in breaking, defending and building secure applications. He joined Veracode in 2015 and right now he works as a security researcher on a variant of languages and technologies related to Veracode’s Binary Static Analysis service. He is married, father of 2 and lives in a small village just outside Amersfoort, The Netherlands.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1215&amp;quot;&amp;gt;OWASP Zap by David Scrobonia&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Intoducing security testing tools to a QA or developers workflow can be difficult when the tools aren't easy or intuitive to use. Even for security professionals, the friction of cumbersome security tooling can prevent them from getting the most from a tool or being effective with their time.&amp;lt;br&amp;gt;&lt;br /&gt;
The OWASP ZAP team is working to help enable developers, QA, and hackers alike with the ZAP Heads Up Display, a more user friendly way to engage with the security testing tool. The Heads Up Displays integrates ZAP directly in the browser providing all of the funcitonality of the tool via a heads up display. The goal is to make ZAP more accessible and enabling users, especially developers, to integrate security in their daily workflows.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk will discuss the importance of usable tools, design tradeoffs made to improve usability, the various browser technologies powering the HUD, and how you can start hacking with a heads up display.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
David Scrobonia is a part of the Security Engineering team at Segment working to secure modern web apps and AWS infrastructure. He contributes to open source in his spare time and is a core team member of the OWASP ZAP project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1400&amp;quot;&amp;gt;Juice Shop: OWASP's most broken Flagship by Björn Kimminich&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
OWASP Juice Shop is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and many more severe security flaws. In this talk, you'll learn about this open-source project and its capabilities first-hand from its creator. Join a “happy shopper round trip,” enjoy a hacking demo of some of the built-in challenges, witness how to re-theme the Juice Shop into a security awareness booster for your own company, and learn how to set it up for a capture-the-flag (CTF) event in less than 5 minutes!&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
Björn Kimminich is responsible for global IT architecture and application security at Kuehne + Nagel. On the side, he gives IT security lectures at the non-profit private university Nordakademie. Björn also is the project leader of the OWASP Juice Shop and a board member for the German OWASP chapter. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:GitHub-Mark_no_background.png|25px|link=https://github.com/bkimminich|GitHub]]&lt;br /&gt;
[[File:TwitterLogo.png|25px|link=http://twitter.com/bkimminich|Twitter]]&lt;br /&gt;
[[File:LinkedinSquareLogo.png|25px|link=https://www.linkedin.com/in/bkimminich|LinkedIn]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1445&amp;quot;&amp;gt;Leaky Processors: Stealing Your Secrets with Foreshadow by Jo Van Bulck&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
For decades, memory isolation has been one of the key principles of&lt;br /&gt;
secure system design. The recent wave of speculative execution attacks,&lt;br /&gt;
including Meltdown, Spectre, and Foreshadow abruptly showed, however,&lt;br /&gt;
that performance optimizations in modern processors fundamentally&lt;br /&gt;
undermine application security.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk will review how speculative execution attacks work. What makes&lt;br /&gt;
them dangerous, and why they require a paradigm shift in the way we&lt;br /&gt;
think about application security. The talk will have a special focus on&lt;br /&gt;
the recently disclosed Foreshadow CPU vulnerability, which led to a&lt;br /&gt;
complete collapse of state-of-the-art Intel SGX technology, and&lt;br /&gt;
necessitated hardware and software patches for all major operating&lt;br /&gt;
systems and virtual machine hypervisors.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jo Van Bulck is a PhD researcher at imec-DistriNet, KU Leuven, where he&lt;br /&gt;
investigates hardware-level trusted computing from an integrated attack&lt;br /&gt;
and defense perspective. His work resulted in a.o., the high-impact&lt;br /&gt;
Foreshadow CPU vulnerability announced in August 2018, and several&lt;br /&gt;
open-source secure processor prototypes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1600&amp;quot;&amp;gt;Fast forwarding Mobile Security with the MSTG by Jeroen Willemsen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
After the startup of the mobile security project in 2010, the mobile security project and its testing guides have seen quiet some evolution. All of this changed quiet intensively when, in 2016, the Mobile Application Security Verification Standard (MASVS) and the Mobile Application Security Testing Guide (MSTG) were created. Now, two years fast forward: where are we now? How can you use it as a pentester or a developer? We will start with introducing the current state of the MSTG and its side-projects and then show various demos on iOS and Android.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jeroen Willemsen is a Principal Security Architect at Xebia. With a love for mobile security, he recently became one of the projectleaders for the OMTG project (MASV &amp;amp; MSTG). Jeroen is more or less a jack of all trades with interest in infrastructure security, risk management and application security.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1645&amp;quot;&amp;gt;Lessons From The Legion (The OWASP BeNeLux Remix) by Nick Drage&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Look at your job, your colleagues, your industry. Very smart people, working very hard... and yet it feels like we're losing.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Why?''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Cyber security has always been a technology driven, engineer led industry - self-taught practitioners have chosen tactics and point solutions based on what fits in with their preferred ways of working and studying. We need better strategies to make use of those tactics. We can learn those strategies from other contexts and conflicts to improve our own methods and practices.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Would you like to start winning?''&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
Nick is the Director of Path Dependence Limited, and has over two decades of experience in the cyber security field… previously he was &amp;quot;SecOps” before the term was invented, as well as having been a SysAdmin, PCI QSA, pre-sales analyst, CHECK Team Leader, and various other less well defined roles. Nick is currently a Cyber Security Consultant and Penetration Tester, with occasional forays into being a Wargame Umpire, Adversarial Analyst, or Professional Wildcard.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;CyberWayFinder&amp;quot;&amp;gt;Women in cybersecurity (CyberWayFinder)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
OWASP BeNeLux and CyberWayFinder would like to invite you to a '''breakfast with other women in cybersecurity'''.&amp;lt;br&amp;gt;&lt;br /&gt;
Since women make up 7% of the cybersecurity work force, they are a rare breed, and don't often meet each other. That is why &amp;quot;women in cybersecurity breakfasts&amp;quot; are popping up in conferences around the world.&lt;br /&gt;
A small gathering with the women who will be present at our OWASP conference in the morning provides an excellent network opportunity to meet one another. We'll make sure you don't start out the day on an empty stomach, and provide you with some contacts, without missing out on the rest of the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
join us as of 08h30 at Lamot conference center, and also hear about the CyberWayFinder training program which is being created to help women transition their career into cybersecurity.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
'''The Social Event is on Thursday, November 29th'''&lt;br /&gt;
&lt;br /&gt;
The social event will be a unique opportunity to meet some of the trainers and speakers, as well the organisers or even peers.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The social event will take place in restaurant [http://www.puro-mechelen.be/english Puro Mechelen], a couple of minutes from the conference center, on Thursday 29/11 at 19h00.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
There is a fixed group menu (meat or fish) for '''59€/person''', drinks included.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Link to the [https://static1.squarespace.com/static/53bedc63e4b051fad94ee1f7/t/59b7d81ea803bbc8f65d85ee/1505220639318/Puro-groepsmenu.pdf Menus] (page 1), and the [https://static1.squarespace.com/static/53bedc63e4b051fad94ee1f7/t/54b57100e4b0ab0673e80e8d/1421177088856/drankenformules.doc.pdf drinks].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Any participant pays individually. &amp;lt;br&amp;gt;Reservation via the form you'll receive after conference registration is mandatory.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''If you want to join the social event, don't forget to register for it via the registration:'''&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |200px|alt=Register for the OWASP BeNeLux Day 2018 | Register for the OWASP BeNeLux Day 2018 ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Address: TBD&lt;br /&gt;
&lt;br /&gt;
Menu:TBD&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
''' Become a sponsor of OWASP BeNeLux! '''&lt;br /&gt;
&lt;br /&gt;
There are 3 combined sponsorship packages (Gold, Silver or Bronze) that cover the BeNeLux chapter meetings 2019 and the BeNeLux OWASP Days 2018.&lt;br /&gt;
&lt;br /&gt;
Download our [https://www.owasp.org/images/8/8e/OWASP_BeNeLux_2018_Sponsorship_Form_v20181004.pdf sponsor brochure] and contact [mailto:seba@owasp.org us] for questions or sponsorship confirmation!&lt;br /&gt;
&lt;br /&gt;
Your sponsorship will be invested directly in the chapter meetings, supporting speaker and catering expenses. &lt;br /&gt;
&lt;br /&gt;
The sponsorship will also be dedicated to cover the costs of the OWASP 2018 BeNeLux event.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
&lt;br /&gt;
==== Gold ====&lt;br /&gt;
&lt;br /&gt;
[[File:DavinsiLabs.png|250px|link=https://www.davinsilabs.com]]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Silver ====&lt;br /&gt;
&lt;br /&gt;
[[File:LogoIngenicoGroup.png|250px|link=https://ingenico.be]]&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:LogoSynopsys.png|250px|link=https://www.synopsys.com]]&lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|250px|link=http://www.nviso.be]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Bronze ====&lt;br /&gt;
&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] &lt;br /&gt;
[[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Days_2018&amp;diff=245604</id>
		<title>OWASP BeNeLux-Days 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Days_2018&amp;diff=245604"/>
				<updated>2018-11-27T22:09:06Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: requirements for kubernetes training&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OBNL18 Banner v2.png]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
== Keynote Speaker ==&lt;br /&gt;
&lt;br /&gt;
{{#switchtablink:Conference Day|&amp;lt;p&amp;gt;&lt;br /&gt;
*  TBD&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== Confirmed Conference Speakers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--{{#switchtablink:Conference_Day|&amp;lt;p&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* David Scrobonia&lt;br /&gt;
* Niels Tanis&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Björn Kimminich&lt;br /&gt;
* Ralph Moonen&lt;br /&gt;
* Jo Van Bulck&lt;br /&gt;
* Lennert Wouters&lt;br /&gt;
* Nick Drage&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed Trainers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
{{#switchtablink:Training Day|&amp;lt;p&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* Andrew Martin&lt;br /&gt;
* David Scrobonia&lt;br /&gt;
* Jeroen Beckers - Stephanie Vanroelen&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |alt=Register NOW! | Register NOW! ]]&lt;br /&gt;
&lt;br /&gt;
'''To support the OWASP organisation, consider to become a member, it's only US$50! Check out the [[Membership]] page to find out more.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
&lt;br /&gt;
* Sebastien Deleersnyder / Lieven Desmet / David Mathy / Thomas Herlea / Stella Dineva / Adolfo Solero / Bart De Win, [[Belgium|OWASP Belgium]]&lt;br /&gt;
* Martin Knobloch / Joren Poll / Edwin Goweling, [[Netherlands|OWASP Netherlands]]&lt;br /&gt;
* [[Luxembourg|OWASP Luxembourg]]&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl17 #owaspbnl18]&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference and training days are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |alt=Register NOW! | Register NOW! ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''To support the OWASP organisation, consider to become a member, it's only US$50! Check out the [[Membership]] page to find out more.''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Address ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;50%&amp;quot;&amp;gt;&lt;br /&gt;
=== Training venue ===&lt;br /&gt;
&lt;br /&gt;
 '''Novotel Mechelen Centrum'''&lt;br /&gt;
 Van Beethovenstraat 1&lt;br /&gt;
 2800 Mechelen&lt;br /&gt;
 Belgium&lt;br /&gt;
&lt;br /&gt;
[https://goo.gl/maps/WxErtbWADqC2 Google maps]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;50%&amp;quot;&amp;gt;&lt;br /&gt;
=== Conference venue ===&lt;br /&gt;
&lt;br /&gt;
 '''Congres- en Erfgoedcentrum Lamot'''&lt;br /&gt;
 Van Beethovenstraat 8-10&lt;br /&gt;
 2800 Mechelen&lt;br /&gt;
 Belgium&lt;br /&gt;
&lt;br /&gt;
[https://goo.gl/maps/gZ9icR178w52 Google map]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
[[File:Mechelen-Lamot.jpg|350px|Lamot conference center]]&lt;br /&gt;
[[File:Mechelen-lamot-center-auditorium.jpg|350px|Auditorium]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Parking:&amp;lt;br /&amp;gt;&lt;br /&gt;
[[File:Parking lots around Lamot Conference center Mechelen.png|500px|Parking facilities]]&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://goo.gl/maps/Q5TD7hoTuUu Find your parking on Google Maps]&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== Public transport ====&lt;br /&gt;
&lt;br /&gt;
You can reach the Mechelen's train station from Antwerpen or Brussels.&lt;br /&gt;
The Lamot conference center is 10 min away by bus (line 1).&lt;br /&gt;
&lt;br /&gt;
Or you can choose to walk for 15 min (1.2 km).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
&lt;br /&gt;
===== From Brussels: =====&lt;br /&gt;
Follow the E19 Brussels / Antwerpen and take the exit 10. &amp;lt;br&amp;gt; Follow the N1 until the R12 (take a left) and turn to the right at the &amp;quot;Brusselpoort&amp;quot; into the Hoogstraat to reach one of the parkings.&lt;br /&gt;
&lt;br /&gt;
===== From Antwerpen: =====&lt;br /&gt;
Follow the E19 Brussels / Antwerpen and take the exit 9. &amp;lt;br&amp;gt; Follow the N16 until the R12 (take a right) and turn to the left at the &amp;quot;Brusselpoort&amp;quot; into the Hoogstraat to reach one of the parkings. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Hotels Nearby ===&lt;br /&gt;
[https://www.google.com/maps/d/viewer?mid=1eYMYmwXKuAsTilKgpAtyYtfMA7A&amp;amp;ll=51.02648134397288%2C4.47819800000002&amp;amp;z=15 Hotels around the Lamot conference center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Training Day =&lt;br /&gt;
&lt;br /&gt;
'''Training Day is November 29th'''&lt;br /&gt;
&lt;br /&gt;
== Training Venue ==&lt;br /&gt;
&lt;br /&gt;
The trainings will take place in the '''Novotel Mechelen Centrum''' hotel:&amp;lt;br&amp;gt;&lt;br /&gt;
Van Beethovenstraat 1&amp;lt;br&amp;gt;&lt;br /&gt;
2800 Mechelen&amp;lt;br&amp;gt;&lt;br /&gt;
[https://goo.gl/maps/WxErtbWADqC2 Google maps]&lt;br /&gt;
&lt;br /&gt;
== Agenda==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Training 1 !! Training 2 !! Training 3&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_1 | Kubernetes security]] by Andrew Martin&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_2 | OWASP Zap Training]] by David Scrobonia&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_3 | Android security workshop]] by Jeroen Beckers &amp;amp; Stephanie Vanroelen&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;Choose the most appropriate training as they will be hosted at the same time.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Trainings ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_1&amp;quot;&amp;gt;Training 1 - Kubernetes security by Andrew Martin&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
===== Course Description =====&lt;br /&gt;
The course guides attendees through Linux container security in general, and progresses to advanced Kubernetes cluster security. It emphasises pragmatic threat modelling and risk assessment based on an understanding of the tools and primitives available, rather than dogmatic dos and don’ts.&lt;br /&gt;
&lt;br /&gt;
===== Course Outline =====&lt;br /&gt;
* How to attack containerised workloads&lt;br /&gt;
* Enhanced container security&lt;br /&gt;
* How to attack Kubernetes&lt;br /&gt;
* Interactive production cluster hacking&lt;br /&gt;
* Hardening Kubernetes&lt;br /&gt;
* Locking down applications&lt;br /&gt;
* Security tooling and vendor landscape&lt;br /&gt;
&lt;br /&gt;
===== Who Should Attend =====&lt;br /&gt;
This course is suitable for intermediate to advanced Kubernetes users who want to strengthen their security understanding. It is particularly beneficial for those operating Kubernetes in a high-compliance domain, or for established security professionals looking to update their skills for the cloud native world.&lt;br /&gt;
&lt;br /&gt;
===== Participant requirements =====&lt;br /&gt;
Just a laptop with an SSH client please, ssh or PuTTY.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Andrew has a strong test-first engineering ethos gained architecting and deploying high-traffic web applications. Proficient in systems development, testing, and maintenance, he is comfortable profiling and securing every tier of a bare metal or cloud native application, and has battle-hardened experience delivering containerised solutions to enterprise clients. He is a co-founder at https://control-plane.io&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_2&amp;quot;&amp;gt;Training 2 - OWASP Zap Training by David Scrobonia&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
This hands on course will start with the basics of using ZAP attack proxy and finish with leveraging it's API to integrate ZAP within you CI/CD processes. Along the way we will be practicing techniques by attacking the OWASP JuiceShop, an intentionally vulnerable web application. &lt;br /&gt;
&lt;br /&gt;
==== Audience ====&lt;br /&gt;
&lt;br /&gt;
This couse is designed for both new and experienced users. No knowledge or experience with ZAP is required, but even those familiar with ZAP will learn something new.&lt;br /&gt;
&lt;br /&gt;
==== Contents ====&lt;br /&gt;
# Basic Techniques &amp;amp; Manual Testing &lt;br /&gt;
# Advanced Techniques &amp;amp; Automated Testing&lt;br /&gt;
# Scripting with ZAP&lt;br /&gt;
# Using ZAP within your CI/CD Pipeline&lt;br /&gt;
 &lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
David Scrobonia is a part of the Security Engineering team at Segment working to secure modern web apps and AWS infrastructure. He contributes to open source in his spare time and is a core team member of the OWASP ZAP project.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_3&amp;quot;&amp;gt;Training 3 - Android security workshop by Jeroen Beckers &amp;amp; Stephanie Vanroelen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
In this workshop, participants will come in contact with the basics of&lt;br /&gt;
Android application security. Through hands-on exercises, Jeroen and&lt;br /&gt;
Stephanie will show which mistakes can be made, both at the design and&lt;br /&gt;
implementation level, that can compromise the security of both the&lt;br /&gt;
application and the backend server. Although no real prior experience&lt;br /&gt;
with Android is needed, some basic knowledge on programming is advised.&lt;br /&gt;
&lt;br /&gt;
==== Participation requirements ====&lt;br /&gt;
* Basic linux / terminal knowledge&lt;br /&gt;
* Be able to understand the OWASP Top 10 (Not Mobile)&lt;br /&gt;
* Laptop with VirtualBox / VMWare (At least 8GB of RAM)&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jeroen Beckers is a security researcher at NVISO. He focusses mainly on&lt;br /&gt;
mobile applications for Android/iOS and sometimes even Windows Phone&lt;br /&gt;
(yes, some people actually use it!). Apart from breaking mobile&lt;br /&gt;
applications, he also gives security trainings and presentations at&lt;br /&gt;
conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Stephanie Vanroelen is an IT security consultant currently focussing on Web and&lt;br /&gt;
Mobile Application Security. Her experiences in organizing IT Security&lt;br /&gt;
conferences such as BruCON and CyberSKool help her with project&lt;br /&gt;
management and communication skills. In her free time she pretends to be&lt;br /&gt;
Godzilla :).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Day =&lt;br /&gt;
&lt;br /&gt;
'''Conference Day is November 30th'''&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;190pt&amp;quot; | Speaker &lt;br /&gt;
! width=&amp;quot;400pt&amp;quot; | Topic&lt;br /&gt;
&amp;lt;!-- ! width=&amp;quot;100pt&amp;quot; -- ! | Media --&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h15&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration / [[#CyberWayFinder | Women in cybersecurity (CyberWayFinder)]]''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 09h30&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Opening''&lt;br /&gt;
|- &lt;br /&gt;
| 09h30 - 10h15&lt;br /&gt;
| [[#TALK_0930 | Lennert Wouters]]&lt;br /&gt;
| [[#TALK_0930 | Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_0915_SLIDES|Slides]] [TALK_0915_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 11h00&lt;br /&gt;
| [[#TALK_1015 | Ralph Moonen]]&lt;br /&gt;
| [[#TALK_1015 | Weaknesses in our voice communications network: from Blue Boxing to VoLTE]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1000_SLIDES|Slides]] [TALK_1000_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h15&lt;br /&gt;
| [[#TALK_1130 | Niels Tanis]]&lt;br /&gt;
| [[#TALK_1130 | When Serverless Met Security… Serverless Security &amp;amp; Functions-as-a-Service (FaaS)]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1115_SLIDES|Slides]] [TALK_1115_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h15 - 13h00&lt;br /&gt;
| [[#TALK_1215 | David Scrobonia]]&lt;br /&gt;
| [[#TALK_1215 | OWASP Zap]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1200_SLIDES|Slides]] [TALK_1200_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 14h45&lt;br /&gt;
| [[#TALK_1400 | Björn Kimminich]]&lt;br /&gt;
| [[#TALK_1400 | Juice Shop: OWASP's most broken Flagship]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1345_SLIDES|Slides]] [TALK_1345_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h45 - 15h30&lt;br /&gt;
| [[#TALK_1445 | Jo Van Bulck]]&lt;br /&gt;
| [[#TALK_1445 | Leaky Processors: Stealing Your Secrets with Foreshadow]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1430_SLIDES|Slides]] [TALK_1430_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Afternoon Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 16h45&lt;br /&gt;
| [[#TALK_1600 | Jeroen Willemsen]]&lt;br /&gt;
| [[#TALK_1600 | Fast forwarding Mobile Security with the MSTG]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1545_SLIDES|Slides]] [TALK_1545_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 16h45 - 17h30&lt;br /&gt;
| [[#TALK_1645 | Nick Drage]]&lt;br /&gt;
| [[#TALK_1645 | Lessons from the legion (The OWASP BeNeLux Remix)]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1630_SLIDES|Slides]] [TALK_1630_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 17h30 - 17h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Closing'' &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_0930&amp;quot;&amp;gt;Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars by Lennert Wouters&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
The security of immobiliser and Remote Keyless Entry systems has been extensively studied over the past years. Passive Keyless Entry and Start systems, which are currently deployed in luxury vehicles, have not received as much attention.&lt;br /&gt;
During this presentation we will share the techniques used in reverse engineering the Tesla Model S Passive Keyless Entry and Start system. We will discuss multiple security weaknesses in the system including the use of an inadequate proprietary cipher using 40-bit keys, the lack of mutual authentication in the challenge-response protocol, hardware configuration mistakes and the absence of security partitioning.&amp;lt;br&amp;gt;&lt;br /&gt;
We verified our findings by implementing a proof of concept attack allowing us to clone a Tesla Model S key fob in a matter of seconds with low cost commercial off the shelf equipment.&amp;lt;br&amp;gt;&lt;br /&gt;
Finally, we will share our experience with the responsible disclosure of these finding to Tesla Motors and other likely affected manufacturers such as McLaren, Karma Automotive and Triumph Motorcycles as they all use the same system developed by Pektron.&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
Lennert Wouters is a PhD researcher at the Computer Security and Industrial Cryptography (COSIC) research group at KU Leuven. His research interests involve hardware security of connected embedded devices and side channel attacks.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1015&amp;quot;&amp;gt;Weaknesses in our voice communications network: from Blue Boxing to VoLTE by Ralph Moonen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Voice over 4G, or VoLTE, brings back the phreaking 80's. Once again, after 3 decades, the signaling path of telephony is accessible to end users. No more R1, R2, C4 or C5 however: we now have SIP. As it turns out, the implementations of SIP and VoLTE in various European providers' 4G infrastructures, open up a host of possibilities. During our research over the past few years we have identified vulnerabilities in implementations such as txt message spoofing, subscriber enumeration, location determination (leakage of cell-ID and LAC), IMEI leakage and a potential SIM-card sharing attack.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk we will begin with a little historic stroll of phone phreaking through notable events and discoveries over the years. Bridging the narrative over the last few decades, new technologies such as VoIP, Volte, and VoWiFi are introduced, explaining the 4G and VoLTE infrastructure components and protocols. Next, on a rooted Android phone, we will show what control the user has over the VoLTE stack using some standard tools and the IPv6 stack. This includes hidden activities in Android and extraction of IPsec keys from the VoLTE stack. We will show that it is possible to import keys to Wireshark and monitor the IPv6 SIP traffic and components. Finally, examples of the vulnerabilities in implementations such as txt message spoofing, subscriber enumeration, location determination (leakage of cell-ID and LAC), IMEI leakage and a potential SIM-card sharing attack will be explained.&amp;lt;br&amp;gt;&lt;br /&gt;
Yes, a slightly technical nugget of knowledge, yet very accessible and a lot of fun!&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Importance of presentation for involved audience'''&amp;lt;br&amp;gt;&lt;br /&gt;
The phone systems of the world have always been of interest to everyone: from users who expect privacy, to intelligence agencies who want access. The privacy, integrity and confidentiality of voice communications over telecommunication networks is therefore of interest to anyone who uses mobile phones (i.e.: everyone). It is also typically a closed subject with very little research being done, relative to other security topics such as malware and application vulnerabilities. The combination of little research and high impact on everyone, makes that this topic deserves much more attention than it currently does. The VoLTE weaknesses we will describe are implementation dependent, and largely unpublished (i.e. new).&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Ralph Moonen CISSP is Technical Director at Secura. Ralph is an old-school ethical hacker with 3 decades of experience as penetration tester, IT-auditor and security consultant. Now, as Technical Director, he is responsible for topics such as R&amp;amp;D and technical projects at Secura.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1130&amp;quot;&amp;gt;When Serverless Met Security… Serverless Security &amp;amp; Functions-as-a-Service (FaaS) by Niels Tanis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Serverless is a design pattern for writing scalable applications in which Functions as a Service (FaaS) is one of the key building blocks. Every mayor Cloud Provider has got his own FaaS available. On Microsoft Azure there is Azure Functions, AWS has got Lambda and Cloud Functions can be used on the Google Cloud. All of these have a lot of similarities in the way they allow developers to create small event driven services. &amp;lt;br&amp;gt;&lt;br /&gt;
From security perspective there are a lot of benefits when moving to a serverless architecture. There is no need to manage any of the machines and the underlying infrastructure. Dealing with updates, patches and infrastructure is the responsibility of the platform provider. FaaS are short lived processes which will be instantiated and destroyed in a matter of milliseconds making it more resilient to denial-of-services (DoS) and also makes it harder to attack and compromise. &amp;lt;br&amp;gt;&lt;br /&gt;
But will all of this be sufficient to be ’secure’ or should we be worried about more? With serverless there is still a piece of software that will be developed, build, deployed and executed. It will also introduce a more complex architecture with corresponding attack surface which also makes it hard to monitor. What about the software supply chain and delivery pipeline? There still will be a need to patch your software for vulnerabilities in code and used 3rd party libraries. In this talk we will identify the security area’s we do need to focus on when developing serverless and define possible solutions for dealing with those problems.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Niels Tanis has got a background in .NET development, pentesting and security consultancy. He also holds the CSSLP certification and has been involved in breaking, defending and building secure applications. He joined Veracode in 2015 and right now he works as a security researcher on a variant of languages and technologies related to Veracode’s Binary Static Analysis service. He is married, father of 2 and lives in a small village just outside Amersfoort, The Netherlands.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1215&amp;quot;&amp;gt;OWASP Zap by David Scrobonia&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Intoducing security testing tools to a QA or developers workflow can be difficult when the tools aren't easy or intuitive to use. Even for security professionals, the friction of cumbersome security tooling can prevent them from getting the most from a tool or being effective with their time.&amp;lt;br&amp;gt;&lt;br /&gt;
The OWASP ZAP team is working to help enable developers, QA, and hackers alike with the ZAP Heads Up Display, a more user friendly way to engage with the security testing tool. The Heads Up Displays integrates ZAP directly in the browser providing all of the funcitonality of the tool via a heads up display. The goal is to make ZAP more accessible and enabling users, especially developers, to integrate security in their daily workflows.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk will discuss the importance of usable tools, design tradeoffs made to improve usability, the various browser technologies powering the HUD, and how you can start hacking with a heads up display.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
David Scrobonia is a part of the Security Engineering team at Segment working to secure modern web apps and AWS infrastructure. He contributes to open source in his spare time and is a core team member of the OWASP ZAP project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1400&amp;quot;&amp;gt;Juice Shop: OWASP's most broken Flagship by Björn Kimminich&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
OWASP Juice Shop is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and many more severe security flaws. In this talk, you'll learn about this open-source project and its capabilities first-hand from its creator. Join a “happy shopper round trip,” enjoy a hacking demo of some of the built-in challenges, witness how to re-theme the Juice Shop into a security awareness booster for your own company, and learn how to set it up for a capture-the-flag (CTF) event in less than 5 minutes!&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
Björn Kimminich is responsible for global IT architecture and application security at Kuehne + Nagel. On the side, he gives IT security lectures at the non-profit private university Nordakademie. Björn also is the project leader of the OWASP Juice Shop and a board member for the German OWASP chapter. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:GitHub-Mark_no_background.png|25px|link=https://github.com/bkimminich|GitHub]]&lt;br /&gt;
[[File:TwitterLogo.png|25px|link=http://twitter.com/bkimminich|Twitter]]&lt;br /&gt;
[[File:LinkedinSquareLogo.png|25px|link=https://www.linkedin.com/in/bkimminich|LinkedIn]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1445&amp;quot;&amp;gt;Leaky Processors: Stealing Your Secrets with Foreshadow by Jo Van Bulck&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
For decades, memory isolation has been one of the key principles of&lt;br /&gt;
secure system design. The recent wave of speculative execution attacks,&lt;br /&gt;
including Meltdown, Spectre, and Foreshadow abruptly showed, however,&lt;br /&gt;
that performance optimizations in modern processors fundamentally&lt;br /&gt;
undermine application security.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk will review how speculative execution attacks work. What makes&lt;br /&gt;
them dangerous, and why they require a paradigm shift in the way we&lt;br /&gt;
think about application security. The talk will have a special focus on&lt;br /&gt;
the recently disclosed Foreshadow CPU vulnerability, which led to a&lt;br /&gt;
complete collapse of state-of-the-art Intel SGX technology, and&lt;br /&gt;
necessitated hardware and software patches for all major operating&lt;br /&gt;
systems and virtual machine hypervisors.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jo Van Bulck is a PhD researcher at imec-DistriNet, KU Leuven, where he&lt;br /&gt;
investigates hardware-level trusted computing from an integrated attack&lt;br /&gt;
and defense perspective. His work resulted in a.o., the high-impact&lt;br /&gt;
Foreshadow CPU vulnerability announced in August 2018, and several&lt;br /&gt;
open-source secure processor prototypes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1600&amp;quot;&amp;gt;Fast forwarding Mobile Security with the MSTG by Jeroen Willemsen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
After the startup of the mobile security project in 2010, the mobile security project and its testing guides have seen quiet some evolution. All of this changed quiet intensively when, in 2016, the Mobile Application Security Verification Standard (MASVS) and the Mobile Application Security Testing Guide (MSTG) were created. Now, two years fast forward: where are we now? How can you use it as a pentester or a developer? We will start with introducing the current state of the MSTG and its side-projects and then show various demos on iOS and Android.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jeroen Willemsen is a Principal Security Architect at Xebia. With a love for mobile security, he recently became one of the projectleaders for the OMTG project (MASV &amp;amp; MSTG). Jeroen is more or less a jack of all trades with interest in infrastructure security, risk management and application security.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1645&amp;quot;&amp;gt;Lessons From The Legion (The OWASP BeNeLux Remix) by Nick Drage&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Look at your job, your colleagues, your industry. Very smart people, working very hard... and yet it feels like we're losing.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Why?''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Cyber security has always been a technology driven, engineer led industry - self-taught practitioners have chosen tactics and point solutions based on what fits in with their preferred ways of working and studying. We need better strategies to make use of those tactics. We can learn those strategies from other contexts and conflicts to improve our own methods and practices.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Would you like to start winning?''&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
Nick is the Director of Path Dependence Limited, and has over two decades of experience in the cyber security field… previously he was &amp;quot;SecOps” before the term was invented, as well as having been a SysAdmin, PCI QSA, pre-sales analyst, CHECK Team Leader, and various other less well defined roles. Nick is currently a Cyber Security Consultant and Penetration Tester, with occasional forays into being a Wargame Umpire, Adversarial Analyst, or Professional Wildcard.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;CyberWayFinder&amp;quot;&amp;gt;Women in cybersecurity (CyberWayFinder)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
OWASP BeNeLux and CyberWayFinder would like to invite you to a '''breakfast with other women in cybersecurity'''.&amp;lt;br&amp;gt;&lt;br /&gt;
Since women make up 7% of the cybersecurity work force, they are a rare breed, and don't often meet each other. That is why &amp;quot;women in cybersecurity breakfasts&amp;quot; are popping up in conferences around the world.&lt;br /&gt;
A small gathering with the women who will be present at our OWASP conference in the morning provides an excellent network opportunity to meet one another. We'll make sure you don't start out the day on an empty stomach, and provide you with some contacts, without missing out on the rest of the conference.&amp;lt;br&amp;gt;&lt;br /&gt;
join us as of 08h30 at Lamot conference center, and also hear about the CyberWayFinder training program which is being created to help women transition their career into cybersecurity.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
'''The Social Event is on Thursday, November 29th'''&lt;br /&gt;
&lt;br /&gt;
The social event will be a unique opportunity to meet some of the trainers and speakers, as well the organisers or even peers.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The social event will take place in restaurant [http://www.puro-mechelen.be/english Puro Mechelen], a couple of minutes from the conference center, on Thursday 29/11 at 19h00.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
There is a fixed group menu (meat or fish) for '''59€/person''', drinks included.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Link to the [https://static1.squarespace.com/static/53bedc63e4b051fad94ee1f7/t/59b7d81ea803bbc8f65d85ee/1505220639318/Puro-groepsmenu.pdf Menus] (page 1), and the [https://static1.squarespace.com/static/53bedc63e4b051fad94ee1f7/t/54b57100e4b0ab0673e80e8d/1421177088856/drankenformules.doc.pdf drinks].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Any participant pays individually. &amp;lt;br&amp;gt;Reservation via the form you'll receive after conference registration is mandatory.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''If you want to join the social event, don't forget to register for it via the registration:'''&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |200px|alt=Register for the OWASP BeNeLux Day 2018 | Register for the OWASP BeNeLux Day 2018 ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Address: TBD&lt;br /&gt;
&lt;br /&gt;
Menu:TBD&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
''' Become a sponsor of OWASP BeNeLux! '''&lt;br /&gt;
&lt;br /&gt;
There are 3 combined sponsorship packages (Gold, Silver or Bronze) that cover the BeNeLux chapter meetings 2019 and the BeNeLux OWASP Days 2018.&lt;br /&gt;
&lt;br /&gt;
Download our [https://www.owasp.org/images/8/8e/OWASP_BeNeLux_2018_Sponsorship_Form_v20181004.pdf sponsor brochure] and contact [mailto:seba@owasp.org us] for questions or sponsorship confirmation!&lt;br /&gt;
&lt;br /&gt;
Your sponsorship will be invested directly in the chapter meetings, supporting speaker and catering expenses. &lt;br /&gt;
&lt;br /&gt;
The sponsorship will also be dedicated to cover the costs of the OWASP 2018 BeNeLux event.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
&lt;br /&gt;
==== Gold ====&lt;br /&gt;
&lt;br /&gt;
[[File:DavinsiLabs.png|250px|link=https://www.davinsilabs.com]]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Silver ====&lt;br /&gt;
&lt;br /&gt;
[[File:LogoIngenicoGroup.png|250px|link=https://ingenico.be]]&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:LogoSynopsys.png|250px|link=https://www.synopsys.com]]&lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|250px|link=http://www.nviso.be]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Bronze ====&lt;br /&gt;
&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] &lt;br /&gt;
[[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Days_2018&amp;diff=244600</id>
		<title>OWASP BeNeLux-Days 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Days_2018&amp;diff=244600"/>
				<updated>2018-10-24T13:17:00Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: requirements of Training 3&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OBNL18 Banner v2.png]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
== Keynote Speaker ==&lt;br /&gt;
&lt;br /&gt;
{{#switchtablink:Conference Day|&amp;lt;p&amp;gt;&lt;br /&gt;
*  TBD&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== Confirmed Conference Speakers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--{{#switchtablink:Conference_Day|&amp;lt;p&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* David Scrobonia&lt;br /&gt;
* Niels Tanis&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Björn Kimminich&lt;br /&gt;
* Ralph Moonen&lt;br /&gt;
* Jo Van Bulck&lt;br /&gt;
* Lennert Wouters&lt;br /&gt;
* Nick Drage&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed Trainers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
{{#switchtablink:Training Day|&amp;lt;p&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* Andrew Martin&lt;br /&gt;
* David Scrobonia&lt;br /&gt;
* Jeroen Beckers - Stephanie Vanroelen&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |alt=Register NOW! | Register NOW! ]]&lt;br /&gt;
&lt;br /&gt;
'''To support the OWASP organisation, consider to become a member, it's only US$50! Check out the [[Membership]] page to find out more.'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
&lt;br /&gt;
*Sebastien Deleersnyder / Lieven Desmet / David Mathy / Thomas Herlea / Stella Dineva / Adolfo Solero / Bart De Win, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Joren Poll / Edwin Goweling, OWASP Netherlands&lt;br /&gt;
*OWASP Luxembourg&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl17 #owaspbnl18]&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference and training days are free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |alt=Register NOW! | Register NOW! ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''To support the OWASP organisation, consider to become a member, it's only US$50! Check out the [[Membership]] page to find out more.''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Address ==&lt;br /&gt;
&lt;br /&gt;
Venue:&lt;br /&gt;
&lt;br /&gt;
 '''Congres- en Erfgoedcentrum Lamot'''&lt;br /&gt;
 Van Beethovenstraat 8-10&lt;br /&gt;
 2800 Mechelen&lt;br /&gt;
 Belgium&lt;br /&gt;
&lt;br /&gt;
[https://goo.gl/maps/gZ9icR178w52 Google map]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
[[File:Mechelen-Lamot.jpg|350px|Lamot conference center]]&lt;br /&gt;
[[File:Mechelen-lamot-center-auditorium.jpg|350px|Auditorium]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Parking:&amp;lt;br /&amp;gt;&lt;br /&gt;
[[File:Parking lots around Lamot Conference center Mechelen.png|500px|Parking facilities]]&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://goo.gl/maps/Q5TD7hoTuUu Find your parking on Google Maps]&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== Public transport ====&lt;br /&gt;
&lt;br /&gt;
You can reach the Mechelen's train station from Antwerpen or Brussels.&lt;br /&gt;
The Lamot conference center is 10 min away by bus (line 1).&lt;br /&gt;
&lt;br /&gt;
Or you can choose to walk for 15 min (1.2 km).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
&lt;br /&gt;
===== From Brussels: =====&lt;br /&gt;
Follow the E19 Brussels / Antwerpen and take the exit 10. &amp;lt;br&amp;gt; Follow the N1 until the R12 (take a left) and turn to the right at the &amp;quot;Brusselpoort&amp;quot; into the Hoogstraat to reach one of the parkings.&lt;br /&gt;
&lt;br /&gt;
===== From Antwerpen: =====&lt;br /&gt;
Follow the E19 Brussels / Antwerpen and take the exit 9. &amp;lt;br&amp;gt; Follow the N16 until the R12 (take a right) and turn to the left at the &amp;quot;Brusselpoort&amp;quot; into the Hoogstraat to reach one of the parkings. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Hotels Nearby ===&lt;br /&gt;
[https://www.google.com/maps/d/viewer?mid=1eYMYmwXKuAsTilKgpAtyYtfMA7A&amp;amp;ll=51.02648134397288%2C4.47819800000002&amp;amp;z=15 Hotels around the Lamot conference center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
= Training Day =&lt;br /&gt;
&lt;br /&gt;
'''Training Day is November 29th'''&lt;br /&gt;
== Agenda==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Training 1 !! Training 2 !! Training 3&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_1 | Kubernetes security]] by Andrew Martin&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_2 | OWASP Zap Training]] by David Scrobonia&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_3 | Android security workshop]] by Jeroen Beckers &amp;amp; Stephanie Vanroelen&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;Choose the most appropriate training as they will be hosted at the same time.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Trainings ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_1&amp;quot;&amp;gt;Training 1 - Kubernetes security by Andrew Martin&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
===== Course Description =====&lt;br /&gt;
The course guides attendees through Linux container security in general, and progresses to advanced Kubernetes cluster security. It emphasises pragmatic threat modelling and risk assessment based on an understanding of the tools and primitives available, rather than dogmatic dos and don’ts.&lt;br /&gt;
&lt;br /&gt;
===== Course Outline =====&lt;br /&gt;
* How to attack containerised workloads&lt;br /&gt;
* Enhanced container security&lt;br /&gt;
* How to attack Kubernetes&lt;br /&gt;
* Interactive production cluster hacking&lt;br /&gt;
* Hardening Kubernetes&lt;br /&gt;
* Locking down applications&lt;br /&gt;
* Security tooling and vendor landscape&lt;br /&gt;
&lt;br /&gt;
===== Who Should Attend =====&lt;br /&gt;
This course is suitable for intermediate to advanced Kubernetes users who want to strengthen their security understanding. It is particularly beneficial for those operating Kubernetes in a high-compliance domain, or for established security professionals looking to update their skills for the cloud native world.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Andrew has a strong test-first engineering ethos gained architecting and deploying high-traffic web applications. Proficient in systems development, testing, and maintenance, he is comfortable profiling and securing every tier of a bare metal or cloud native application, and has battle-hardened experience delivering containerised solutions to enterprise clients. He is a co-founder at https://control-plane.io&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_2&amp;quot;&amp;gt;Training 2 - OWASP Zap Training by David Scrobonia&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
This hands on course will start with the basics of using ZAP attack proxy and finish with leveraging it's API to integrate ZAP within you CI/CD processes. Along the way we will be practicing techniques by attacking the OWASP JuiceShop, an intentionally vulnerable web application. &lt;br /&gt;
&lt;br /&gt;
==== Audience ====&lt;br /&gt;
&lt;br /&gt;
This couse is designed for both new and experienced users. No knowledge or experience with ZAP is required, but even those familiar with ZAP will learn something new.&lt;br /&gt;
&lt;br /&gt;
==== Contents ====&lt;br /&gt;
# Basic Techniques &amp;amp; Manual Testing &lt;br /&gt;
# Advanced Techniques &amp;amp; Automated Testing&lt;br /&gt;
# Scripting with ZAP&lt;br /&gt;
# Using ZAP within your CI/CD Pipeline&lt;br /&gt;
 &lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
David Scrobonia is a part of the Security Engineering team at Segment working to secure modern web apps and AWS infrastructure. He contributes to open source in his spare time and is a core team member of the OWASP ZAP project.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_3&amp;quot;&amp;gt;Training 3 - Android security workshop by Jeroen Beckers &amp;amp; Stephanie Vanroelen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
In this workshop, participants will come in contact with the basics of&lt;br /&gt;
Android application security. Through hands-on exercises, Jeroen and&lt;br /&gt;
Stephanie will show which mistakes can be made, both at the design and&lt;br /&gt;
implementation level, that can compromise the security of both the&lt;br /&gt;
application and the backend server. Although no real prior experience&lt;br /&gt;
with Android is needed, some basic knowledge on programming is advised.&lt;br /&gt;
&lt;br /&gt;
==== Participation requirements ====&lt;br /&gt;
* Basic linux / terminal knowledge&lt;br /&gt;
* Be able to understand the OWASP Top 10 (Not Mobile)&lt;br /&gt;
* Laptop with VirtualBox / VMWare (At least 8GB of RAM)&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jeroen Beckers is a security researcher at NVISO. He focusses mainly on&lt;br /&gt;
mobile applications for Android/iOS and sometimes even Windows Phone&lt;br /&gt;
(yes, some people actually use it!). Apart from breaking mobile&lt;br /&gt;
applications, he also gives security trainings and presentations at&lt;br /&gt;
conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Stephanie Vanroelen is an IT security consultant currently focussing on Web and&lt;br /&gt;
Mobile Application Security. Her experiences in organizing IT Security&lt;br /&gt;
conferences such as BruCON and CyberSKool help her with project&lt;br /&gt;
management and communication skills. In her free time she pretends to be&lt;br /&gt;
Godzilla :).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Day =&lt;br /&gt;
&lt;br /&gt;
'''Conference Day is November 30th'''&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;190pt&amp;quot; | Speaker &lt;br /&gt;
! width=&amp;quot;400pt&amp;quot; | Topic&lt;br /&gt;
&amp;lt;!-- ! width=&amp;quot;100pt&amp;quot; -- ! | Media --&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h15&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 09h30&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Opening''&lt;br /&gt;
|- &lt;br /&gt;
| 09h30 - 10h15&lt;br /&gt;
| [[#TALK_0930 | Lennert Wouters]]&lt;br /&gt;
| [[#TALK_0930 | Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_0915_SLIDES|Slides]] [TALK_0915_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 11h00&lt;br /&gt;
| [[#TALK_1015 | Ralph Moonen]]&lt;br /&gt;
| [[#TALK_1015 | Weaknesses in our voice communications network: from Blue Boxing to VoLTE]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1000_SLIDES|Slides]] [TALK_1000_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h15&lt;br /&gt;
| [[#TALK_1130 | Niels Tanis]]&lt;br /&gt;
| [[#TALK_1130 | When Serverless Met Security… Serverless Security &amp;amp; Functions-as-a-Service (FaaS)]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1115_SLIDES|Slides]] [TALK_1115_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h15 - 13h00&lt;br /&gt;
| [[#TALK_1215 | David Scrobonia]]&lt;br /&gt;
| [[#TALK_1215 | OWASP Zap]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1200_SLIDES|Slides]] [TALK_1200_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 14h45&lt;br /&gt;
| [[#TALK_1400 | Björn Kimminich]]&lt;br /&gt;
| [[#TALK_1400 | Juice Shop: OWASP's most broken Flagship]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1345_SLIDES|Slides]] [TALK_1345_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h45 - 15h30&lt;br /&gt;
| [[#TALK_1445 | Jo Van Bulck]]&lt;br /&gt;
| [[#TALK_1445 | Leaky Processors: Stealing Your Secrets with Foreshadow]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1430_SLIDES|Slides]] [TALK_1430_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Afternoon Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 16h45&lt;br /&gt;
| [[#TALK_1600 | Jeroen Willemsen]]&lt;br /&gt;
| [[#TALK_1600 | Fast forwarding Mobile Security with the MSTG]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1545_SLIDES|Slides]] [TALK_1545_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 16h45 - 17h30&lt;br /&gt;
| [[#TALK_1645 | Nick Drage]]&lt;br /&gt;
| [[#TALK_1645 | Lessons from the legion]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1630_SLIDES|Slides]] [TALK_1630_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 17h30 - 17h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Closing'' &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_0930&amp;quot;&amp;gt;Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars by Lennert Wouters&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
The security of immobiliser and Remote Keyless Entry systems has been extensively studied over the past years. Passive Keyless Entry and Start systems, which are currently deployed in luxury vehicles, have not received as much attention.&lt;br /&gt;
During this presentation we will share the techniques used in reverse engineering the Tesla Model S Passive Keyless Entry and Start system. We will discuss multiple security weaknesses in the system including the use of an inadequate proprietary cipher using 40-bit keys, the lack of mutual authentication in the challenge-response protocol, hardware configuration mistakes and the absence of security partitioning.&amp;lt;br&amp;gt;&lt;br /&gt;
We verified our findings by implementing a proof of concept attack allowing us to clone a Tesla Model S key fob in a matter of seconds with low cost commercial off the shelf equipment.&amp;lt;br&amp;gt;&lt;br /&gt;
Finally, we will share our experience with the responsible disclosure of these finding to Tesla Motors and other likely affected manufacturers such as McLaren, Karma Automotive and Triumph Motorcycles as they all use the same system developed by Pektron.&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
Lennert Wouters is a PhD researcher at the Computer Security and Industrial Cryptography (COSIC) research group at KU Leuven. His research interests involve hardware security of connected embedded devices and side channel attacks.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1015&amp;quot;&amp;gt;Weaknesses in our voice communications network: from Blue Boxing to VoLTE by Ralph Moonen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Voice over 4G, or VoLTE, brings back the phreaking 80's. Once again, after 3 decades, the signaling path of telephony is accessible to end users. No more R1, R2, C4 or C5 however: we now have SIP. As it turns out, the implementations of SIP and VoLTE in various European providers' 4G infrastructures, open up a host of possibilities. During our research over the past few years we have identified vulnerabilities in implementations such as txt message spoofing, subscriber enumeration, location determination (leakage of cell-ID and LAC), IMEI leakage and a potential SIM-card sharing attack.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk we will begin with a little historic stroll of phone phreaking through notable events and discoveries over the years. Bridging the narrative over the last few decades, new technologies such as VoIP, Volte, and VoWiFi are introduced, explaining the 4G and VoLTE infrastructure components and protocols. Next, on a rooted Android phone, we will show what control the user has over the VoLTE stack using some standard tools and the IPv6 stack. This includes hidden activities in Android and extraction of IPsec keys from the VoLTE stack. We will show that it is possible to import keys to Wireshark and monitor the IPv6 SIP traffic and components. Finally, examples of the vulnerabilities in implementations such as txt message spoofing, subscriber enumeration, location determination (leakage of cell-ID and LAC), IMEI leakage and a potential SIM-card sharing attack will be explained.&amp;lt;br&amp;gt;&lt;br /&gt;
Yes, a slightly technical nugget of knowledge, yet very accessible and a lot of fun!&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Importance of presentation for involved audience'''&amp;lt;br&amp;gt;&lt;br /&gt;
The phone systems of the world have always been of interest to everyone: from users who expect privacy, to intelligence agencies who want access. The privacy, integrity and confidentiality of voice communications over telecommunication networks is therefore of interest to anyone who uses mobile phones (i.e.: everyone). It is also typically a closed subject with very little research being done, relative to other security topics such as malware and application vulnerabilities. The combination of little research and high impact on everyone, makes that this topic deserves much more attention than it currently does. The VoLTE weaknesses we will describe are implementation dependent, and largely unpublished (i.e. new).&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Ralph Moonen CISSP is Technical Director at Secura. Ralph is an old-school ethical hacker with 3 decades of experience as penetration tester, IT-auditor and security consultant. Now, as Technical Director, he is responsible for topics such as R&amp;amp;D and technical projects at Secura.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1130&amp;quot;&amp;gt;When Serverless Met Security… Serverless Security &amp;amp; Functions-as-a-Service (FaaS) by Niels Tanis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Serverless is a design pattern for writing scalable applications in which Functions as a Service (FaaS) is one of the key building blocks. Every mayor Cloud Provider has got his own FaaS available. On Microsoft Azure there is Azure Functions, AWS has got Lambda and Cloud Functions can be used on the Google Cloud. All of these have a lot of similarities in the way they allow developers to create small event driven services. &amp;lt;br&amp;gt;&lt;br /&gt;
From security perspective there are a lot of benefits when moving to a serverless architecture. There is no need to manage any of the machines and the underlying infrastructure. Dealing with updates, patches and infrastructure is the responsibility of the platform provider. FaaS are short lived processes which will be instantiated and destroyed in a matter of milliseconds making it more resilient to denial-of-services (DoS) and also makes it harder to attack and compromise. &amp;lt;br&amp;gt;&lt;br /&gt;
But will all of this be sufficient to be ’secure’ or should we be worried about more? With serverless there is still a piece of software that will be developed, build, deployed and executed. It will also introduce a more complex architecture with corresponding attack surface which also makes it hard to monitor. What about the software supply chain and delivery pipeline? There still will be a need to patch your software for vulnerabilities in code and used 3rd party libraries. In this talk we will identify the security area’s we do need to focus on when developing serverless and define possible solutions for dealing with those problems.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Niels Tanis has got a background in .NET development, pentesting and security consultancy. He also holds the CSSLP certification and has been involved in breaking, defending and building secure applications. He joined Veracode in 2015 and right now he works as a security researcher on a variant of languages and technologies related to Veracode’s Binary Static Analysis service. He is married, father of 2 and lives in a small village just outside Amersfoort, The Netherlands.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1215&amp;quot;&amp;gt;OWASP Zap by David Scrobonia&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Intoducing security testing tools to a QA or developers workflow can be difficult when the tools aren't easy or intuitive to use. Even for security professionals, the friction of cumbersome security tooling can prevent them from getting the most from a tool or being effective with their time.&amp;lt;br&amp;gt;&lt;br /&gt;
The OWASP ZAP team is working to help enable developers, QA, and hackers alike with the ZAP Heads Up Display, a more user friendly way to engage with the security testing tool. The Heads Up Displays integrates ZAP directly in the browser providing all of the funcitonality of the tool via a heads up display. The goal is to make ZAP more accessible and enabling users, especially developers, to integrate security in their daily workflows.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk will discuss the importance of usable tools, design tradeoffs made to improve usability, the various browser technologies powering the HUD, and how you can start hacking with a heads up display.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
David Scrobonia is a part of the Security Engineering team at Segment working to secure modern web apps and AWS infrastructure. He contributes to open source in his spare time and is a core team member of the OWASP ZAP project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1400&amp;quot;&amp;gt;Juice Shop: OWASP's most broken Flagship by Björn Kimminich&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
OWASP Juice Shop is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and many more severe security flaws. In this talk, you'll learn about this open-source project and its capabilities first-hand from its creator. Join a “happy shopper round trip,” enjoy a hacking demo of some of the built-in challenges, witness how to re-theme the Juice Shop into a security awareness booster for your own company, and learn how to set it up for a capture-the-flag (CTF) event in less than 5 minutes!&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
Björn Kimminich is responsible for global IT architecture and application security at Kuehne + Nagel. On the side, he gives IT security lectures at the non-profit private university Nordakademie. Björn also is the project leader of the OWASP Juice Shop and a board member for the German OWASP chapter. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:GitHub-Mark_no_background.png|25px|link=https://github.com/bkimminich|GitHub]]&lt;br /&gt;
[[File:TwitterLogo.png|25px|link=http://twitter.com/bkimminich|Twitter]]&lt;br /&gt;
[[File:LinkedinSquareLogo.png|25px|link=https://www.linkedin.com/in/bkimminich|LinkedIn]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1445&amp;quot;&amp;gt;Leaky Processors: Stealing Your Secrets with Foreshadow by Jo Van Bulck&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
For decades, memory isolation has been one of the key principles of&lt;br /&gt;
secure system design. The recent wave of speculative execution attacks,&lt;br /&gt;
including Meltdown, Spectre, and Foreshadow abruptly showed, however,&lt;br /&gt;
that performance optimizations in modern processors fundamentally&lt;br /&gt;
undermine application security.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk will review how speculative execution attacks work. What makes&lt;br /&gt;
them dangerous, and why they require a paradigm shift in the way we&lt;br /&gt;
think about application security. The talk will have a special focus on&lt;br /&gt;
the recently disclosed Foreshadow CPU vulnerability, which led to a&lt;br /&gt;
complete collapse of state-of-the-art Intel SGX technology, and&lt;br /&gt;
necessitated hardware and software patches for all major operating&lt;br /&gt;
systems and virtual machine hypervisors.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jo Van Bulck is a PhD researcher at imec-DistriNet, KU Leuven, where he&lt;br /&gt;
investigates hardware-level trusted computing from an integrated attack&lt;br /&gt;
and defense perspective. His work resulted in a.o., the high-impact&lt;br /&gt;
Foreshadow CPU vulnerability announced in August 2018, and several&lt;br /&gt;
open-source secure processor prototypes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1600&amp;quot;&amp;gt;Fast forwarding Mobile Security with the MSTG by Jeroen Willemsen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
After the startup of the mobile security project in 2010, the mobile security project and its testing guides have seen quiet some evolution. All of this changed quiet intensively when, in 2016, the Mobile Application Security Verification Standard (MASVS) and the Mobile Application Security Testing Guide (MSTG) were created. Now, two years fast forward: where are we now? How can you use it as a pentester or a developer? We will start with introducing the current state of the MSTG and its side-projects and then show various demos on iOS and Android.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jeroen Willemsen is a Principal Security Architect at Xebia. With a love for mobile security, he recently became one of the projectleaders for the OMTG project (MASV &amp;amp; MSTG). Jeroen is more or less a jack of all trades with interest in infrastructure security, risk management and application security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1645&amp;quot;&amp;gt;Lessons from the legion by Nick Drage&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
'''The Social Event is on Thursday, November 29th'''&lt;br /&gt;
&lt;br /&gt;
'''If you want to join the social event, don't forget to register for it via the registration:'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |200px|alt=Register for the OWASP BeNeLux Day 2018 | Register for the OWASP BeNeLux Day 2018 ]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The social event details will be published very soon! Stay tuned.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Address: TBD&lt;br /&gt;
&lt;br /&gt;
Menu:TBD&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
''' Become a sponsor of OWASP BeNeLux! '''&lt;br /&gt;
&lt;br /&gt;
There are 3 combined sponsorship packages (Gold, Silver or Bronze) that cover the BeNeLux chapter meetings 2019 and the BeNeLux OWASP Days 2018.&lt;br /&gt;
&lt;br /&gt;
Download our [https://www.owasp.org/images/8/8e/OWASP_BeNeLux_2018_Sponsorship_Form_v20181004.pdf sponsor brochure] and contact [mailto:seba@owasp.org us] for questions or sponsorship confirmation!&lt;br /&gt;
&lt;br /&gt;
Your sponsorship will be invested directly in the chapter meetings, supporting speaker and catering expenses. &lt;br /&gt;
&lt;br /&gt;
The sponsorship will also be dedicated to cover the costs of the OWASP 2018 BeNeLux event.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
&lt;br /&gt;
==== Gold ====&lt;br /&gt;
&lt;br /&gt;
[[File:DavinsiLabs.png|250px|link=https://www.davinsilabs.com]]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Silver ====&lt;br /&gt;
&lt;br /&gt;
[[File:LogoIngenicoGroup.png|250px|link=https://ingenico.be]]&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:LogoSynopsys.png|250px|link=https://www.synopsys.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Bronze ====&lt;br /&gt;
&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] &lt;br /&gt;
[[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Days_2018&amp;diff=244463</id>
		<title>OWASP BeNeLux-Days 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Days_2018&amp;diff=244463"/>
				<updated>2018-10-23T09:22:42Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: opened registration&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:OBNL18 Banner v2.png]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
== Keynote Speaker ==&lt;br /&gt;
&lt;br /&gt;
{{#switchtablink:Conference Day|&amp;lt;p&amp;gt;&lt;br /&gt;
*  TBD&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== Confirmed Conference Speakers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--{{#switchtablink:Conference_Day|&amp;lt;p&amp;gt;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* David Scrobonia&lt;br /&gt;
* Niels Tanis&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
* Björn Kimminich&lt;br /&gt;
* Ralph Moonen&lt;br /&gt;
* Jo Van Bulck&lt;br /&gt;
* Lennert Wouters&lt;br /&gt;
* Nick Drage&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Confirmed Trainers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
{{#switchtablink:Training Day|&amp;lt;p&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* Andrew Martin&lt;br /&gt;
* David Scrobonia&lt;br /&gt;
* Jeroen Beckers - Stephanie Vanroelen&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
&lt;br /&gt;
Registration is not open yet. Please come back in a few days.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2018 | Register for the OWASP BeNeLux Day 2018 ]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
&lt;br /&gt;
*Sebastien Deleersnyder / Lieven Desmet / David Mathy / Thomas Herlea / Stella Dineva / Adolfo Solero / Bart De Win, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Joren Poll / Edwin Goweling, OWASP Netherlands&lt;br /&gt;
*OWASP Luxembourg&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl17 #owaspbnl18]&lt;br /&gt;
&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference and training days are free, but registration is required! ==&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Registration is not open yet. Please come back in a few days.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2018 | Register for the OWASP BeNeLux Day 2018 ]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://owasp-benelux-day-2018.eventbrite.com Register now!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''To support the OWASP organisation, consider to become a member, it's only US$50! Check out the [[Membership]] page to find out more.''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Address ==&lt;br /&gt;
&lt;br /&gt;
Venue:&lt;br /&gt;
&lt;br /&gt;
 '''Congres- en Erfgoedcentrum Lamot'''&lt;br /&gt;
 Van Beethovenstraat 8-10&lt;br /&gt;
 2800 Mechelen&lt;br /&gt;
 Belgium&lt;br /&gt;
&lt;br /&gt;
[https://goo.gl/maps/gZ9icR178w52 Google map]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
[[File:Mechelen-Lamot.jpg|350px|Lamot conference center]]&lt;br /&gt;
[[File:Mechelen-lamot-center-auditorium.jpg|350px|Auditorium]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Parking:&amp;lt;br /&amp;gt;&lt;br /&gt;
[[File:Parking lots around Lamot Conference center Mechelen.png|500px|Parking facilities]]&amp;lt;br /&amp;gt;&lt;br /&gt;
[https://goo.gl/maps/Q5TD7hoTuUu Find your parking on Google Maps]&lt;br /&gt;
&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
&lt;br /&gt;
==== Public transport ====&lt;br /&gt;
&lt;br /&gt;
You can reach the Mechelen's train station from Antwerpen or Brussels.&lt;br /&gt;
The Lamot conference center is 10 min away by bus (line 1).&lt;br /&gt;
&lt;br /&gt;
Or you can choose to walk for 15 min (1.2 km).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== By car ====&lt;br /&gt;
&lt;br /&gt;
===== From Brussels: =====&lt;br /&gt;
Follow the E19 Brussels / Antwerpen and take the exit 10. &amp;lt;br&amp;gt; Follow the N1 until the R12 (take a left) and turn to the right at the &amp;quot;Brusselpoort&amp;quot; into the Hoogstraat to reach one of the parkings.&lt;br /&gt;
&lt;br /&gt;
===== From Antwerpen: =====&lt;br /&gt;
Follow the E19 Brussels / Antwerpen and take the exit 9. &amp;lt;br&amp;gt; Follow the N16 until the R12 (take a right) and turn to the left at the &amp;quot;Brusselpoort&amp;quot; into the Hoogstraat to reach one of the parkings. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Hotels Nearby ===&lt;br /&gt;
[https://www.google.com/maps/d/viewer?mid=1eYMYmwXKuAsTilKgpAtyYtfMA7A&amp;amp;ll=51.02648134397288%2C4.47819800000002&amp;amp;z=15 Hotels around the Lamot conference center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
= Training Day =&lt;br /&gt;
&lt;br /&gt;
'''Training Day is November 29th'''&lt;br /&gt;
== Agenda==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Training 1 !! Training 2 !! Training 3&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_1 | Kubernetes security]] by Andrew Martin&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_2 | OWASP Zap Training]] by David Scrobonia&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#TRAINING_3 | Android security workshop]] by Jeroen Beckers &amp;amp; Stephanie Vanroelen&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;Choose the most appropriate training as they will be hosted at the same time.&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Trainings ==&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_1&amp;quot;&amp;gt;Training 1 - Kubernetes security by Andrew Martin&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
===== Course Description =====&lt;br /&gt;
The course guides attendees through Linux container security in general, and progresses to advanced Kubernetes cluster security. It emphasises pragmatic threat modelling and risk assessment based on an understanding of the tools and primitives available, rather than dogmatic dos and don’ts.&lt;br /&gt;
&lt;br /&gt;
===== Course Outline =====&lt;br /&gt;
* How to attack containerised workloads&lt;br /&gt;
* Enhanced container security&lt;br /&gt;
* How to attack Kubernetes&lt;br /&gt;
* Interactive production cluster hacking&lt;br /&gt;
* Hardening Kubernetes&lt;br /&gt;
* Locking down applications&lt;br /&gt;
* Security tooling and vendor landscape&lt;br /&gt;
&lt;br /&gt;
===== Who Should Attend =====&lt;br /&gt;
This course is suitable for intermediate to advanced Kubernetes users who want to strengthen their security understanding. It is particularly beneficial for those operating Kubernetes in a high-compliance domain, or for established security professionals looking to update their skills for the cloud native world.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Andrew has a strong test-first engineering ethos gained architecting and deploying high-traffic web applications. Proficient in systems development, testing, and maintenance, he is comfortable profiling and securing every tier of a bare metal or cloud native application, and has battle-hardened experience delivering containerised solutions to enterprise clients. He is a co-founder at https://control-plane.io&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_2&amp;quot;&amp;gt;Training 2 - OWASP Zap Training by David Scrobonia&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
This hands on course will start with the basics of using ZAP attack proxy and finish with leveraging it's API to integrate ZAP within you CI/CD processes. Along the way we will be practicing techniques by attacking the OWASP JuiceShop, an intentionally vulnerable web application. &lt;br /&gt;
&lt;br /&gt;
==== Audience ====&lt;br /&gt;
&lt;br /&gt;
This couse is designed for both new and experienced users. No knowledge or experience with ZAP is required, but even those familiar with ZAP will learn something new.&lt;br /&gt;
&lt;br /&gt;
==== Contents ====&lt;br /&gt;
# Basic Techniques &amp;amp; Manual Testing &lt;br /&gt;
# Advanced Techniques &amp;amp; Automated Testing&lt;br /&gt;
# Scripting with ZAP&lt;br /&gt;
# Using ZAP within your CI/CD Pipeline&lt;br /&gt;
 &lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
David Scrobonia is a part of the Security Engineering team at Segment working to secure modern web apps and AWS infrastructure. He contributes to open source in his spare time and is a core team member of the OWASP ZAP project.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TRAINING_3&amp;quot;&amp;gt;Training 3 - Android security workshop by Jeroen Beckers &amp;amp; Stephanie Vanroelen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
In this workshop, participants will come in contact with the basics of&lt;br /&gt;
Android application security. Through hands-on exercises, Jeroen and&lt;br /&gt;
Stephanie will show which mistakes can be made, both at the design and&lt;br /&gt;
implementation level, that can compromise the security of both the&lt;br /&gt;
application and the backend server. Although no real prior experience&lt;br /&gt;
with Android is needed, some basic knowledge on programming is advised.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jeroen Beckers is a security researcher at NVISO. He focusses mainly on&lt;br /&gt;
mobile applications for Android/iOS and sometimes even Windows Phone&lt;br /&gt;
(yes, some people actually use it!). Apart from breaking mobile&lt;br /&gt;
applications, he also gives security trainings and presentations at&lt;br /&gt;
conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Stephanie Vanroelen is an IT security consultant currently focussing on Web and&lt;br /&gt;
Mobile Application Security. Her experiences in organizing IT Security&lt;br /&gt;
conferences such as BruCON and CyberSKool help her with project&lt;br /&gt;
management and communication skills. In her free time she pretends to be&lt;br /&gt;
Godzilla :).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conference Day =&lt;br /&gt;
&lt;br /&gt;
'''Conference Day is November 30th'''&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;190pt&amp;quot; | Speaker &lt;br /&gt;
! width=&amp;quot;400pt&amp;quot; | Topic&lt;br /&gt;
&amp;lt;!-- ! width=&amp;quot;100pt&amp;quot; -- ! | Media --&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h15&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 09h30&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Opening''&lt;br /&gt;
|- &lt;br /&gt;
| 09h30 - 10h15&lt;br /&gt;
| [[#TALK_0930 | Nick Drage]]&lt;br /&gt;
| [[#TALK_0930 | Lessons from the legion]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_0915_SLIDES|Slides]] [TALK_0915_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 11h00&lt;br /&gt;
| [[#TALK_1015 | Ralph Moonen]]&lt;br /&gt;
| [[#TALK_1015 | Weaknesses in our voice communications network: from Blue Boxing to VoLTE]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1000_SLIDES|Slides]] [TALK_1000_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h15&lt;br /&gt;
| [[#TALK_1130 | Niels Tanis]]&lt;br /&gt;
| [[#TALK_1130 | When Serverless Met Security… Serverless Security &amp;amp; Functions-as-a-Service (FaaS)]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1115_SLIDES|Slides]] [TALK_1115_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h15 - 13h00&lt;br /&gt;
| [[#TALK_1215 | David Scrobonia]]&lt;br /&gt;
| [[#TALK_1215 | OWASP Zap]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1200_SLIDES|Slides]] [TALK_1200_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 14h45&lt;br /&gt;
| [[#TALK_1400 | Björn Kimminich]]&lt;br /&gt;
| [[#TALK_1400 | Juice Shop: OWASP's most broken Flagship]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1345_SLIDES|Slides]] [TALK_1345_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h45 - 15h30&lt;br /&gt;
| [[#TALK_1445 | Jo Van Bulck]]&lt;br /&gt;
| [[#TALK_1445 | Leaky Processors: Stealing Your Secrets with Foreshadow]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1430_SLIDES|Slides]] [TALK_1430_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Afternoon Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 16h45&lt;br /&gt;
| [[#TALK_1600 | Jeroen Willemsen]]&lt;br /&gt;
| [[#TALK_1600 | Fast forwarding Mobile Security with the MSTG]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1545_SLIDES|Slides]] [TALK_1545_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 16h45 - 17h30&lt;br /&gt;
| [[#TALK_1645 | Lennert Wouters]]&lt;br /&gt;
| [[#TALK_1645 | Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars]]&lt;br /&gt;
&amp;lt;!--| [[Media:TALK_1630_SLIDES|Slides]] [TALK_1630_VIDEO Video]--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 17h30 - 17h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Closing'' &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_0930&amp;quot;&amp;gt;Lessons from the legion by Nick Drage&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1015&amp;quot;&amp;gt;Weaknesses in our voice communications network: from Blue Boxing to VoLTE by Ralph Moonen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Voice over 4G, or VoLTE, brings back the phreaking 80's. Once again, after 3 decades, the signaling path of telephony is accessible to end users. No more R1, R2, C4 or C5 however: we now have SIP. As it turns out, the implementations of SIP and VoLTE in various European providers' 4G infrastructures, open up a host of possibilities. During our research over the past few years we have identified vulnerabilities in implementations such as txt message spoofing, subscriber enumeration, location determination (leakage of cell-ID and LAC), IMEI leakage and a potential SIM-card sharing attack.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk we will begin with a little historic stroll of phone phreaking through notable events and discoveries over the years. Bridging the narrative over the last few decades, new technologies such as VoIP, Volte, and VoWiFi are introduced, explaining the 4G and VoLTE infrastructure components and protocols. Next, on a rooted Android phone, we will show what control the user has over the VoLTE stack using some standard tools and the IPv6 stack. This includes hidden activities in Android and extraction of IPsec keys from the VoLTE stack. We will show that it is possible to import keys to Wireshark and monitor the IPv6 SIP traffic and components. Finally, examples of the vulnerabilities in implementations such as txt message spoofing, subscriber enumeration, location determination (leakage of cell-ID and LAC), IMEI leakage and a potential SIM-card sharing attack will be explained.&amp;lt;br&amp;gt;&lt;br /&gt;
Yes, a slightly technical nugget of knowledge, yet very accessible and a lot of fun!&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Importance of presentation for involved audience'''&amp;lt;br&amp;gt;&lt;br /&gt;
The phone systems of the world have always been of interest to everyone: from users who expect privacy, to intelligence agencies who want access. The privacy, integrity and confidentiality of voice communications over telecommunication networks is therefore of interest to anyone who uses mobile phones (i.e.: everyone). It is also typically a closed subject with very little research being done, relative to other security topics such as malware and application vulnerabilities. The combination of little research and high impact on everyone, makes that this topic deserves much more attention than it currently does. The VoLTE weaknesses we will describe are implementation dependent, and largely unpublished (i.e. new).&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Ralph Moonen CISSP is Technical Director at Secura. Ralph is an old-school ethical hacker with 3 decades of experience as penetration tester, IT-auditor and security consultant. Now, as Technical Director, he is responsible for topics such as R&amp;amp;D and technical projects at Secura.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1130&amp;quot;&amp;gt;When Serverless Met Security… Serverless Security &amp;amp; Functions-as-a-Service (FaaS) by Niels Tanis&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Serverless is a design pattern for writing scalable applications in which Functions as a Service (FaaS) is one of the key building blocks. Every mayor Cloud Provider has got his own FaaS available. On Microsoft Azure there is Azure Functions, AWS has got Lambda and Cloud Functions can be used on the Google Cloud. All of these have a lot of similarities in the way they allow developers to create small event driven services. &amp;lt;br&amp;gt;&lt;br /&gt;
From security perspective there are a lot of benefits when moving to a serverless architecture. There is no need to manage any of the machines and the underlying infrastructure. Dealing with updates, patches and infrastructure is the responsibility of the platform provider. FaaS are short lived processes which will be instantiated and destroyed in a matter of milliseconds making it more resilient to denial-of-services (DoS) and also makes it harder to attack and compromise. &amp;lt;br&amp;gt;&lt;br /&gt;
But will all of this be sufficient to be ’secure’ or should we be worried about more? With serverless there is still a piece of software that will be developed, build, deployed and executed. It will also introduce a more complex architecture with corresponding attack surface which also makes it hard to monitor. What about the software supply chain and delivery pipeline? There still will be a need to patch your software for vulnerabilities in code and used 3rd party libraries. In this talk we will identify the security area’s we do need to focus on when developing serverless and define possible solutions for dealing with those problems.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Niels Tanis has got a background in .NET development, pentesting and security consultancy. He also holds the CSSLP certification and has been involved in breaking, defending and building secure applications. He joined Veracode in 2015 and right now he works as a security researcher on a variant of languages and technologies related to Veracode’s Binary Static Analysis service. He is married, father of 2 and lives in a small village just outside Amersfoort, The Netherlands.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1215&amp;quot;&amp;gt;OWASP Zap by David Scrobonia&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
Intoducing security testing tools to a QA or developers workflow can be difficult when the tools aren't easy or intuitive to use. Even for security professionals, the friction of cumbersome security tooling can prevent them from getting the most from a tool or being effective with their time.&amp;lt;br&amp;gt;&lt;br /&gt;
The OWASP ZAP team is working to help enable developers, QA, and hackers alike with the ZAP Heads Up Display, a more user friendly way to engage with the security testing tool. The Heads Up Displays integrates ZAP directly in the browser providing all of the funcitonality of the tool via a heads up display. The goal is to make ZAP more accessible and enabling users, especially developers, to integrate security in their daily workflows.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk will discuss the importance of usable tools, design tradeoffs made to improve usability, the various browser technologies powering the HUD, and how you can start hacking with a heads up display.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
David Scrobonia is a part of the Security Engineering team at Segment working to secure modern web apps and AWS infrastructure. He contributes to open source in his spare time and is a core team member of the OWASP ZAP project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1400&amp;quot;&amp;gt;Juice Shop: OWASP's most broken Flagship by Björn Kimminich&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
OWASP Juice Shop is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and many more severe security flaws. In this talk, you'll learn about this open-source project and its capabilities first-hand from its creator. Join a “happy shopper round trip,” enjoy a hacking demo of some of the built-in challenges, witness how to re-theme the Juice Shop into a security awareness booster for your own company, and learn how to set it up for a capture-the-flag (CTF) event in less than 5 minutes!&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
Björn Kimminich is responsible for global IT architecture and application security at Kuehne + Nagel. On the side, he gives IT security lectures at the non-profit private university Nordakademie. Björn also is the project leader of the OWASP Juice Shop and a board member for the German OWASP chapter. &amp;lt;br&amp;gt;&lt;br /&gt;
[[File:GitHub-Mark_no_background.png|25px|link=https://github.com/bkimminich|GitHub]]&lt;br /&gt;
[[File:TwitterLogo.png|25px|link=http://twitter.com/bkimminich|Twitter]]&lt;br /&gt;
[[File:LinkedinSquareLogo.png|25px|link=https://www.linkedin.com/in/bkimminich|LinkedIn]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1445&amp;quot;&amp;gt;Leaky Processors: Stealing Your Secrets with Foreshadow by Jo Van Bulck&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
For decades, memory isolation has been one of the key principles of&lt;br /&gt;
secure system design. The recent wave of speculative execution attacks,&lt;br /&gt;
including Meltdown, Spectre, and Foreshadow abruptly showed, however,&lt;br /&gt;
that performance optimizations in modern processors fundamentally&lt;br /&gt;
undermine application security.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk will review how speculative execution attacks work. What makes&lt;br /&gt;
them dangerous, and why they require a paradigm shift in the way we&lt;br /&gt;
think about application security. The talk will have a special focus on&lt;br /&gt;
the recently disclosed Foreshadow CPU vulnerability, which led to a&lt;br /&gt;
complete collapse of state-of-the-art Intel SGX technology, and&lt;br /&gt;
necessitated hardware and software patches for all major operating&lt;br /&gt;
systems and virtual machine hypervisors.&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jo Van Bulck is a PhD researcher at imec-DistriNet, KU Leuven, where he&lt;br /&gt;
investigates hardware-level trusted computing from an integrated attack&lt;br /&gt;
and defense perspective. His work resulted in a.o., the high-impact&lt;br /&gt;
Foreshadow CPU vulnerability announced in August 2018, and several&lt;br /&gt;
open-source secure processor prototypes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1600&amp;quot;&amp;gt;Fast forwarding Mobile Security with the MSTG by Jeroen Willemsen&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
After the startup of the mobile security project in 2010, the mobile security project and its testing guides have seen quiet some evolution. All of this changed quiet intensively when, in 2016, the Mobile Application Security Verification Standard (MASVS) and the Mobile Application Security Testing Guide (MSTG) were created. Now, two years fast forward: where are we now? How can you use it as a pentester or a developer? We will start with introducing the current state of the MSTG and its side-projects and then show various demos on iOS and Android.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Bio ====&lt;br /&gt;
&lt;br /&gt;
Jeroen Willemsen is a Principal Security Architect at Xebia. With a love for mobile security, he recently became one of the projectleaders for the OMTG project (MASV &amp;amp; MSTG). Jeroen is more or less a jack of all trades with interest in infrastructure security, risk management and application security.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span id=&amp;quot;TALK_1645&amp;quot;&amp;gt;Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars by Lennert Wouters&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
==== Abstract ====&lt;br /&gt;
&lt;br /&gt;
The security of immobiliser and Remote Keyless Entry systems has been extensively studied over the past years. Passive Keyless Entry and Start systems, which are currently deployed in luxury vehicles, have not received as much attention.&lt;br /&gt;
During this presentation we will share the techniques used in reverse engineering the Tesla Model S Passive Keyless Entry and Start system. We will discuss multiple security weaknesses in the system including the use of an inadequate proprietary cipher using 40-bit keys, the lack of mutual authentication in the challenge-response protocol, hardware configuration mistakes and the absence of security partitioning.&amp;lt;br&amp;gt;&lt;br /&gt;
We verified our findings by implementing a proof of concept attack allowing us to clone a Tesla Model S key fob in a matter of seconds with low cost commercial off the shelf equipment.&amp;lt;br&amp;gt;&lt;br /&gt;
Finally, we will share our experience with the responsible disclosure of these finding to Tesla Motors and other likely affected manufacturers such as McLaren, Karma Automotive and Triumph Motorcycles as they all use the same system developed by Pektron.&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
&lt;br /&gt;
Lennert Wouters is a PhD researcher at the Computer Security and Industrial Cryptography (COSIC) research group at KU Leuven. His research interests involve hardware security of connected embedded devices and side channel attacks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
'''The Social Event is on Thursday, November 29th'''&lt;br /&gt;
&lt;br /&gt;
'''If you want to join the social event, don't forget to register for it via the registration:'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--[[image:Register_now_red.png|link=https://owasp-benelux-day-2018.eventbrite.com |200px|alt=Register for the OWASP BeNeLux Day 2018 | Register for the OWASP BeNeLux Day 2018 ]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The social event details will be published very soon! Stay tuned.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Address: TBD&lt;br /&gt;
&lt;br /&gt;
Menu:TBD&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
''' Become a sponsor of OWASP BeNeLux! '''&lt;br /&gt;
&lt;br /&gt;
There are 3 combined sponsorship packages (Gold, Silver or Bronze) that cover the BeNeLux chapter meetings 2019 and the BeNeLux OWASP Days 2018.&lt;br /&gt;
&lt;br /&gt;
Download our [https://www.owasp.org/images/8/8e/OWASP_BeNeLux_2018_Sponsorship_Form_v20181004.pdf sponsor brochure] and contact [mailto:seba@owasp.org us] for questions or sponsorship confirmation!&lt;br /&gt;
&lt;br /&gt;
Your sponsorship will be invested directly in the chapter meetings, supporting speaker and catering expenses. &lt;br /&gt;
&lt;br /&gt;
The sponsorship will also be dedicated to cover the costs of the OWASP 2018 BeNeLux event.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
&lt;br /&gt;
==== Gold ====&lt;br /&gt;
&lt;br /&gt;
[[File:DavinsiLabs.png|250px|link=https://www.davinsilabs.com]]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Silver ====&lt;br /&gt;
&lt;br /&gt;
[[File:LogoIngenicoGroup.png|250px|link=https://ingenico.be]]&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:LogoSynopsys.png|250px|link=https://www.synopsys.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Bronze ====&lt;br /&gt;
&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] &lt;br /&gt;
[[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243779</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243779"/>
				<updated>2018-09-27T15:03:29Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- TEMPLATE FOR ONE MEETING:&lt;br /&gt;
&lt;br /&gt;
== YYYY-MM-DD Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://HOST'S_WEB_SITE HOST_INSTITUTION HOST_INSTITUTION]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://MAP_FROM_HOST'S_SITE_OR_GOOGLE_MAPS map], [https://DIRECTIONS_PAGE_FROM_HOST'S_WEB_SITE_OR_GOOGLE_MAPS directions])&lt;br /&gt;
 ADDRESS_STREET_AND_NUMBER_INDENTED_1_SPACE&lt;br /&gt;
 ADDRESS_POSTCODE_AND_PLACE_INDENTED_1_SPACE&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
* 19h00 - 19h10: [https://LINK_OWASP_UPDATE_PRESENTATION OWASP Update] / ''OWASP Update'' by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
* 19h10 - 20h00: [https://LINK_SLIDES_TALK_1 TITLE_TALK_1]) / ''TITLE_TALK_1'' by PRESENTER_TALK_1 (INSTITUTION_PRESENTER_TALK_1)&lt;br /&gt;
* 20h00 - 20h10: Break&lt;br /&gt;
* 20h10 - 21h00: [https://LINK_SLIDES_TALK_2 TITLE_TALK_2]] / ''TITLE_TALK_2'' by PRESENTER_TALK_2 (INSTITUTION_PRESENTER_TALK_2)&lt;br /&gt;
* 21h00 - 21h30: Networking drink&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== TITLE_TALK_1 ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://LINK_PRESENTER_TALK_1 PRESENTER_TALK_1] (INSTITUTION_PRESENTER_TALK_1&lt;br /&gt;
* Presentation: not yet available / https://LINK_SLIDES_TALK_1&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT_TALK_1&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
BIO_PRESENTER_TALK_1&lt;br /&gt;
&lt;br /&gt;
==== TITLE_TALK_2 ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://LINK_PRESENTER_TALK_2 PRESENTER_TALK_2] (INSTITUTION_PRESENTER_TALK_2&lt;br /&gt;
* Presentation: not yet available / https://LINK_SLIDES_TALK_2&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT_TALK_2&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
BIO_PRESENTER_TALK_2&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration via EventBrite: coming soon / https://owasp-belgium-YYYY-MM-DD.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
END OF TEMPLATE FOR ONE MEETING --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 23 October 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://securecodewarrior.com/ Secure Code Warrior]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://goo.gl/maps/e6Ej1v44tf32 map], [https://goo.gl/maps/UoW1EM3kbfy directions], 10 minutes walk from Brugge train station)&lt;br /&gt;
 Baron Ruzettelaan 1&lt;br /&gt;
 8310 Assebroek&lt;br /&gt;
&lt;br /&gt;
* Parking is available under the building, open from 5 p.m., the entrance is at the back:&lt;br /&gt;
 Vestingstraat 88&lt;br /&gt;
 8310 Assebroek&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h00 - 18h50: Welcome &amp;amp; pizzas&lt;br /&gt;
* 18h50 - 19h00: &amp;lt;!--[https://LINK_OWASP_UPDATE_PRESENTATION OWASP Update]--&amp;gt; ''OWASP Update'' by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
* 19h00 - 19h30: &amp;lt;!--[https://LINK_SLIDES_TALK_1 Effectively Distribute Software Security Knowledge]--&amp;gt; ''Effectively Distribute Software Security Knowledge'' by Pieter De Cremer and Nathan Desmet (Secure Code Warrior)&lt;br /&gt;
* 19h30 - 19h45: Beers from Bruges break&lt;br /&gt;
* 19h45 - 20h25: &amp;lt;!--[https://LINK_SLIDES_TALK_2 Common API Security Pitfalls]--&amp;gt; ''Common API Security Pitfalls'' by Philippe De Ryck (Pragmatic Web Security)&lt;br /&gt;
* 20h25 - 22h00: Networking and more beers from Bruges&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== Effectively Distribute Software Security Knowledge ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://www.linkedin.com/in/pdcremer/ Pieter De Cremer] ([https://twitter.com/pdcremer @pdcremer]) and [https://www.linkedin.com/in/nathan-desmet-687345aa/ Nathan Desmet] (Secure Code Warrior)&lt;br /&gt;
* Presentation: not yet available &amp;lt;!-- URL_PRESENTATION_TALK_1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Security is still a big concern in application development, as breaches appear in the media on a regular basis. Up to 90 percent of security issues are caused by problems or oversight in the code (U.S. Department of Homeland Security, “Infosheet Software Assurance”, https://www.us-cert.gov/sites/default/files/publications/infosheet_SoftwareAssurance.pdf, last accessed  2018-05-22). They are the result of errors made by the developers. At the same time, many of these issues are well known, well-documented problems. But the security experts in charge of securing the application are understaffed with an average of less than two security experts per hundred developers (Gary McGraw, Ph.D., Sammy Migues and Jacob West, “Building Security In Maturity Model (BSIMM)”, https://www.bsimm.com/, 2018). So the problem is not a lack of knowledge on security but the distribution of it without requiring costly, unscalable communication cycles between individual developers and security experts. In this talk we will outline the goal of a new approach to improve software security, focused on distributing software security knowledge so that software engineers can effectively put it into practice with minimal impact on their daily tasks.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
'''Pieter De Cremer''' is an R&amp;amp;amp;D Engineer and Security Researcher at Secure Code Warrior, where he is responsible for researching a wide variety of application vulnerabilities and developing this into new content and coding challenges for the Secure Code Warrior platform. His passion lies in empowering developers to be the first line of defence in their organisation by making security&lt;br /&gt;
easy to understand.&lt;br /&gt;
&lt;br /&gt;
Pieter graduated with a Masters in Computer Science Engineering from the University of Ghent and is currently completing his PhD in Secure Design Programming Aid for the Internet of Things through a personal grant from the Flemish government. When he is away from his desk, Pieter has also facilitated a number of secure coding workshops with Ghent University, Howest Bruges and Antwerp University, helping students improve their secure coding skills. His repertoire of coding languages includes C, C++, Java, Python, node and Haskell.&lt;br /&gt;
&lt;br /&gt;
'''Nathan Desmet''' is the Lead Engineer at Secure Code Warrior, where he is responsible for developing Sensei, a real-time correction and coaching IDE plug-in for secure coding. His passion lies in building world-class software applications that makes an impact in the way developers build software with a focus on security.&lt;br /&gt;
&lt;br /&gt;
Prior to Secure Code Warrior, Nathan has worked for NVISO where he created the Cyber Security Challenge platform, the biggest computer security competition in Belgium. Nathan also co-founded Sensei Security, and founded Applix, a software consultancy firm. His clients include SMEs in the technology and legal sector.&lt;br /&gt;
&lt;br /&gt;
Nathan graduated with a degree in Computer Science from the University of Howest Bruges, majoring in Computer and Cybercrime Professional.&lt;br /&gt;
&lt;br /&gt;
==== Common API Security Pitfalls ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://twitter.com/PhilippeDeRyck Philippe De Ryck] ([https://pragmaticwebsecurity.com/ Pragmatic Web Security])&lt;br /&gt;
* Presentation: not yet available &amp;lt;!-- URL_PRESENTATION_TALK_2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
The shift towards an API landscape indicates a significant evolution in the way we build applications. The rise of JavaScript and mobile applications have sparked an explosion of easily-accessible REST APIs. But how do you protect access to your API? Which security aspects are no longer relevant? Which security features are an absolutely must-have, and which additional security measures do you need to take into account?&lt;br /&gt;
&lt;br /&gt;
These are hard questions, as evidenced by the deployment of numerous insecure APIs. Attend this session to find out about common API security pitfalls, that often result in compromised user accounts and unauthorized access to your data. We expose the problem that lies at the root of each of these pitfalls, and offer actionable advice to address these security problems. After this session, you will know how to assess the security of your APIs, and the best practices to improve them towards the future.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Philippe De Ryck is the founder of Pragmatic Web Security, where he travels the world to train developers on web security and security engineering. He holds a Ph.D. in web security from KU Leuven. Google recognizes Philippe as a Google Developer Expert for his knowledge of web security and security in Angular applications.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration via EventBrite:  https://owasp-belgium-2018-10-23.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;br /&gt;
&lt;br /&gt;
== 17 September 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://ec.europa.eu European Commission]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://www.google.com/maps/place/Place+Madou+1,+1210+Saint-Josse-ten-Noode/ map], [https://www.google.com/maps/dir//Place+Madou+1,+1210+Saint-Josse-ten-Noode directions])&lt;br /&gt;
 Place Madou, 1&lt;br /&gt;
 1210 Saint-Josse-Ten-Noode&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h00 - 18h50: Welcome &amp;amp; sandwiches&lt;br /&gt;
* 18h50 - 19h00: [https://www.owasp.org/images/9/9b/Owasp_Belgium_update_2018-09-17_v1.pptx OWASP Update] by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
* 19h00 - 19h10: ''Intro by the EC'' by Miguel Soria Machado (Head of Sector CSIRC, DIGIT IT Security Directorate, European Commission)&lt;br /&gt;
* 19h10 - 20h00: [https://www.owasp.org/images/1/17/Dirk_Wetter_-_Docker_Security_Brussels.pdf Docker Threat Modeling and Top 10] by Dirk Wetter&lt;br /&gt;
* 20h00 - 20h10: Break&lt;br /&gt;
* 20h10 - 21h00: [https://www.owasp.org/images/1/1c/Securing_Containers_on_the_High_Seas_%28OWASP_Belgium_September_17-09-2018%29.pdf Securing Containers on the High Seas] by Jack Mannino (nVisium)&lt;br /&gt;
* 21h00 - 21h30: Networking drink&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== Docker Threat Modeling and Top 10 ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://twitter.com/drwetter Dirk Wetter]&lt;br /&gt;
* Presentation: https://www.owasp.org/images/1/17/Dirk_Wetter_-_Docker_Security_Brussels.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Docker containers offer several advantages for developers. Most notably they fit perfectly in software development processes, they enable fast, reproducible deployments and when properly done, with little change the same container can run either in a test or production environment.&lt;br /&gt;
&lt;br /&gt;
Despite threatening information out there Docker offers per se also several security advantages. However it is important to make use of them and as a minimum avoid several pitfalls.  In a worst case scenario this can lead otherwise to less security or the security benefits which the containment&lt;br /&gt;
technology offers are not being used at all.&lt;br /&gt;
&lt;br /&gt;
To avoid this a proper fundamental approach is needed.&lt;br /&gt;
&lt;br /&gt;
Thus this talk models first the most important threats to containerized environments out there. Based on that the speaker will present 10 security bullet points which covers:&lt;br /&gt;
&lt;br /&gt;
*  important Do's and Dont's,&lt;br /&gt;
*  for advanced needs how to tighten security further.&lt;br /&gt;
&lt;br /&gt;
At the end the speaker gives advice how to check your Docker and Kubernetes security status yourself.&lt;br /&gt;
&lt;br /&gt;
The talk is based on practical experiences at several costumers and on the speaker's solid network and systems security expertise.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Dirk Wetter (Ph.D.) is an independent security consultant with more than 20 years professional experience in information security with a broad technical and information security management background.&lt;br /&gt;
&lt;br /&gt;
His primary focus nowadays is around web application security. He has also a solid background on network and systems security.&lt;br /&gt;
&lt;br /&gt;
He's also founder and maintainer of the open source project testssl.sh which checks the encryption of every SSL/TLS enabled service.&lt;br /&gt;
&lt;br /&gt;
==== Securing Containers on the High Seas ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://twitter.com/jack_mannino Jack Mannino] (nVisium)&lt;br /&gt;
* Presentation: https://www.owasp.org/images/1/1c/Securing_Containers_on_the_High_Seas_%28OWASP_Belgium_September_17-09-2018%29.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
It can be a difficult challenge for organizations to securely migrate to containers while shifting processes and security controls. Making the move from legacy virtualization and monolithic deployments to containers requires a solid strategy. Containers offer many inherent security benefits but it’s important to build controls in beyond the containers themselves. From development through container registries and deployment to a runtime environment, it’s important to enforce security and eliminate risks as they’re introduced.&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on scaling container security within an enterprise and building security controls into the way you build, ship, and run containerized services. We will discuss the modern container landscape including different container runtimes and isolation models. We will explore the container lifecycle from your developer’s laptop through your production environment and examine the key security problems to mitigate.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium. Passionate about security and impossible to keep away from a keyboard, his expertise spans over 15 years of building, breaking, and securing software. Jack founded nVisium in 2009, and since has helped the world's largest software teams enhance security across their software portfolios. He has spoken at conferences globally on topics such as secure design, mobile application security, and cloud-native security.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Two step registration:&lt;br /&gt;
&lt;br /&gt;
# Registration was via EventBrite: https://owasp-belgium-2018-09-17.eventbrite.com.&lt;br /&gt;
# Pre-registration of participants' ID documents, necessary for passing security checkpoint at the entrance to the site was via: https://ec.europa.eu/eusurvey/runner/OWASPBelgiumChapterMeetingSept17. The deadline for this registration was ''Sunday, September 16th midnight''. &lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;br /&gt;
&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://www.ing.be ING Belgium]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://branches.ing.be/branch/1040_bxl-non-residents map])&lt;br /&gt;
 Cours St Michel 60&lt;br /&gt;
 1040 Brussel&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
* 19h00 - 19h10: ''OWASP Update'' by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
* 19h10 - 20h00: ''KRACKing WPA2 in Practice Using Key Reinstallation Attacks'' &amp;lt;!--[https://LINK_SLIDES_TALK_1 KRACKing WPA2 in Practice Using Key Reinstallation Attacks]--&amp;gt; by Mathy Vanhoef (imec-DistriNet-KU Leuven)&lt;br /&gt;
* 20h00 - 20h10: Break&lt;br /&gt;
* 20h10 - 21h00: ''Making the web secure by design'' &amp;lt;!--[https://LINK_SLIDES_TALK_2 Making the web secure by design]--&amp;gt; by Glenn Ten Cate (ING Belgium) and Riccardo Ten Cate (Xebia)&lt;br /&gt;
* 21h00 - 21h30: Networking drink&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== KRACKing WPA2 in Practice Using Key Reinstallation Attacks ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Mathy Vanhoef (imec-DistriNet-KU Leuven)&lt;br /&gt;
* Presentation: not yet available &amp;lt;!--https://LINK_SLIDES_TALK_1--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
&lt;br /&gt;
All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
&lt;br /&gt;
The talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Mathy Vanhoef is a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where he discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
&lt;br /&gt;
==== Making the web secure by design ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Glenn Ten Cate (ING Belgium) and Riccardo Ten Cate (Xebia)&lt;br /&gt;
* Presentation: not yet available &amp;lt;!-- https://LINK_SLIDES_TALK_2--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
&lt;br /&gt;
As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration was via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
&lt;br /&gt;
* Address ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions]):&lt;br /&gt;
 Department of Computer Science (foyer at ground floor)&lt;br /&gt;
 Celestijnenlaan 200 A&lt;br /&gt;
 3001 Heverlee&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
*18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
*19h00 - 19h10: [https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update] by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
*19h10 - 20h00: [https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf Developers are not the enemy -- Usable Security for Experts] by Prof. Matthew Smith (University of Bonn)&lt;br /&gt;
*20h00 - 20h10: Break&lt;br /&gt;
*20h10 - 21h00: [https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf The Code Behind The Vulnerability] by Barry Dorrans (Microsoft)&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== Developers are not the enemy -- Usable Security for Experts ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Prof. Matthew Smith (University of Bonn)&lt;br /&gt;
* Presentation: https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Matthew Smith is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at, among others, IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.&lt;br /&gt;
&lt;br /&gt;
==== The Code Behind The Vulnerability ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Barry Dorrans (Microsoft)&lt;br /&gt;
* Presentation: https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Barry Dorrans is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration was via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium&amp;diff=243768</id>
		<title>Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium&amp;diff=243768"/>
				<updated>2018-09-27T10:22:39Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Upcoming Chapter Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Belgium|extra=The chapter leader is [mailto:seba@owasp.org Sebastien Deleersnyder]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} &lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
== Upcoming Chapter Meetings ==&lt;br /&gt;
&lt;br /&gt;
* [[Belgium_Events_2018#23_October_2018_Meeting|23 October 2018 Meeting in Bruges]] ([https://owasp-belgium-2018-10-23.eventbrite.com Registratrion via Eventbrite])&lt;br /&gt;
&lt;br /&gt;
See https://www.owasp.org/index.php/Belgium#Chapter_Meetings for more details and older meetings.&lt;br /&gt;
&lt;br /&gt;
== Stay in Touch ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]] &lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].&lt;br /&gt;
&lt;br /&gt;
== Structural Sponsors 2018  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2018 and the OWASP BeNeLux Days 2017: &lt;br /&gt;
&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
[https://secwatch.nl https://www.owasp.org/images/f/ff/Secwatch_logo_small.png]&lt;br /&gt;
[[File:Avi Logo Transparent Background 300pix.png|200px|link=https://avinetworks.com/]] &lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|link=http://www.nviso.be]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]&lt;br /&gt;
&lt;br /&gt;
= Chapter Meetings  =&lt;br /&gt;
&lt;br /&gt;
{{:Belgium_Events_2018}}&lt;br /&gt;
&lt;br /&gt;
== Previous Years  ==&lt;br /&gt;
&lt;br /&gt;
Events held in&lt;br /&gt;
[[Belgium Events 2017|2017]],&lt;br /&gt;
[[Belgium Events 2016|2016]],&lt;br /&gt;
[[Belgium Events 2015|2015]],&lt;br /&gt;
[[Belgium Events 2014|2014]],&lt;br /&gt;
[[Belgium Events 2013|2013]],&lt;br /&gt;
[[Belgium Events 2012|2012]],&lt;br /&gt;
[[Belgium Events 2011|2011]],&lt;br /&gt;
[[Belgium Events 2010|2010]],&lt;br /&gt;
[[Belgium Events 2009|2009]],&lt;br /&gt;
[[Belgium Events 2008|2008]],&lt;br /&gt;
[[Belgium Events 2007|2007]],&lt;br /&gt;
[[Belgium Events 2006|2006]],&lt;br /&gt;
[[Belgium Events 2005|2005]].&lt;br /&gt;
&lt;br /&gt;
= Belgium OWASP Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Belgium Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*Sebastien Deleersnyder, Toreon&lt;br /&gt;
*Erwin Geirnaert, Zion Security &lt;br /&gt;
*Lieven Desmet, KU Leuven &lt;br /&gt;
*Bart De Win, PWC&lt;br /&gt;
*David Mathy, Freelance&lt;br /&gt;
*Adolfo Solero, Freelance&lt;br /&gt;
*Stella Dineva, Ingenico Payment Services&lt;br /&gt;
*Thomas Herlea, NVISO&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243767</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243767"/>
				<updated>2018-09-27T10:22:22Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Registration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- TEMPLATE FOR ONE MEETING:&lt;br /&gt;
&lt;br /&gt;
== YYYY-MM-DD Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://HOST'S_WEB_SITE HOST_INSTITUTION HOST_INSTITUTION]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://MAP_FROM_HOST'S_SITE_OR_GOOGLE_MAPS map], [https://DIRECTIONS_PAGE_FROM_HOST'S_WEB_SITE_OR_GOOGLE_MAPS directions])&lt;br /&gt;
 ADDRESS_STREET_AND_NUMBER_INDENTED_1_SPACE&lt;br /&gt;
 ADDRESS_POSTCODE_AND_PLACE_INDENTED_1_SPACE&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
* 19h00 - 19h10: [https://LINK_OWASP_UPDATE_PRESENTATION OWASP Update] / ''OWASP Update'' by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
* 19h10 - 20h00: [https://LINK_SLIDES_TALK_1 TITLE_TALK_1]) / ''TITLE_TALK_1'' by PRESENTER_TALK_1 (INSTITUTION_PRESENTER_TALK_1)&lt;br /&gt;
* 20h00 - 20h10: Break&lt;br /&gt;
* 20h10 - 21h00: [https://LINK_SLIDES_TALK_2 TITLE_TALK_2]] / ''TITLE_TALK_2'' by PRESENTER_TALK_2 (INSTITUTION_PRESENTER_TALK_2)&lt;br /&gt;
* 21h00 - 21h30: Networking drink&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== TITLE_TALK_1 ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://LINK_PRESENTER_TALK_1 PRESENTER_TALK_1] (INSTITUTION_PRESENTER_TALK_1&lt;br /&gt;
* Presentation: not yet available / https://LINK_SLIDES_TALK_1&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT_TALK_1&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
BIO_PRESENTER_TALK_1&lt;br /&gt;
&lt;br /&gt;
==== TITLE_TALK_2 ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://LINK_PRESENTER_TALK_2 PRESENTER_TALK_2] (INSTITUTION_PRESENTER_TALK_2&lt;br /&gt;
* Presentation: not yet available / https://LINK_SLIDES_TALK_2&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT_TALK_2&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
BIO_PRESENTER_TALK_2&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration via EventBrite: coming soon / https://owasp-belgium-YYYY-MM-DD.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
END OF TEMPLATE FOR ONE MEETING --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 23 October 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://securecodewarrior.com/ Secure Code Warrior]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://goo.gl/maps/e6Ej1v44tf32 map], [https://goo.gl/maps/UoW1EM3kbfy directions], 10 minutes walk from Brugge train station)&lt;br /&gt;
 Baron Ruzettelaan 1&lt;br /&gt;
 8310 Assebroek&lt;br /&gt;
&lt;br /&gt;
* Parking is available under the building, open from 5 p.m., the entrance is at the back:&lt;br /&gt;
 Vestingstraat 88&lt;br /&gt;
 8310 Assebroek&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h00 - 18h50: Welcome &amp;amp; pizzas&lt;br /&gt;
* 18h50 - 19h00: &amp;lt;!--[https://LINK_OWASP_UPDATE_PRESENTATION OWASP Update]--&amp;gt; ''OWASP Update'' by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
* 19h00 - 19h30: &amp;lt;!--[https://LINK_SLIDES_TALK_1 Effectively Distribute Software Security Knowledge]--&amp;gt; ''Effectively Distribute Software Security Knowledge'' by Pieter De Cremer and Nathan Desmet (Secure Code Warrior)&lt;br /&gt;
* 19h30 - 19h45: Beers from Bruges break&lt;br /&gt;
* 19h45 - 20h25: &amp;lt;!--[https://LINK_SLIDES_TALK_2 Common API Security Pitfalls]--&amp;gt; ''Common API Security Pitfalls'' by Philippe De Ryck (Pragmatic Web Security)&lt;br /&gt;
* 20h25 - 20h40: ''Thank you note'' by Matias Madou (Secure Code Warrior)&lt;br /&gt;
* 20h40 - 22h00: Networking and more beers from Bruges&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== Effectively Distribute Software Security Knowledge ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://www.linkedin.com/in/pdcremer/ Pieter De Cremer] ([https://twitter.com/pdcremer @pdcremer]) and [https://www.linkedin.com/in/nathan-desmet-687345aa/ Nathan Desmet] (Secure Code Warrior)&lt;br /&gt;
* Presentation: not yet available &amp;lt;!-- URL_PRESENTATION_TALK_1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Security is still a big concern in application development, as breaches appear in the media on a regular basis. Up to 90 percent of security issues are caused by problems or oversight in the code (U. D. of Homeland Security, “Infosheet Software Assurance”, https://www.us-cert.gov/sites/default/files/publications/infosheet_SoftwareAssurance.pdf, last accessed  2018-05-22). They are the result of errors made by the developers. At the same time, many of these issues are well known, well-documented problems. But the security experts in charge of securing the application are understaffed with an average of less than two security experts per hundred developers (S. M. Gary McGraw, Ph.D. and J. West, “Building Security In Maturity Model (BSIMM)”, https://www.bsimm.com/, 2018). So the problem is not a lack of knowledge on security but the distribution of it without requiring costly, unscalable communication cycles between individual developers and security experts. In this talk we will outline the goal of a new approach to improve software security, focused on distributing software security knowledge so that software engineers can effectively put it into practice with minimal impact on their daily tasks.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
'''Pieter De Cremer''' is an R&amp;amp;amp;D Engineer and Security Researcher at Secure Code Warrior, where he is responsible for researching a wide variety of application vulnerabilities and developing this into new content and coding challenges for the Secure Code Warrior platform. His passion lies in empowering developers to be the first line of defence in their organisation by making security&lt;br /&gt;
easy to understand.&lt;br /&gt;
&lt;br /&gt;
Pieter graduated with a Masters in Computer Science Engineering from the University of Ghent and is currently completing his PhD in Secure Design Programming Aid for the Internet of Things through a personal grant from the Flemish government. When he is away from his desk, Pieter has also facilitated a number of secure coding workshops with Ghent University, Howest Bruges and Antwerp University, helping students improve their secure coding skills. His repertoire of coding languages includes C, C++, Java, Python, node and Haskell.&lt;br /&gt;
&lt;br /&gt;
'''Nathan Desmet''' is the Lead Engineer at Secure Code Warrior, where he is responsible for developing Sensei, a real-time correction and coaching IDE plug-in for secure coding. His passion lies in building world-class software applications that makes an impact in the way developers build software with a focus on security.&lt;br /&gt;
&lt;br /&gt;
Prior to Secure Code Warrior, Nathan has worked for NVISO where he created the Cyber Security Challenge platform, the biggest computer security competition in Belgium. Nathan also co-founded Sensei Security, and founded Applix, a software consultancy firm. His clients include SMEs in the technology and legal sector.&lt;br /&gt;
&lt;br /&gt;
Nathan graduated with a degree in Computer Science from the University of Howest Bruges, majoring in Computer and Cybercrime Professional.&lt;br /&gt;
&lt;br /&gt;
==== Common API Security Pitfalls ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://twitter.com/PhilippeDeRyck Philippe De Ryck] ([https://pragmaticwebsecurity.com/ Pragmatic Web Security])&lt;br /&gt;
* Presentation: not yet available &amp;lt;!-- URL_PRESENTATION_TALK_2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
The shift towards an API landscape indicates a significant evolution in the way we build applications. The rise of JavaScript and mobile applications have sparked an explosion of easily-accessible REST APIs. But how do you protect access to your API? Which security aspects are no longer relevant? Which security features are an absolutely must-have, and which additional security measures do you need to take into account?&lt;br /&gt;
&lt;br /&gt;
These are hard questions, as evidenced by the deployment of numerous insecure APIs. Attend this session to find out about common API security pitfalls, that often result in compromised user accounts and unauthorized access to your data. We expose the problem that lies at the root of each of these pitfalls, and offer actionable advice to address these security problems. After this session, you will know how to assess the security of your APIs, and the best practices to improve them towards the future.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Philippe De Ryck is the founder of Pragmatic Web Security, where he travels the world to train developers on web security and security engineering. He holds a Ph.D. in web security from KU Leuven. Google recognizes Philippe as a Google Developer Expert for his knowledge of web security and security in Angular applications.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration via EventBrite:  https://owasp-belgium-2018-10-23.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;br /&gt;
&lt;br /&gt;
== 17 September 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://ec.europa.eu European Commission]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://www.google.com/maps/place/Place+Madou+1,+1210+Saint-Josse-ten-Noode/ map], [https://www.google.com/maps/dir//Place+Madou+1,+1210+Saint-Josse-ten-Noode directions])&lt;br /&gt;
 Place Madou, 1&lt;br /&gt;
 1210 Saint-Josse-Ten-Noode&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h00 - 18h50: Welcome &amp;amp; sandwiches&lt;br /&gt;
* 18h50 - 19h00: [https://www.owasp.org/images/9/9b/Owasp_Belgium_update_2018-09-17_v1.pptx OWASP Update] by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
* 19h00 - 19h10: ''Intro by the EC'' by Miguel Soria Machado (Head of Sector CSIRC, DIGIT IT Security Directorate, European Commission)&lt;br /&gt;
* 19h10 - 20h00: [https://www.owasp.org/images/1/17/Dirk_Wetter_-_Docker_Security_Brussels.pdf Docker Threat Modeling and Top 10] by Dirk Wetter&lt;br /&gt;
* 20h00 - 20h10: Break&lt;br /&gt;
* 20h10 - 21h00: [https://www.owasp.org/images/1/1c/Securing_Containers_on_the_High_Seas_%28OWASP_Belgium_September_17-09-2018%29.pdf Securing Containers on the High Seas] by Jack Mannino (nVisium)&lt;br /&gt;
* 21h00 - 21h30: Networking drink&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== Docker Threat Modeling and Top 10 ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://twitter.com/drwetter Dirk Wetter]&lt;br /&gt;
* Presentation: https://www.owasp.org/images/1/17/Dirk_Wetter_-_Docker_Security_Brussels.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Docker containers offer several advantages for developers. Most notably they fit perfectly in software development processes, they enable fast, reproducible deployments and when properly done, with little change the same container can run either in a test or production environment.&lt;br /&gt;
&lt;br /&gt;
Despite threatening information out there Docker offers per se also several security advantages. However it is important to make use of them and as a minimum avoid several pitfalls.  In a worst case scenario this can lead otherwise to less security or the security benefits which the containment&lt;br /&gt;
technology offers are not being used at all.&lt;br /&gt;
&lt;br /&gt;
To avoid this a proper fundamental approach is needed.&lt;br /&gt;
&lt;br /&gt;
Thus this talk models first the most important threats to containerized environments out there. Based on that the speaker will present 10 security bullet points which covers:&lt;br /&gt;
&lt;br /&gt;
*  important Do's and Dont's,&lt;br /&gt;
*  for advanced needs how to tighten security further.&lt;br /&gt;
&lt;br /&gt;
At the end the speaker gives advice how to check your Docker and Kubernetes security status yourself.&lt;br /&gt;
&lt;br /&gt;
The talk is based on practical experiences at several costumers and on the speaker's solid network and systems security expertise.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Dirk Wetter (Ph.D.) is an independent security consultant with more than 20 years professional experience in information security with a broad technical and information security management background.&lt;br /&gt;
&lt;br /&gt;
His primary focus nowadays is around web application security. He has also a solid background on network and systems security.&lt;br /&gt;
&lt;br /&gt;
He's also founder and maintainer of the open source project testssl.sh which checks the encryption of every SSL/TLS enabled service.&lt;br /&gt;
&lt;br /&gt;
==== Securing Containers on the High Seas ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://twitter.com/jack_mannino Jack Mannino] (nVisium)&lt;br /&gt;
* Presentation: https://www.owasp.org/images/1/1c/Securing_Containers_on_the_High_Seas_%28OWASP_Belgium_September_17-09-2018%29.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
It can be a difficult challenge for organizations to securely migrate to containers while shifting processes and security controls. Making the move from legacy virtualization and monolithic deployments to containers requires a solid strategy. Containers offer many inherent security benefits but it’s important to build controls in beyond the containers themselves. From development through container registries and deployment to a runtime environment, it’s important to enforce security and eliminate risks as they’re introduced.&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on scaling container security within an enterprise and building security controls into the way you build, ship, and run containerized services. We will discuss the modern container landscape including different container runtimes and isolation models. We will explore the container lifecycle from your developer’s laptop through your production environment and examine the key security problems to mitigate.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium. Passionate about security and impossible to keep away from a keyboard, his expertise spans over 15 years of building, breaking, and securing software. Jack founded nVisium in 2009, and since has helped the world's largest software teams enhance security across their software portfolios. He has spoken at conferences globally on topics such as secure design, mobile application security, and cloud-native security.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Two step registration:&lt;br /&gt;
&lt;br /&gt;
# Registration was via EventBrite: https://owasp-belgium-2018-09-17.eventbrite.com.&lt;br /&gt;
# Pre-registration of participants' ID documents, necessary for passing security checkpoint at the entrance to the site was via: https://ec.europa.eu/eusurvey/runner/OWASPBelgiumChapterMeetingSept17. The deadline for this registration was ''Sunday, September 16th midnight''. &lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;br /&gt;
&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://www.ing.be ING Belgium]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://branches.ing.be/branch/1040_bxl-non-residents map])&lt;br /&gt;
 Cours St Michel 60&lt;br /&gt;
 1040 Brussel&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
* 19h00 - 19h10: ''OWASP Update'' by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
* 19h10 - 20h00: ''KRACKing WPA2 in Practice Using Key Reinstallation Attacks'' &amp;lt;!--[https://LINK_SLIDES_TALK_1 KRACKing WPA2 in Practice Using Key Reinstallation Attacks]--&amp;gt; by Mathy Vanhoef (imec-DistriNet-KU Leuven)&lt;br /&gt;
* 20h00 - 20h10: Break&lt;br /&gt;
* 20h10 - 21h00: ''Making the web secure by design'' &amp;lt;!--[https://LINK_SLIDES_TALK_2 Making the web secure by design]--&amp;gt; by Glenn Ten Cate (ING Belgium) and Riccardo Ten Cate (Xebia)&lt;br /&gt;
* 21h00 - 21h30: Networking drink&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== KRACKing WPA2 in Practice Using Key Reinstallation Attacks ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Mathy Vanhoef (imec-DistriNet-KU Leuven)&lt;br /&gt;
* Presentation: not yet available &amp;lt;!--https://LINK_SLIDES_TALK_1--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
&lt;br /&gt;
All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
&lt;br /&gt;
The talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Mathy Vanhoef is a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where he discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
&lt;br /&gt;
==== Making the web secure by design ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Glenn Ten Cate (ING Belgium) and Riccardo Ten Cate (Xebia)&lt;br /&gt;
* Presentation: not yet available &amp;lt;!-- https://LINK_SLIDES_TALK_2--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
&lt;br /&gt;
As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration was via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
&lt;br /&gt;
* Address ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions]):&lt;br /&gt;
 Department of Computer Science (foyer at ground floor)&lt;br /&gt;
 Celestijnenlaan 200 A&lt;br /&gt;
 3001 Heverlee&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
*18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
*19h00 - 19h10: [https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update] by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
*19h10 - 20h00: [https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf Developers are not the enemy -- Usable Security for Experts] by Prof. Matthew Smith (University of Bonn)&lt;br /&gt;
*20h00 - 20h10: Break&lt;br /&gt;
*20h10 - 21h00: [https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf The Code Behind The Vulnerability] by Barry Dorrans (Microsoft)&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== Developers are not the enemy -- Usable Security for Experts ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Prof. Matthew Smith (University of Bonn)&lt;br /&gt;
* Presentation: https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Matthew Smith is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at, among others, IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.&lt;br /&gt;
&lt;br /&gt;
==== The Code Behind The Vulnerability ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Barry Dorrans (Microsoft)&lt;br /&gt;
* Presentation: https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Barry Dorrans is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration was via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium&amp;diff=243766</id>
		<title>Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium&amp;diff=243766"/>
				<updated>2018-09-27T09:53:48Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Upcoming Chapter Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Belgium|extra=The chapter leader is [mailto:seba@owasp.org Sebastien Deleersnyder]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} &lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
== Upcoming Chapter Meetings ==&lt;br /&gt;
&lt;br /&gt;
* [[Belgium_Events_2018#23_October_2018_Meeting|23 October 2018 Meeting in Bruges]] ([https://owasp-belgium-2018-09-17.eventbrite.com Registratrion via Eventbrite])&lt;br /&gt;
&lt;br /&gt;
See https://www.owasp.org/index.php/Belgium#Chapter_Meetings for more details and older meetings.&lt;br /&gt;
&lt;br /&gt;
== Stay in Touch ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]] &lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].&lt;br /&gt;
&lt;br /&gt;
== Structural Sponsors 2018  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2018 and the OWASP BeNeLux Days 2017: &lt;br /&gt;
&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
[https://secwatch.nl https://www.owasp.org/images/f/ff/Secwatch_logo_small.png]&lt;br /&gt;
[[File:Avi Logo Transparent Background 300pix.png|200px|link=https://avinetworks.com/]] &lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|link=http://www.nviso.be]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]&lt;br /&gt;
&lt;br /&gt;
= Chapter Meetings  =&lt;br /&gt;
&lt;br /&gt;
{{:Belgium_Events_2018}}&lt;br /&gt;
&lt;br /&gt;
== Previous Years  ==&lt;br /&gt;
&lt;br /&gt;
Events held in&lt;br /&gt;
[[Belgium Events 2017|2017]],&lt;br /&gt;
[[Belgium Events 2016|2016]],&lt;br /&gt;
[[Belgium Events 2015|2015]],&lt;br /&gt;
[[Belgium Events 2014|2014]],&lt;br /&gt;
[[Belgium Events 2013|2013]],&lt;br /&gt;
[[Belgium Events 2012|2012]],&lt;br /&gt;
[[Belgium Events 2011|2011]],&lt;br /&gt;
[[Belgium Events 2010|2010]],&lt;br /&gt;
[[Belgium Events 2009|2009]],&lt;br /&gt;
[[Belgium Events 2008|2008]],&lt;br /&gt;
[[Belgium Events 2007|2007]],&lt;br /&gt;
[[Belgium Events 2006|2006]],&lt;br /&gt;
[[Belgium Events 2005|2005]].&lt;br /&gt;
&lt;br /&gt;
= Belgium OWASP Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Belgium Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*Sebastien Deleersnyder, Toreon&lt;br /&gt;
*Erwin Geirnaert, Zion Security &lt;br /&gt;
*Lieven Desmet, KU Leuven &lt;br /&gt;
*Bart De Win, PWC&lt;br /&gt;
*David Mathy, Freelance&lt;br /&gt;
*Adolfo Solero, Freelance&lt;br /&gt;
*Stella Dineva, Ingenico Payment Services&lt;br /&gt;
*Thomas Herlea, NVISO&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243765</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243765"/>
				<updated>2018-09-27T09:52:29Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Registration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- TEMPLATE FOR ONE MEETING:&lt;br /&gt;
&lt;br /&gt;
== YYYY-MM-DD Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://HOST'S_WEB_SITE HOST_INSTITUTION HOST_INSTITUTION]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://MAP_FROM_HOST'S_SITE_OR_GOOGLE_MAPS map], [https://DIRECTIONS_PAGE_FROM_HOST'S_WEB_SITE_OR_GOOGLE_MAPS directions])&lt;br /&gt;
 ADDRESS_STREET_AND_NUMBER_INDENTED_1_SPACE&lt;br /&gt;
 ADDRESS_POSTCODE_AND_PLACE_INDENTED_1_SPACE&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
* 19h00 - 19h10: [https://LINK_OWASP_UPDATE_PRESENTATION OWASP Update] / ''OWASP Update'' by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
* 19h10 - 20h00: [https://LINK_SLIDES_TALK_1 TITLE_TALK_1]) / ''TITLE_TALK_1'' by PRESENTER_TALK_1 (INSTITUTION_PRESENTER_TALK_1)&lt;br /&gt;
* 20h00 - 20h10: Break&lt;br /&gt;
* 20h10 - 21h00: [https://LINK_SLIDES_TALK_2 TITLE_TALK_2]] / ''TITLE_TALK_2'' by PRESENTER_TALK_2 (INSTITUTION_PRESENTER_TALK_2)&lt;br /&gt;
* 21h00 - 21h30: Networking drink&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== TITLE_TALK_1 ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://LINK_PRESENTER_TALK_1 PRESENTER_TALK_1] (INSTITUTION_PRESENTER_TALK_1&lt;br /&gt;
* Presentation: not yet available / https://LINK_SLIDES_TALK_1&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT_TALK_1&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
BIO_PRESENTER_TALK_1&lt;br /&gt;
&lt;br /&gt;
==== TITLE_TALK_2 ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://LINK_PRESENTER_TALK_2 PRESENTER_TALK_2] (INSTITUTION_PRESENTER_TALK_2&lt;br /&gt;
* Presentation: not yet available / https://LINK_SLIDES_TALK_2&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT_TALK_2&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
BIO_PRESENTER_TALK_2&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration via EventBrite: coming soon / https://owasp-belgium-YYYY-MM-DD.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
END OF TEMPLATE FOR ONE MEETING --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 23 October 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://securecodewarrior.com/ Secure Code Warrior]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://goo.gl/maps/e6Ej1v44tf32 map], [https://goo.gl/maps/UoW1EM3kbfy directions], 10 minutes walk from Brugge train station)&lt;br /&gt;
 Baron Ruzettelaan 1&lt;br /&gt;
 8310 Assebroek&lt;br /&gt;
&lt;br /&gt;
* Parking is available under the building, open from 5 p.m., the entrance is at the back:&lt;br /&gt;
 Vestingstraat 88&lt;br /&gt;
 8310 Assebroek&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h00 - 18h50: Welcome &amp;amp; pizzas&lt;br /&gt;
* 18h50 - 19h00: &amp;lt;!--[https://LINK_OWASP_UPDATE_PRESENTATION OWASP Update]--&amp;gt; ''OWASP Update'' by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
* 19h00 - 19h30: &amp;lt;!--[https://LINK_SLIDES_TALK_1 Effectively Distribute Software Security Knowledge]--&amp;gt; ''Effectively Distribute Software Security Knowledge'' by Pieter De Cremer and Nathan Desmet (Secure Code Warrior)&lt;br /&gt;
* 19h30 - 19h45: Beers from Bruges break&lt;br /&gt;
* 19h45 - 20h25: &amp;lt;!--[https://LINK_SLIDES_TALK_2 Common API Security Pitfalls]--&amp;gt; ''Common API Security Pitfalls'' by Philippe De Ryck (Pragmatic Web Security)&lt;br /&gt;
* 20h25 - 20h40: ''Thank you note'' by Matias Madou (Secure Code Warrior)&lt;br /&gt;
* 20h40 - 22h00: Networking and more beers from Bruges&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== Effectively Distribute Software Security Knowledge ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://www.linkedin.com/in/pdcremer/ Pieter De Cremer] ([https://twitter.com/pdcremer @pdcremer]) and [https://www.linkedin.com/in/nathan-desmet-687345aa/ Nathan Desmet] (Secure Code Warrior)&lt;br /&gt;
* Presentation: not yet available &amp;lt;!-- URL_PRESENTATION_TALK_1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Security is still a big concern in application development, as breaches appear in the media on a regular basis. Up to 90 percent of security issues are caused by problems or oversight in the code (U. D. of Homeland Security, “Infosheet Software Assurance”, https://www.us-cert.gov/sites/default/files/publications/infosheet_SoftwareAssurance.pdf, last accessed  2018-05-22). They are the result of errors made by the developers. At the same time, many of these issues are well known, well-documented problems. But the security experts in charge of securing the application are understaffed with an average of less than two security experts per hundred developers (S. M. Gary McGraw, Ph.D. and J. West, “Building Security In Maturity Model (BSIMM)”, https://www.bsimm.com/, 2018). So the problem is not a lack of knowledge on security but the distribution of it without requiring costly, unscalable communication cycles between individual developers and security experts. In this talk we will outline the goal of a new approach to improve software security, focused on distributing software security knowledge so that software engineers can effectively put it into practice with minimal impact on their daily tasks.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
'''Pieter De Cremer''' is an R&amp;amp;amp;D Engineer and Security Researcher at Secure Code Warrior, where he is responsible for researching a wide variety of application vulnerabilities and developing this into new content and coding challenges for the Secure Code Warrior platform. His passion lies in empowering developers to be the first line of defence in their organisation by making security&lt;br /&gt;
easy to understand.&lt;br /&gt;
&lt;br /&gt;
Pieter graduated with a Masters in Computer Science Engineering from the University of Ghent and is currently completing his PhD in Secure Design Programming Aid for the Internet of Things through a personal grant from the Flemish government. When he is away from his desk, Pieter has also facilitated a number of secure coding workshops with Ghent University, Howest Bruges and Antwerp University, helping students improve their secure coding skills. His repertoire of coding languages includes C, C++, Java, Python, node and Haskell.&lt;br /&gt;
&lt;br /&gt;
'''Nathan Desmet''' is the Lead Engineer at Secure Code Warrior, where he is responsible for developing Sensei, a real-time correction and coaching IDE plug-in for secure coding. His passion lies in building world-class software applications that makes an impact in the way developers build software with a focus on security.&lt;br /&gt;
&lt;br /&gt;
Prior to Secure Code Warrior, Nathan has worked for NVISO where he created the Cyber Security Challenge platform, the biggest computer security competition in Belgium. Nathan also co-founded Sensei Security, and founded Applix, a software consultancy firm. His clients include SMEs in the technology and legal sector.&lt;br /&gt;
&lt;br /&gt;
Nathan graduated with a degree in Computer Science from the University of Howest Bruges, majoring in Computer and Cybercrime Professional.&lt;br /&gt;
&lt;br /&gt;
==== Common API Security Pitfalls ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://twitter.com/PhilippeDeRyck Philippe De Ryck] ([https://pragmaticwebsecurity.com/ Pragmatic Web Security])&lt;br /&gt;
* Presentation: not yet available &amp;lt;!-- URL_PRESENTATION_TALK_2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
The shift towards an API landscape indicates a significant evolution in the way we build applications. The rise of JavaScript and mobile applications have sparked an explosion of easily-accessible REST APIs. But how do you protect access to your API? Which security aspects are no longer relevant? Which security features are an absolutely must-have, and which additional security measures do you need to take into account?&lt;br /&gt;
&lt;br /&gt;
These are hard questions, as evidenced by the deployment of numerous insecure APIs. Attend this session to find out about common API security pitfalls, that often result in compromised user accounts and unauthorized access to your data. We expose the problem that lies at the root of each of these pitfalls, and offer actionable advice to address these security problems. After this session, you will know how to assess the security of your APIs, and the best practices to improve them towards the future.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Philippe De Ryck is the founder of Pragmatic Web Security, where he travels the world to train developers on web security and security engineering. He holds a Ph.D. in web security from KU Leuven. Google recognizes Philippe as a Google Developer Expert for his knowledge of web security and security in Angular applications.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration via EventBrite:  https://owasp-belgium-2018-09-17.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;br /&gt;
&lt;br /&gt;
== 17 September 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://ec.europa.eu European Commission]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://www.google.com/maps/place/Place+Madou+1,+1210+Saint-Josse-ten-Noode/ map], [https://www.google.com/maps/dir//Place+Madou+1,+1210+Saint-Josse-ten-Noode directions])&lt;br /&gt;
 Place Madou, 1&lt;br /&gt;
 1210 Saint-Josse-Ten-Noode&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h00 - 18h50: Welcome &amp;amp; sandwiches&lt;br /&gt;
* 18h50 - 19h00: [https://www.owasp.org/images/9/9b/Owasp_Belgium_update_2018-09-17_v1.pptx OWASP Update] by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
* 19h00 - 19h10: ''Intro by the EC'' by Miguel Soria Machado (Head of Sector CSIRC, DIGIT IT Security Directorate, European Commission)&lt;br /&gt;
* 19h10 - 20h00: [https://www.owasp.org/images/1/17/Dirk_Wetter_-_Docker_Security_Brussels.pdf Docker Threat Modeling and Top 10] by Dirk Wetter&lt;br /&gt;
* 20h00 - 20h10: Break&lt;br /&gt;
* 20h10 - 21h00: [https://www.owasp.org/images/1/1c/Securing_Containers_on_the_High_Seas_%28OWASP_Belgium_September_17-09-2018%29.pdf Securing Containers on the High Seas] by Jack Mannino (nVisium)&lt;br /&gt;
* 21h00 - 21h30: Networking drink&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== Docker Threat Modeling and Top 10 ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://twitter.com/drwetter Dirk Wetter]&lt;br /&gt;
* Presentation: https://www.owasp.org/images/1/17/Dirk_Wetter_-_Docker_Security_Brussels.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Docker containers offer several advantages for developers. Most notably they fit perfectly in software development processes, they enable fast, reproducible deployments and when properly done, with little change the same container can run either in a test or production environment.&lt;br /&gt;
&lt;br /&gt;
Despite threatening information out there Docker offers per se also several security advantages. However it is important to make use of them and as a minimum avoid several pitfalls.  In a worst case scenario this can lead otherwise to less security or the security benefits which the containment&lt;br /&gt;
technology offers are not being used at all.&lt;br /&gt;
&lt;br /&gt;
To avoid this a proper fundamental approach is needed.&lt;br /&gt;
&lt;br /&gt;
Thus this talk models first the most important threats to containerized environments out there. Based on that the speaker will present 10 security bullet points which covers:&lt;br /&gt;
&lt;br /&gt;
*  important Do's and Dont's,&lt;br /&gt;
*  for advanced needs how to tighten security further.&lt;br /&gt;
&lt;br /&gt;
At the end the speaker gives advice how to check your Docker and Kubernetes security status yourself.&lt;br /&gt;
&lt;br /&gt;
The talk is based on practical experiences at several costumers and on the speaker's solid network and systems security expertise.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Dirk Wetter (Ph.D.) is an independent security consultant with more than 20 years professional experience in information security with a broad technical and information security management background.&lt;br /&gt;
&lt;br /&gt;
His primary focus nowadays is around web application security. He has also a solid background on network and systems security.&lt;br /&gt;
&lt;br /&gt;
He's also founder and maintainer of the open source project testssl.sh which checks the encryption of every SSL/TLS enabled service.&lt;br /&gt;
&lt;br /&gt;
==== Securing Containers on the High Seas ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://twitter.com/jack_mannino Jack Mannino] (nVisium)&lt;br /&gt;
* Presentation: https://www.owasp.org/images/1/1c/Securing_Containers_on_the_High_Seas_%28OWASP_Belgium_September_17-09-2018%29.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
It can be a difficult challenge for organizations to securely migrate to containers while shifting processes and security controls. Making the move from legacy virtualization and monolithic deployments to containers requires a solid strategy. Containers offer many inherent security benefits but it’s important to build controls in beyond the containers themselves. From development through container registries and deployment to a runtime environment, it’s important to enforce security and eliminate risks as they’re introduced.&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on scaling container security within an enterprise and building security controls into the way you build, ship, and run containerized services. We will discuss the modern container landscape including different container runtimes and isolation models. We will explore the container lifecycle from your developer’s laptop through your production environment and examine the key security problems to mitigate.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium. Passionate about security and impossible to keep away from a keyboard, his expertise spans over 15 years of building, breaking, and securing software. Jack founded nVisium in 2009, and since has helped the world's largest software teams enhance security across their software portfolios. He has spoken at conferences globally on topics such as secure design, mobile application security, and cloud-native security.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Two step registration:&lt;br /&gt;
&lt;br /&gt;
# Registration was via EventBrite: https://owasp-belgium-2018-09-17.eventbrite.com.&lt;br /&gt;
# Pre-registration of participants' ID documents, necessary for passing security checkpoint at the entrance to the site was via: https://ec.europa.eu/eusurvey/runner/OWASPBelgiumChapterMeetingSept17. The deadline for this registration was ''Sunday, September 16th midnight''. &lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;br /&gt;
&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://www.ing.be ING Belgium]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://branches.ing.be/branch/1040_bxl-non-residents map])&lt;br /&gt;
 Cours St Michel 60&lt;br /&gt;
 1040 Brussel&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
* 19h00 - 19h10: ''OWASP Update'' by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
* 19h10 - 20h00: ''KRACKing WPA2 in Practice Using Key Reinstallation Attacks'' &amp;lt;!--[https://LINK_SLIDES_TALK_1 KRACKing WPA2 in Practice Using Key Reinstallation Attacks]--&amp;gt; by Mathy Vanhoef (imec-DistriNet-KU Leuven)&lt;br /&gt;
* 20h00 - 20h10: Break&lt;br /&gt;
* 20h10 - 21h00: ''Making the web secure by design'' &amp;lt;!--[https://LINK_SLIDES_TALK_2 Making the web secure by design]--&amp;gt; by Glenn Ten Cate (ING Belgium) and Riccardo Ten Cate (Xebia)&lt;br /&gt;
* 21h00 - 21h30: Networking drink&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== KRACKing WPA2 in Practice Using Key Reinstallation Attacks ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Mathy Vanhoef (imec-DistriNet-KU Leuven)&lt;br /&gt;
* Presentation: not yet available &amp;lt;!--https://LINK_SLIDES_TALK_1--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
&lt;br /&gt;
All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
&lt;br /&gt;
The talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Mathy Vanhoef is a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where he discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
&lt;br /&gt;
==== Making the web secure by design ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Glenn Ten Cate (ING Belgium) and Riccardo Ten Cate (Xebia)&lt;br /&gt;
* Presentation: not yet available &amp;lt;!-- https://LINK_SLIDES_TALK_2--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
&lt;br /&gt;
As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration was via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
&lt;br /&gt;
* Address ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions]):&lt;br /&gt;
 Department of Computer Science (foyer at ground floor)&lt;br /&gt;
 Celestijnenlaan 200 A&lt;br /&gt;
 3001 Heverlee&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
*18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
*19h00 - 19h10: [https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update] by Sebastien Deleersnyder (OWASP)&lt;br /&gt;
*19h10 - 20h00: [https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf Developers are not the enemy -- Usable Security for Experts] by Prof. Matthew Smith (University of Bonn)&lt;br /&gt;
*20h00 - 20h10: Break&lt;br /&gt;
*20h10 - 21h00: [https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf The Code Behind The Vulnerability] by Barry Dorrans (Microsoft)&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== Developers are not the enemy -- Usable Security for Experts ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Prof. Matthew Smith (University of Bonn)&lt;br /&gt;
* Presentation: https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Matthew Smith is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at, among others, IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.&lt;br /&gt;
&lt;br /&gt;
==== The Code Behind The Vulnerability ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Barry Dorrans (Microsoft)&lt;br /&gt;
* Presentation: https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Barry Dorrans is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration was via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243661</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243661"/>
				<updated>2018-09-24T08:17:58Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Securing Containers on the High Seas */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- TEMPLATE FOR ONE MEETING:&lt;br /&gt;
&lt;br /&gt;
== YYYY-MM-DD Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://HOST'S_WEB_SITE HOST_INSTITUTION HOST_INSTITUTION]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://MAP_FROM_HOST'S_SITE_OR_GOOGLE_MAPS map], [https://DIRECTIONS_PAGE_FROM_HOST'S_WEB_SITE_OR_GOOGLE_MAPS directions])&lt;br /&gt;
 ADDRESS_STREET_AND_NUMBER_INDENTED_1_SPACE&lt;br /&gt;
 ADDRESS_POSTCODE_AND_PLACE_INDENTED_1_SPACE&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
* 19h00 - 19h10: [https://LINK_OWASP_UPDATE_PRESENTATION OWASP Update] (by Sebastien Deleersnyder, OWASP)&lt;br /&gt;
* 19h10 - 20h00: [[#YYYY-MM-DD Talk 1|TITLE_TALK_1]] (by PRESENTER_TALK_1, INSTITUTION_PRESENTER_TALK_1)&lt;br /&gt;
* 20h00 - 20h10: Break&lt;br /&gt;
* 20h10 - 21h00: [[#YYYY-MM-DD Talk 2|TITLE_TALK_2]] (by PRESENTER_TALK_2, INSTITUTION_PRESENTER_TALK_2)&lt;br /&gt;
* 21h00 - 21h30: Networking drink&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;YYYY-MM-DD Talk 1&amp;quot;&amp;gt;TITLE_TALK_1&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://LINK_PRESENTER_TALK_1 PRESENTER_TALK_1], INSTITUTION_PRESENTER_TALK_1&lt;br /&gt;
* Presentation: URL_PRESENTATION_TALK_1&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT_TALK_1&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
BIO_PRESENTER_1&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;YYYY-MM-DD Talk 2&amp;quot;&amp;gt;TITLE_TALK_2&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://LINK_PRESENTER_TALK_2 PRESENTER_TALK_2], INSTITUTION_PRESENTER_TALK_2&lt;br /&gt;
* Presentation: URL_PRESENTATION_TALK_2&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT_TALK_1&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
BIO_PRESENTER_2&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration via EventBrite: https://owasp-belgium-YYYY-MM-DD.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
END OF TEMPLATE FOR ONE MEETING --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 23 October 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://securecodewarrior.com/ Secure Code Warrior]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://goo.gl/maps/e6Ej1v44tf32 map], [https://goo.gl/maps/UoW1EM3kbfy directions], 10 minutes walk from Brugge train station)&lt;br /&gt;
 Baron Ruzettelaan 7&lt;br /&gt;
 8000 Brugge&lt;br /&gt;
&lt;br /&gt;
Parking is possible under the office, the entrance is at the back on Vestingstraat. Further instructions will follow.&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h00 - 18h50: Welcome &amp;amp; pizzas&lt;br /&gt;
* 18h50 - 19h00: &amp;lt;!--[https://LINK_OWASP_UPDATE_PRESENTATION OWASP Update]--&amp;gt; OWASP Update (by Sebastien Deleersnyder, OWASP)&lt;br /&gt;
* 19h00 - 19h30: [[#2018-10-23 Talk 1|Effectively Distribute Software Security Knowledge]] (by Pieter De Cremer and Nathan Desmet, Secure Code Warrior)&lt;br /&gt;
* 19h30 - 19h45: Beers from Bruges break&lt;br /&gt;
* 19h45 - 20h25: [[#2018-10-23 Talk 2|Common API Security Pitfalls]] (by Philippe De Ryck, Pragmatic Web Security)&lt;br /&gt;
* 20h25 - 20h40: Thank you note (by Matias Madou, Secure Code Warrior)&lt;br /&gt;
* 20h40 - 22h00: Networking and more beers from Bruges&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;2018-10-23 Talk 1&amp;quot;&amp;gt;Effectively Distribute Software Security Knowledge&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://www.linkedin.com/in/pdcremer/ Pieter De Cremer] ([https://twitter.com/pdcremer @pdcremer]) and [https://www.linkedin.com/in/nathan-desmet-687345aa/ Nathan Desmet], Secure Code Warrior&lt;br /&gt;
* Presentation: not yet available &amp;lt;!-- URL_PRESENTATION_TALK_1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
not yet available &amp;lt;!-- ABSTRACT_TALK_1 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
'''Pieter De Cremer''' is an R&amp;amp;amp;D Engineer and Security Researcher at Secure Code Warrior, where he is responsible for researching a wide variety of application vulnerabilities and developing this into new content and coding challenges for the Secure Code Warrior platform. His passion lies in empowering developers to be the first line of defence in their organisation by making security&lt;br /&gt;
easy to understand.&lt;br /&gt;
&lt;br /&gt;
Pieter graduated with a Masters in Computer Science Engineering from the University of Ghent and is currently completing his PhD in Secure Design Programming Aid for the Internet of Things through a personal grant from the Flemish government. When he is away from his desk, Pieter has also facilitated a number of secure coding workshops with Ghent University, Howest Bruges and Antwerp University, helping students improve their secure coding skills. His repertoire of coding languages includes C, C++, Java, Python, node and Haskell.&lt;br /&gt;
&lt;br /&gt;
'''Nathan Desmet''' is the Lead Engineer at Secure Code Warrior, where he is responsible for developing Sensei, a real-time correction and coaching IDE plug-in for secure coding. His passion lies in building world-class software applications that makes an impact in the way developers build software with a focus on security.&lt;br /&gt;
&lt;br /&gt;
Prior to Secure Code Warrior, Nathan has worked for NVISO where he created the Cyber Security Challenge platform, the biggest computer security competition in Belgium. Nathan also co-founded Sensei Security, and founded Applix, a software consultancy firm. His clients include SMEs in the technology and legal sector.&lt;br /&gt;
&lt;br /&gt;
Nathan graduated with a degree in Computer Science from the University of Howest Bruges, majoring in Computer and Cybercrime Professional.&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;2018-10-23 Talk 2&amp;quot;&amp;gt;Common API Security Pitfalls&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Philippe De Ryck &amp;lt;!-- [https://LINK_PRESENTER_TALK_2 Philippe De Ryck]--&amp;gt;, [https://pragmaticwebsecurity.com/ Pragmatic Web Security]&lt;br /&gt;
* Presentation: not yet available &amp;lt;!-- URL_PRESENTATION_TALK_2 --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
The shift towards an API landscape indicates a significant evolution in the way we build applications. The rise of JavaScript and mobile applications have sparked an explosion of easily-accessible REST APIs. But how do you protect access to your API? Which security aspects are no longer relevant? Which security features are an absolutely must-have, and which additional security measures do you need to take into account?&lt;br /&gt;
&lt;br /&gt;
These are hard questions, as evidenced by the deployment of numerous insecure APIs. Attend this session to find out about common API security pitfalls, that often result in compromised user accounts and unauthorized access to your data. We expose the problem that lies at the root of each of these pitfalls, and offer actionable advice to address these security problems. After this session, you will know how to assess the security of your APIs, and the best practices to improve them towards the future.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Philippe De Ryck is the founder of Pragmatic Web Security, where he travels the world to train developers on web security and security engineering. He holds a Ph.D. in web security from KU Leuven. Google recognizes Philippe as a Google Developer Expert for his knowledge of web security and security in Angular applications.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration via EventBrite: coming soon &amp;lt;!-- https://owasp-belgium-YYYY-MM-DD.eventbrite.com --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== 17 September 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://ec.europa.eu European Commission]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://www.google.com/maps/place/Place+Madou+1,+1210+Saint-Josse-ten-Noode/ map], [https://www.google.com/maps/dir//Place+Madou+1,+1210+Saint-Josse-ten-Noode directions])&lt;br /&gt;
 Place Madou, 1&lt;br /&gt;
 1210 Saint-Josse-Ten-Noode&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h00 - 18h50: Welcome &amp;amp; sandwiches&lt;br /&gt;
* 18h50 - 19h00: [https://www.owasp.org/images/9/9b/Owasp_Belgium_update_2018-09-17_v1.pptx OWASP Update] (by Sebastien Deleersnyder, OWASP)&lt;br /&gt;
* 19h00 - 19h10: Intro by the EC (by Miguel Soria Machado, Head of Sector CSIRC, DIGIT IT Security Directorate, European Commission)&lt;br /&gt;
* 19h10 - 20h00: [[#2018-09-17 Talk 1|Docker Threat Modeling and Top 10]] (by Dirk Wetter)&lt;br /&gt;
* 20h00 - 20h10: Break&lt;br /&gt;
* 20h10 - 21h00: [[#2018-09-17 Talk 2|Securing Containers on the High Seas]] (by Jack Mannino, nVisium)&lt;br /&gt;
* 21h00 - 21h30: Networking drink&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;2018-09-17 Talk 1&amp;quot;&amp;gt;Docker Threat Modeling and Top 10&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://twitter.com/drwetter Dirk Wetter]&lt;br /&gt;
* Presentation: https://www.owasp.org/images/1/17/Dirk_Wetter_-_Docker_Security_Brussels.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Docker containers offer several advantages for developers. Most notably they fit perfectly in software development processes, they enable fast, reproducible deployments and when properly done, with little change the same container can run either in a test or production environment.&lt;br /&gt;
&lt;br /&gt;
Despite threatening information out there Docker offers per se also several security advantages. However it is important to make use of them and as a minimum avoid several pitfalls.  In a worst case scenario this can lead otherwise to less security or the security benefits which the containment&lt;br /&gt;
technology offers are not being used at all.&lt;br /&gt;
&lt;br /&gt;
To avoid this a proper fundamental approach is needed.&lt;br /&gt;
&lt;br /&gt;
Thus this talk models first the most important threats to containerized environments out there. Based on that the speaker will present 10 security bullet points which covers:&lt;br /&gt;
&lt;br /&gt;
*  important Do's and Dont's,&lt;br /&gt;
*  for advanced needs how to tighten security further.&lt;br /&gt;
&lt;br /&gt;
At the end the speaker gives advice how to check your Docker and Kubernetes security status yourself.&lt;br /&gt;
&lt;br /&gt;
The talk is based on practical experiences at several costumers and on the speaker's solid network and systems security expertise.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Dirk Wetter (Ph.D.) is an independent security consultant with more than 20 years professional experience in information security with a broad technical and information security management background.&lt;br /&gt;
&lt;br /&gt;
His primary focus nowadays is around web application security. He has also a solid background on network and systems security.&lt;br /&gt;
&lt;br /&gt;
He's also founder and maintainer of the open source project testssl.sh which checks the encryption of every SSL/TLS enabled service.&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;2018-09-17 Talk 2&amp;quot;&amp;gt;Securing Containers on the High Seas&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: [https://twitter.com/jack_mannino Jack Mannino], nVisium&lt;br /&gt;
* Presentation: https://www.owasp.org/images/1/1c/Securing_Containers_on_the_High_Seas_%28OWASP_Belgium_September_17-09-2018%29.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
It can be a difficult challenge for organizations to securely migrate to containers while shifting processes and security controls. Making the move from legacy virtualization and monolithic deployments to containers requires a solid strategy. Containers offer many inherent security benefits but it’s important to build controls in beyond the containers themselves. From development through container registries and deployment to a runtime environment, it’s important to enforce security and eliminate risks as they’re introduced.&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on scaling container security within an enterprise and building security controls into the way you build, ship, and run containerized services. We will discuss the modern container landscape including different container runtimes and isolation models. We will explore the container lifecycle from your developer’s laptop through your production environment and examine the key security problems to mitigate.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium. Passionate about security and impossible to keep away from a keyboard, his expertise spans over 15 years of building, breaking, and securing software. Jack founded nVisium in 2009, and since has helped the world's largest software teams enhance security across their software portfolios. He has spoken at conferences globally on topics such as secure design, mobile application security, and cloud-native security.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Two step registration:&lt;br /&gt;
&lt;br /&gt;
# Registration was via EventBrite: https://owasp-belgium-2018-09-17.eventbrite.com.&lt;br /&gt;
# Pre-registration of participants' ID documents, necessary for passing security checkpoint at the entrance to the site was via: https://ec.europa.eu/eusurvey/runner/OWASPBelgiumChapterMeetingSept17. The deadline for this registration was ''Sunday, September 16th midnight''. &lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://www.ing.be ING Belgium]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://branches.ing.be/branch/1040_bxl-non-residents map])&lt;br /&gt;
 Cours St Michel 60&lt;br /&gt;
 1040 Brussel&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
* 19h00 - 19h10: OWASP Update (by Sebastien Deleersnyder, OWASP)&lt;br /&gt;
* 19h10 - 20h00: [[#2018-03-19 Talk 1|KRACKing WPA2 in Practice Using Key Reinstallation Attacks]] (by Mathy Vanhoef, imec-DistriNet-KU Leuven)&lt;br /&gt;
* 20h00 - 20h10: Break&lt;br /&gt;
* 20h10 - 21h00: [[#2018-03-19 Talk 2|Making the web secure by design]] (by Glenn Ten Cate, ING Belgium, and Riccardo Ten Cate, Xebia)&lt;br /&gt;
* 21h00 - 21h30: Networking drink&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;2018-03-19 Talk 1&amp;quot;&amp;gt;KRACKing WPA2 in Practice Using Key Reinstallation Attacks&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Mathy Vanhoef, imec-DistriNet-KU Leuven&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
&lt;br /&gt;
All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
&lt;br /&gt;
The talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Mathy Vanhoef is  a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where he discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;2018-03-19 Talk 2&amp;quot;&amp;gt;Making the web secure by design&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Glenn Ten Cate, ING Belgium, and Riccardo Ten Cate, Xebia&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
&lt;br /&gt;
As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration was via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
&lt;br /&gt;
* Address ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions]):&lt;br /&gt;
 Department of Computer Science (foyer at ground floor)&lt;br /&gt;
 Celestijnenlaan 200 A&lt;br /&gt;
 3001 Heverlee&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
*18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
*19h00 - 19h10: [https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update] (by Sebastien Deleersnyder, OWASP)&lt;br /&gt;
*19h10 - 20h00: [[#2018-02-20 Talk 1|Developers are not the enemy -- Usable Security for Experts]] (by Prof. Matthew Smith, University of Bonn)&lt;br /&gt;
*20h00 - 20h10: Break&lt;br /&gt;
*20h10 - 21h00: [[#2018-02-20 Talk 2|The Code Behind The Vulnerability]] (by Barry Dorrans, Microsoft)&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;2018-02-20 Talk 1&amp;quot;&amp;gt;Developers are not the enemy -- Usable Security for Experts&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Prof. Matthew Smith, University of Bonn&lt;br /&gt;
* Presentation: https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Matthew Smith is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at, among others, IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;2018-02-20 Talk 2&amp;quot;&amp;gt;The Code Behind The Vulnerability&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Barry Dorrans, Microsoft&lt;br /&gt;
* Presentation: https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Barry Dorrans is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration was via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com.&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Securing_Containers_on_the_High_Seas_(OWASP_Belgium_September_17-09-2018).pdf&amp;diff=243660</id>
		<title>File:Securing Containers on the High Seas (OWASP Belgium September 17-09-2018).pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Securing_Containers_on_the_High_Seas_(OWASP_Belgium_September_17-09-2018).pdf&amp;diff=243660"/>
				<updated>2018-09-24T08:17:04Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: Jack Mannino, OWASP BE chapter meeting (17 September 2018)
Securing Containers on the High Seas&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Jack Mannino, OWASP BE chapter meeting (17 September 2018)&lt;br /&gt;
Securing Containers on the High Seas&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243456</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243456"/>
				<updated>2018-09-15T06:27:54Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* PROGRAM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 17 September 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 17 September 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: European Commission&lt;br /&gt;
: Place Madou, 1&lt;br /&gt;
:1210 - Saint-Josse-Ten-Noode&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID is needed to enter the venue; see registration link below!!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
&lt;br /&gt;
*18h00 - 18h50: '''Welcome &amp;amp; sandwiches''' &amp;lt;br&amp;gt; &lt;br /&gt;
*18h50 - 19h00: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''Intro by the EC''' (by Miguel Soria Machado, Head of Sector (CSIRC), DIGIT IT Security Directorate, European Commission) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''Docker Threat Modeling and Top 10''' (by Dirk Wetter)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Docker containers offer several advantages for developers. Most notably they fit perfectly in software development processes, they enable fast, reproducible&lt;br /&gt;
deployments and when properly done, with little change the same container can&lt;br /&gt;
run either in a test or production environment.&lt;br /&gt;
&lt;br /&gt;
Despite threatening information out there Docker offers per se also several&lt;br /&gt;
security advantages. However it is important to make use of them and as a&lt;br /&gt;
minimum avoid several pitfalls.  In a worst case scenario this can lead&lt;br /&gt;
otherwise to less security or the security benefits which the containment&lt;br /&gt;
technology offers are not being used at all.&lt;br /&gt;
&lt;br /&gt;
To avoid this a proper fundamental approach is needed.&lt;br /&gt;
&lt;br /&gt;
Thus this talk models first the most important threats to containerized&lt;br /&gt;
environments out there. Based on that the speaker will present 10 security&lt;br /&gt;
bullet points which covers&lt;br /&gt;
&lt;br /&gt;
*  important Do's and Dont's,&lt;br /&gt;
*  for advanced needs how to tighten security further.&lt;br /&gt;
&lt;br /&gt;
At the end the speaker gives advice how to check your Docker and&lt;br /&gt;
Kubernetes security status yourself.&lt;br /&gt;
&lt;br /&gt;
The talk is based on practical experiences at several costumers and on the&lt;br /&gt;
speaker's solid network and systems security expertise.&lt;br /&gt;
&lt;br /&gt;
:''Bio:'' [https://twitter.com/drwetter Dirk Wetter (Ph.D.)] is an independent security consultant with more than 20 years professional experience in information security with a broad technical&lt;br /&gt;
and information security management background.&lt;br /&gt;
&lt;br /&gt;
His primary focus nowadays is around web application security. He has also a&lt;br /&gt;
solid background on network and systems security.&lt;br /&gt;
&lt;br /&gt;
He's also founder and maintainer of the open source project testssl.sh which&lt;br /&gt;
checks the encryption of every SSL/TLS enabled service.&lt;br /&gt;
&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Securing Containers on the High Seas''' (by Jack Mannino)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' It can be a difficult challenge for organizations to securely migrate to containers while shifting processes and security controls. Making the move from legacy virtualization and monolithic deployments to containers requires a solid strategy. Containers offer many inherent security benefits but it’s important to build controls in beyond the containers themselves. From development through container registries and deployment to a runtime environment, it’s important to enforce security and eliminate risks as they’re introduced.&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on scaling container security within an enterprise and building security controls into the way you build, ship, and run containerized services. We will discuss the modern container landscape including different container runtimes and isolation models. We will explore the container lifecycle from your developer’s laptop through your production environment and examine the key security problems to mitigate.&lt;br /&gt;
&lt;br /&gt;
:''Bio:'' [https://twitter.com/jack_mannino Jack Mannino] is the CEO of nVisium. Passionate about security and impossible to keep away from a keyboard, his expertise spans over 15 years of building, breaking, and securing software. Jack founded nVisium in 2009, and since has helped the world's largest software teams enhance security across their software portfolios. He has spoken at conferences globally on topics such as secure design, mobile application security, and cloud-native security.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Two step registration:&lt;br /&gt;
Step 1: Registration via Eventbrite&lt;br /&gt;
Step 2: Pre-registration of participants'ID (European Commission)&lt;br /&gt;
&lt;br /&gt;
Pre-registration of the participants' ID will be needed to enter the security on site!!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 1''': Registration via Eventbrite: https://owasp-belgium-2018-09-17.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
'''Step 2''': Pre-registration of participants'ID: https://ec.europa.eu/eusurvey/runner/OWASPBelgiumChapterMeetingSept17 .&lt;br /&gt;
&lt;br /&gt;
'''The registration deadline for the participants' ID expires on ''Sunday, September 16th midnight''. After this time the registration and admission to the event will not be possible.'''&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://www.ing.be ING Belgium]&lt;br /&gt;
&lt;br /&gt;
* Address ([https://branches.ing.be/branch/1040_bxl-non-residents map])&lt;br /&gt;
 Cours St Michel 60&lt;br /&gt;
 1040 Brussel&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
* 18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
* 19h00 - 19h10: OWASP Update (by Sebastien Deleersnyder, OWASP)&lt;br /&gt;
* 19h10 - 20h00: [[#2018-03-19 Talk 1|KRACKing WPA2 in Practice Using Key Reinstallation Attacks]] (by Mathy Vanhoef, imec-DistriNet-KU Leuven)&lt;br /&gt;
* 20h00 - 20h10: Break&lt;br /&gt;
* 20h10 - 21h00: [[#2018-03-19 Talk 2|Making the web secure by design]] (by Glenn Ten Cate, ING Belgium, and Riccardo Ten Cate, Xebia)&lt;br /&gt;
* 21h00 - 21h30: Networking drink&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;2018-03-19 Talk 1&amp;quot;&amp;gt;KRACKing WPA2 in Practice Using Key Reinstallation Attacks&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Mathy Vanhoef, imec-DistriNet-KU Leuven)&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
&lt;br /&gt;
All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
&lt;br /&gt;
The talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Mathy Vanhoef is  a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where he discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;2018-03-19 Talk 2&amp;quot;&amp;gt;Making the web secure by design&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Glenn Ten Cate, ING Belgium, and Riccardo Ten Cate, Xebia&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bios''&lt;br /&gt;
&lt;br /&gt;
As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
&lt;br /&gt;
As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration was via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== Where  ===&lt;br /&gt;
&lt;br /&gt;
* Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
&lt;br /&gt;
* Address ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions]):&lt;br /&gt;
 Department of Computer Science (foyer at ground floor)&lt;br /&gt;
 Celestijnenlaan 200 A&lt;br /&gt;
 3001 Heverlee&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
&lt;br /&gt;
*18h15 - 19h00: Welcome &amp;amp; sandwiches&lt;br /&gt;
*19h00 - 19h10: [https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update] (by Sebastien Deleersnyder, OWASP)&lt;br /&gt;
*19h10 - 20h00: [[#2018-02-20 Talk 1|Developers are not the enemy -- Usable Security for Experts]] (by Prof. Matthew Smith, University of Bonn)&lt;br /&gt;
*20h00 - 20h10: Break&lt;br /&gt;
*20h10 - 21h00: [[#2018-02-20 Talk 2|The Code Behind The Vulnerability]] (by Barry Dorrans, Microsoft)&lt;br /&gt;
&lt;br /&gt;
=== Program ===&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;2018-02-20 Talk 1&amp;quot;&amp;gt;Developers are not the enemy -- Usable Security for Experts&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Prof. Matthew Smith, University of Bonn&lt;br /&gt;
* Presentation: https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Matthew Smith is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at, among others, IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;span id=&amp;quot;2018-02-20 Talk 2&amp;quot;&amp;gt;The Code Behind The Vulnerability&amp;lt;/span&amp;gt; ====&lt;br /&gt;
&lt;br /&gt;
* Speaker: Barry Dorrans, Microsoft&lt;br /&gt;
* Presentation: https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf&lt;br /&gt;
&lt;br /&gt;
''Abstract''&lt;br /&gt;
&lt;br /&gt;
Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
&lt;br /&gt;
''Speaker Bio''&lt;br /&gt;
&lt;br /&gt;
Barry Dorrans is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== Registration  ===&lt;br /&gt;
&lt;br /&gt;
Registration was via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
n/a&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243309</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243309"/>
				<updated>2018-09-11T07:19:14Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* PROGRAM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 17 September 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 17 September 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: European Commission&lt;br /&gt;
: Place Madou, 1&lt;br /&gt;
:1210 - Saint-Josse-Ten-Noode&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID is needed to enter the venue; see registration link below!!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
&lt;br /&gt;
*18h00 - 18h50: '''Welcome &amp;amp; sandwiches''' &amp;lt;br&amp;gt; &lt;br /&gt;
*18h50 - 19h00: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''Intro by the EC''' (by TBD) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''Docker Threat Modeling and Top 10''' (by Dirk Wetter)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Docker containers offer several advantages for developers. Most notably they fit perfectly in software development processes, they enable fast, reproducible&lt;br /&gt;
deployments and when properly done, with little change the same container can&lt;br /&gt;
run either in a test or production environment.&lt;br /&gt;
&lt;br /&gt;
Despite threatening information out there Docker offers per se also several&lt;br /&gt;
security advantages. However it is important to make use of them and as a&lt;br /&gt;
minimum avoid several pitfalls.  In a worst case scenario this can lead&lt;br /&gt;
otherwise to less security or the security benefits which the containment&lt;br /&gt;
technology offers are not being used at all.&lt;br /&gt;
&lt;br /&gt;
To avoid this a proper fundamental approach is needed.&lt;br /&gt;
&lt;br /&gt;
Thus this talk models first the most important threats to containerized&lt;br /&gt;
environments out there. Based on that the speaker will present 10 security&lt;br /&gt;
bullet points which covers&lt;br /&gt;
&lt;br /&gt;
*  important Do's and Dont's,&lt;br /&gt;
*  for advanced needs how to tighten security further.&lt;br /&gt;
&lt;br /&gt;
At the end the speaker gives advice how to check your Docker and&lt;br /&gt;
Kubernetes security status yourself.&lt;br /&gt;
&lt;br /&gt;
The talk is based on practical experiences at several costumers and on the&lt;br /&gt;
speaker's solid network and systems security expertise.&lt;br /&gt;
&lt;br /&gt;
:''Bio:'' [https://twitter.com/drwetter Dirk Wetter (Ph.D.)] is an independent security consultant with more than 20 years professional experience in information security with a broad technical&lt;br /&gt;
and information security management background.&lt;br /&gt;
&lt;br /&gt;
His primary focus nowadays is around web application security. He has also a&lt;br /&gt;
solid background on network and systems security.&lt;br /&gt;
&lt;br /&gt;
He's also founder and maintainer of the open source project testssl.sh which&lt;br /&gt;
checks the encryption of every SSL/TLS enabled service.&lt;br /&gt;
&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Securing Containers on the High Seas''' (by Jack Mannino)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' It can be a difficult challenge for organizations to securely migrate to containers while shifting processes and security controls. Making the move from legacy virtualization and monolithic deployments to containers requires a solid strategy. Containers offer many inherent security benefits but it’s important to build controls in beyond the containers themselves. From development through container registries and deployment to a runtime environment, it’s important to enforce security and eliminate risks as they’re introduced.&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on scaling container security within an enterprise and building security controls into the way you build, ship, and run containerized services. We will discuss the modern container landscape including different container runtimes and isolation models. We will explore the container lifecycle from your developer’s laptop through your production environment and examine the key security problems to mitigate.&lt;br /&gt;
&lt;br /&gt;
:''Bio:'' [https://twitter.com/jack_mannino Jack Mannino] is the CEO of nVisium. Passionate about security and impossible to keep away from a keyboard, his expertise spans over 15 years of building, breaking, and securing software. Jack founded nVisium in 2009, and since has helped the world's largest software teams enhance security across their software portfolios. He has spoken at conferences globally on topics such as secure design, mobile application security, and cloud-native security.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Two step registration:&lt;br /&gt;
Step 1: Registration via Eventbrite&lt;br /&gt;
Step 2: Pre-registration of participants'ID (European Commission)&lt;br /&gt;
&lt;br /&gt;
Pre-registration of the participants' ID will be needed to enter the security on site!!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 1''': Registration via Eventbrite: https://owasp-belgium-2018-09-17.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
'''Step 2''': Pre-registration of participants'ID: https://ec.europa.eu/eusurvey/runner/OWASPBelgiumChapterMeetingSept17 .&lt;br /&gt;
&lt;br /&gt;
'''The registration deadline for the participants' ID expires on ''Sunday, September 16th midnight''. After this time the registration and admission to the event will not be possible.'''&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 19 March 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: ING Belgium&lt;br /&gt;
; Address&lt;br /&gt;
: Cours St Michel 60 - 1040 Brussel&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''KRACKing WPA2 in Practice Using Key Reinstallation Attacks''' (by Mathy Vanhoef, imec-DistriNet-KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
:All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
:Talk talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
:''Bio:'' '''Mathy Vanhoef''' is  a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where is discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Making the web secure by design''' (by Glenn Ten Cate, ING Belgium, and Riccardo Ten Cate, Xebia)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
:''Bio:'' As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
:''Bio:'' As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
*21h00 - 21h30: '''Networking drink''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 20 February 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
; Address&lt;br /&gt;
: Department of Computer Science (foyer at ground floor)&amp;lt;br/&amp;gt;Celestijnenlaan 200 A&amp;lt;br/&amp;gt;3001 Heverlee&lt;br /&gt;
: ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update]''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''[https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf Developers are not the enemy -- Usable Security for Experts]''' (by Prof. Matthew Smith, University of Bonn)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
:''Bio:'' '''Matthew Smith''' is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at amongst others IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.  &lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''[https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf The Code Behind The Vulnerability]''' (by Barry Dorrans)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
:''Bio:'' '''Barry Dorrans''' is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium&amp;diff=243139</id>
		<title>Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium&amp;diff=243139"/>
				<updated>2018-09-04T12:05:17Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Upcoming chapter meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Belgium|extra=The chapter leader is [mailto:seba@owasp.org Sebastien Deleersnyder]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} &lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
== Upcoming chapter meetings ==&lt;br /&gt;
* '''17 September 2018: Brussels'''&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Two step registration:&lt;br /&gt;
Step 1: Registration via Eventbrite&lt;br /&gt;
Step 2: Pre-registration of participants'ID (European Commission)&lt;br /&gt;
&lt;br /&gt;
Pre-registration of the participants' ID will be needed to enter the security on site!!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 1''': Registration via Eventbrite: https://owasp-belgium-2018-09-17.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
'''Step 2''': Pre-registration of participants'ID: https://ec.europa.eu/eusurvey/runner/OWASPBelgiumChapterMeetingSept17 .&lt;br /&gt;
&lt;br /&gt;
'''The registration deadline for the participants' ID expires on ''Sunday, September 16th midnight''. After this time the registration and admission to the event will not be possible.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Past meetings:&lt;br /&gt;
* 19 March 2018: Brussels (Registration page: https://owasp-belgium-2018-03-19.eventbrite.com)&lt;br /&gt;
* 20 February 2018: Leuven&lt;br /&gt;
See https://www.owasp.org/index.php/Belgium#Chapter_Meetings for more details.&lt;br /&gt;
&lt;br /&gt;
== '''Stay in touch''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]] &lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].&lt;br /&gt;
&lt;br /&gt;
== Structural Sponsors 2018  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2018 and the OWASP BeNeLux Days 2017: &lt;br /&gt;
&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
[https://secwatch.nl https://www.owasp.org/images/f/ff/Secwatch_logo_small.png]&lt;br /&gt;
[[File:Avi Logo Transparent Background 300pix.png|200px|link=https://avinetworks.com/]] &lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|link=http://www.nviso.be]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]&lt;br /&gt;
&lt;br /&gt;
= Chapter Meetings  =&lt;br /&gt;
&lt;br /&gt;
{{:Belgium_Events_2018}}&lt;br /&gt;
&lt;br /&gt;
== Previous Years  ==&lt;br /&gt;
&lt;br /&gt;
Events held in&lt;br /&gt;
[[Belgium Events 2017|2017]],&lt;br /&gt;
[[Belgium Events 2016|2016]],&lt;br /&gt;
[[Belgium Events 2015|2015]],&lt;br /&gt;
[[Belgium Events 2014|2014]],&lt;br /&gt;
[[Belgium Events 2013|2013]],&lt;br /&gt;
[[Belgium Events 2012|2012]],&lt;br /&gt;
[[Belgium Events 2011|2011]],&lt;br /&gt;
[[Belgium Events 2010|2010]],&lt;br /&gt;
[[Belgium Events 2009|2009]],&lt;br /&gt;
[[Belgium Events 2008|2008]],&lt;br /&gt;
[[Belgium Events 2007|2007]],&lt;br /&gt;
[[Belgium Events 2006|2006]],&lt;br /&gt;
[[Belgium Events 2005|2005]].&lt;br /&gt;
&lt;br /&gt;
= Belgium OWASP Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Belgium Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*Sebastien Deleersnyder, Toreon&lt;br /&gt;
*Erwin Geirnaert, Zion Security &lt;br /&gt;
*Lieven Desmet, KU Leuven &lt;br /&gt;
*Bart De Win, PWC&lt;br /&gt;
*David Mathy, Freelance&lt;br /&gt;
*Adolfo Solero, Freelance&lt;br /&gt;
*Stella Dineva, Ingenico Payment Services&lt;br /&gt;
*Thomas Herlea, NVISO&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243138</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243138"/>
				<updated>2018-09-04T12:04:56Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* REGISTRATION */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 17 September 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 17 September 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: European Commission&lt;br /&gt;
: Place Madou, 1&lt;br /&gt;
:1210 - Saint-Josse-Ten-Noode&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID is needed to enter the venue; see registration link below!!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
&lt;br /&gt;
(no sandwiches/drinks, unless further notice)&lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''Docker Threat Modeling and Top 10''' (by Dirk Wetter)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Docker containers offer several advantages for developers. Most notably they fit perfectly in software development processes, they enable fast, reproducible&lt;br /&gt;
deployments and when properly done, with little change the same container can&lt;br /&gt;
run either in a test or production environment.&lt;br /&gt;
&lt;br /&gt;
Despite threatening information out there Docker offers per se also several&lt;br /&gt;
security advantages. However it is important to make use of them and as a&lt;br /&gt;
minimum avoid several pitfalls.  In a worst case scenario this can lead&lt;br /&gt;
otherwise to less security or the security benefits which the containment&lt;br /&gt;
technology offers are not being used at all.&lt;br /&gt;
&lt;br /&gt;
To avoid this a proper fundamental approach is needed.&lt;br /&gt;
&lt;br /&gt;
Thus this talk models first the most important threats to containerized&lt;br /&gt;
environments out there. Based on that the speaker will present 10 security&lt;br /&gt;
bullet points which covers&lt;br /&gt;
&lt;br /&gt;
*  important Do's and Dont's,&lt;br /&gt;
*  for advanced needs how to tighten security further.&lt;br /&gt;
&lt;br /&gt;
At the end the speaker gives advice how to check your Docker and&lt;br /&gt;
Kubernetes security status yourself.&lt;br /&gt;
&lt;br /&gt;
The talk is based on practical experiences at several costumers and on the&lt;br /&gt;
speaker's solid network and systems security expertise.&lt;br /&gt;
&lt;br /&gt;
:''Bio:'' [https://twitter.com/drwetter Dirk Wetter (Ph.D.)] is an independent security consultant with more than 20 years professional experience in information security with a broad technical&lt;br /&gt;
and information security management background.&lt;br /&gt;
&lt;br /&gt;
His primary focus nowadays is around web application security. He has also a&lt;br /&gt;
solid background on network and systems security.&lt;br /&gt;
&lt;br /&gt;
He's also founder and maintainer of the open source project testssl.sh which&lt;br /&gt;
checks the encryption of every SSL/TLS enabled service.&lt;br /&gt;
&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Securing Containers on the High Seas''' (by Jack Mannino)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' It can be a difficult challenge for organizations to securely migrate to containers while shifting processes and security controls. Making the move from legacy virtualization and monolithic deployments to containers requires a solid strategy. Containers offer many inherent security benefits but it’s important to build controls in beyond the containers themselves. From development through container registries and deployment to a runtime environment, it’s important to enforce security and eliminate risks as they’re introduced.&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on scaling container security within an enterprise and building security controls into the way you build, ship, and run containerized services. We will discuss the modern container landscape including different container runtimes and isolation models. We will explore the container lifecycle from your developer’s laptop through your production environment and examine the key security problems to mitigate.&lt;br /&gt;
&lt;br /&gt;
:''Bio:'' [https://twitter.com/jack_mannino Jack Mannino] is the CEO of nVisium. Passionate about security and impossible to keep away from a keyboard, his expertise spans over 15 years of building, breaking, and securing software. Jack founded nVisium in 2009, and since has helped the world's largest software teams enhance security across their software portfolios. He has spoken at conferences globally on topics such as secure design, mobile application security, and cloud-native security.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Two step registration:&lt;br /&gt;
Step 1: Registration via Eventbrite&lt;br /&gt;
Step 2: Pre-registration of participants'ID (European Commission)&lt;br /&gt;
&lt;br /&gt;
Pre-registration of the participants' ID will be needed to enter the security on site!!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Step 1''': Registration via Eventbrite: https://owasp-belgium-2018-09-17.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
'''Step 2''': Pre-registration of participants'ID: https://ec.europa.eu/eusurvey/runner/OWASPBelgiumChapterMeetingSept17 .&lt;br /&gt;
&lt;br /&gt;
'''The registration deadline for the participants' ID expires on ''Sunday, September 16th midnight''. After this time the registration and admission to the event will not be possible.'''&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 19 March 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: ING Belgium&lt;br /&gt;
; Address&lt;br /&gt;
: Cours St Michel 60 - 1040 Brussel&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''KRACKing WPA2 in Practice Using Key Reinstallation Attacks''' (by Mathy Vanhoef, imec-DistriNet-KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
:All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
:Talk talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
:''Bio:'' '''Mathy Vanhoef''' is  a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where is discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Making the web secure by design''' (by Glenn Ten Cate, ING Belgium, and Riccardo Ten Cate, Xebia)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
:''Bio:'' As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
:''Bio:'' As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
*21h00 - 21h30: '''Networking drink''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 20 February 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
; Address&lt;br /&gt;
: Department of Computer Science (foyer at ground floor)&amp;lt;br/&amp;gt;Celestijnenlaan 200 A&amp;lt;br/&amp;gt;3001 Heverlee&lt;br /&gt;
: ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update]''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''[https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf Developers are not the enemy -- Usable Security for Experts]''' (by Prof. Matthew Smith, University of Bonn)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
:''Bio:'' '''Matthew Smith''' is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at amongst others IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.  &lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''[https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf The Code Behind The Vulnerability]''' (by Barry Dorrans)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
:''Bio:'' '''Barry Dorrans''' is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243137</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243137"/>
				<updated>2018-09-04T12:02:10Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* PROGRAM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 17 September 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 17 September 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: European Commission&lt;br /&gt;
: Place Madou, 1&lt;br /&gt;
:1210 - Saint-Josse-Ten-Noode&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID is needed to enter the venue; see registration link below!!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
&lt;br /&gt;
(no sandwiches/drinks, unless further notice)&lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''Docker Threat Modeling and Top 10''' (by Dirk Wetter)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Docker containers offer several advantages for developers. Most notably they fit perfectly in software development processes, they enable fast, reproducible&lt;br /&gt;
deployments and when properly done, with little change the same container can&lt;br /&gt;
run either in a test or production environment.&lt;br /&gt;
&lt;br /&gt;
Despite threatening information out there Docker offers per se also several&lt;br /&gt;
security advantages. However it is important to make use of them and as a&lt;br /&gt;
minimum avoid several pitfalls.  In a worst case scenario this can lead&lt;br /&gt;
otherwise to less security or the security benefits which the containment&lt;br /&gt;
technology offers are not being used at all.&lt;br /&gt;
&lt;br /&gt;
To avoid this a proper fundamental approach is needed.&lt;br /&gt;
&lt;br /&gt;
Thus this talk models first the most important threats to containerized&lt;br /&gt;
environments out there. Based on that the speaker will present 10 security&lt;br /&gt;
bullet points which covers&lt;br /&gt;
&lt;br /&gt;
*  important Do's and Dont's,&lt;br /&gt;
*  for advanced needs how to tighten security further.&lt;br /&gt;
&lt;br /&gt;
At the end the speaker gives advice how to check your Docker and&lt;br /&gt;
Kubernetes security status yourself.&lt;br /&gt;
&lt;br /&gt;
The talk is based on practical experiences at several costumers and on the&lt;br /&gt;
speaker's solid network and systems security expertise.&lt;br /&gt;
&lt;br /&gt;
:''Bio:'' [https://twitter.com/drwetter Dirk Wetter (Ph.D.)] is an independent security consultant with more than 20 years professional experience in information security with a broad technical&lt;br /&gt;
and information security management background.&lt;br /&gt;
&lt;br /&gt;
His primary focus nowadays is around web application security. He has also a&lt;br /&gt;
solid background on network and systems security.&lt;br /&gt;
&lt;br /&gt;
He's also founder and maintainer of the open source project testssl.sh which&lt;br /&gt;
checks the encryption of every SSL/TLS enabled service.&lt;br /&gt;
&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Securing Containers on the High Seas''' (by Jack Mannino)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' It can be a difficult challenge for organizations to securely migrate to containers while shifting processes and security controls. Making the move from legacy virtualization and monolithic deployments to containers requires a solid strategy. Containers offer many inherent security benefits but it’s important to build controls in beyond the containers themselves. From development through container registries and deployment to a runtime environment, it’s important to enforce security and eliminate risks as they’re introduced.&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on scaling container security within an enterprise and building security controls into the way you build, ship, and run containerized services. We will discuss the modern container landscape including different container runtimes and isolation models. We will explore the container lifecycle from your developer’s laptop through your production environment and examine the key security problems to mitigate.&lt;br /&gt;
&lt;br /&gt;
:''Bio:'' [https://twitter.com/jack_mannino Jack Mannino] is the CEO of nVisium. Passionate about security and impossible to keep away from a keyboard, his expertise spans over 15 years of building, breaking, and securing software. Jack founded nVisium in 2009, and since has helped the world's largest software teams enhance security across their software portfolios. He has spoken at conferences globally on topics such as secure design, mobile application security, and cloud-native security.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID will be needed to enter the security on site. &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Therefore, please register via this form at the European Commission: https://ec.europa.eu/eusurvey/runner/OWASPBelgiumChapterMeetingSept17 .&lt;br /&gt;
&lt;br /&gt;
'''The registration deadline expires on ''Sunday, September 16th midnight''. After this time the registration and admission to the event will not be possible.'''&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 19 March 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: ING Belgium&lt;br /&gt;
; Address&lt;br /&gt;
: Cours St Michel 60 - 1040 Brussel&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''KRACKing WPA2 in Practice Using Key Reinstallation Attacks''' (by Mathy Vanhoef, imec-DistriNet-KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
:All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
:Talk talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
:''Bio:'' '''Mathy Vanhoef''' is  a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where is discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Making the web secure by design''' (by Glenn Ten Cate, ING Belgium, and Riccardo Ten Cate, Xebia)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
:''Bio:'' As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
:''Bio:'' As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
*21h00 - 21h30: '''Networking drink''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 20 February 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
; Address&lt;br /&gt;
: Department of Computer Science (foyer at ground floor)&amp;lt;br/&amp;gt;Celestijnenlaan 200 A&amp;lt;br/&amp;gt;3001 Heverlee&lt;br /&gt;
: ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update]''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''[https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf Developers are not the enemy -- Usable Security for Experts]''' (by Prof. Matthew Smith, University of Bonn)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
:''Bio:'' '''Matthew Smith''' is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at amongst others IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.  &lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''[https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf The Code Behind The Vulnerability]''' (by Barry Dorrans)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
:''Bio:'' '''Barry Dorrans''' is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243126</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243126"/>
				<updated>2018-09-04T08:08:32Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* PROGRAM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 17 September 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 17 September 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: European Commission&lt;br /&gt;
: Place Madou, 1&lt;br /&gt;
:1210 - Saint-Josse-Ten-Noode&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID is needed to enter the venue; see registration link below!!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
&lt;br /&gt;
(no sandwiches/drinks, unless further notice)&lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''Docker Threat Modeling and Top 10''' (by Dirk Wetter)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Docker containers offer several advantages for developers. Most notably they fit perfectly in software development processes, they enable fast, reproducible&lt;br /&gt;
deployments and when properly done, with little change the same container can&lt;br /&gt;
run either in a test or production environment.&lt;br /&gt;
&lt;br /&gt;
Despite threatening information out there Docker offers per se also several&lt;br /&gt;
security advantages. However it is important to make use of them and as a&lt;br /&gt;
minimum avoid several pitfalls.  In a worst case scenario this can lead&lt;br /&gt;
otherwise to less security or the security benefits which the containment&lt;br /&gt;
technology offers are not being used at all.&lt;br /&gt;
&lt;br /&gt;
To avoid this a proper fundamental approach is needed.&lt;br /&gt;
&lt;br /&gt;
Thus this talk models first the most important threats to containerized&lt;br /&gt;
environments out there. Based on that the speaker will present 10 security&lt;br /&gt;
bullet points which covers&lt;br /&gt;
&lt;br /&gt;
*  important Do's and Dont's,&lt;br /&gt;
*  for advanced needs how to tighten security further.&lt;br /&gt;
&lt;br /&gt;
At the end the speaker gives advice how to check your Docker and&lt;br /&gt;
Kubernetes security status yourself.&lt;br /&gt;
&lt;br /&gt;
The talk is based on practical experiences at several costumers and on the&lt;br /&gt;
speaker's solid network and systems security expertise.&lt;br /&gt;
&lt;br /&gt;
:''Bio:'' [https://twitter.com/drwetter Dirk Wetter (Ph.D.)] is an independent security consultant with more than 20 years professional experience in information security with a broad technical&lt;br /&gt;
and information security management background.&lt;br /&gt;
&lt;br /&gt;
His primary focus nowadays is around web application security. He has also a&lt;br /&gt;
solid background on network and systems security.&lt;br /&gt;
&lt;br /&gt;
He's also founder and maintainer of the open source project testssl.sh which&lt;br /&gt;
checks the encryption of every SSL/TLS enabled service.&lt;br /&gt;
&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Securing Containers on the High Seas''' (by Jack Mannino)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' It can be a difficult challenge for organizations to securely migrate to containers while shifting processes and security controls. Making the move from legacy virtualization and monolithic deployments to containers requires a solid strategy. Containers offer many inherent security benefits but it’s important to build controls in beyond the containers themselves. From development through container registries and deployment to a runtime environment, it’s important to enforce security and eliminate risks as they’re introduced.&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on scaling container security within an enterprise and building security controls into the way you build, ship, and run containerized services. We will discuss the modern container landscape including different container runtimes and isolation models. We will explore the container lifecycle from your developer’s laptop through your production environment and examine the key security problems to mitigate.&lt;br /&gt;
&lt;br /&gt;
:''Bio:'' [https://twitter.com/jack_mannino Jack Mannino] is the CEO of nVisium. Passionate about security and impossible to keep away from a keyboard, his expertise spans over 15 years of building, breaking, and securing software. Jack founded nVisium in 2009, and since has helped the world's largest software teams enhance security across their software portfolios. He has spoken at conferences globally on topics such as secure design, mobile application security, and cloud-native security.&lt;br /&gt;
*21h00 - 21h30: '''Networking drink''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID will be needed to enter the security on site. &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Therefore, please register via this form at the European Commission: https://ec.europa.eu/eusurvey/runner/OWASPBelgiumChapterMeetingSept17 .&lt;br /&gt;
&lt;br /&gt;
'''The registration deadline expires on ''Sunday, September 16th midnight''. After this time the registration and admission to the event will not be possible.'''&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 19 March 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: ING Belgium&lt;br /&gt;
; Address&lt;br /&gt;
: Cours St Michel 60 - 1040 Brussel&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''KRACKing WPA2 in Practice Using Key Reinstallation Attacks''' (by Mathy Vanhoef, imec-DistriNet-KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
:All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
:Talk talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
:''Bio:'' '''Mathy Vanhoef''' is  a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where is discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Making the web secure by design''' (by Glenn Ten Cate, ING Belgium, and Riccardo Ten Cate, Xebia)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
:''Bio:'' As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
:''Bio:'' As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
*21h00 - 21h30: '''Networking drink''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 20 February 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
; Address&lt;br /&gt;
: Department of Computer Science (foyer at ground floor)&amp;lt;br/&amp;gt;Celestijnenlaan 200 A&amp;lt;br/&amp;gt;3001 Heverlee&lt;br /&gt;
: ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update]''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''[https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf Developers are not the enemy -- Usable Security for Experts]''' (by Prof. Matthew Smith, University of Bonn)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
:''Bio:'' '''Matthew Smith''' is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at amongst others IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.  &lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''[https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf The Code Behind The Vulnerability]''' (by Barry Dorrans)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
:''Bio:'' '''Barry Dorrans''' is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243125</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=243125"/>
				<updated>2018-09-04T08:08:07Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* PROGRAM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 17 September 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 17 September 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: European Commission&lt;br /&gt;
: Place Madou, 1&lt;br /&gt;
:1210 - Saint-Josse-Ten-Noode&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID is needed to enter the venue; see registration link below!!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
(no sandwiches/drinks, unless further notice)&lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''Docker Threat Modeling and Top 10''' (by Dirk Wetter)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Docker containers offer several advantages for developers. Most notably they fit perfectly in software development processes, they enable fast, reproducible&lt;br /&gt;
deployments and when properly done, with little change the same container can&lt;br /&gt;
run either in a test or production environment.&lt;br /&gt;
&lt;br /&gt;
Despite threatening information out there Docker offers per se also several&lt;br /&gt;
security advantages. However it is important to make use of them and as a&lt;br /&gt;
minimum avoid several pitfalls.  In a worst case scenario this can lead&lt;br /&gt;
otherwise to less security or the security benefits which the containment&lt;br /&gt;
technology offers are not being used at all.&lt;br /&gt;
&lt;br /&gt;
To avoid this a proper fundamental approach is needed.&lt;br /&gt;
&lt;br /&gt;
Thus this talk models first the most important threats to containerized&lt;br /&gt;
environments out there. Based on that the speaker will present 10 security&lt;br /&gt;
bullet points which covers&lt;br /&gt;
&lt;br /&gt;
*  important Do's and Dont's,&lt;br /&gt;
*  for advanced needs how to tighten security further.&lt;br /&gt;
&lt;br /&gt;
At the end the speaker gives advice how to check your Docker and&lt;br /&gt;
Kubernetes security status yourself.&lt;br /&gt;
&lt;br /&gt;
The talk is based on practical experiences at several costumers and on the&lt;br /&gt;
speaker's solid network and systems security expertise.&lt;br /&gt;
&lt;br /&gt;
:''Bio:'' [https://twitter.com/drwetter Dirk Wetter (Ph.D.)] is an independent security consultant with more than 20 years professional experience in information security with a broad technical&lt;br /&gt;
and information security management background.&lt;br /&gt;
&lt;br /&gt;
His primary focus nowadays is around web application security. He has also a&lt;br /&gt;
solid background on network and systems security.&lt;br /&gt;
&lt;br /&gt;
He's also founder and maintainer of the open source project testssl.sh which&lt;br /&gt;
checks the encryption of every SSL/TLS enabled service.&lt;br /&gt;
&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Securing Containers on the High Seas''' (by Jack Mannino)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' It can be a difficult challenge for organizations to securely migrate to containers while shifting processes and security controls. Making the move from legacy virtualization and monolithic deployments to containers requires a solid strategy. Containers offer many inherent security benefits but it’s important to build controls in beyond the containers themselves. From development through container registries and deployment to a runtime environment, it’s important to enforce security and eliminate risks as they’re introduced.&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on scaling container security within an enterprise and building security controls into the way you build, ship, and run containerized services. We will discuss the modern container landscape including different container runtimes and isolation models. We will explore the container lifecycle from your developer’s laptop through your production environment and examine the key security problems to mitigate.&lt;br /&gt;
&lt;br /&gt;
:''Bio:'' [https://twitter.com/jack_mannino Jack Mannino] is the CEO of nVisium. Passionate about security and impossible to keep away from a keyboard, his expertise spans over 15 years of building, breaking, and securing software. Jack founded nVisium in 2009, and since has helped the world's largest software teams enhance security across their software portfolios. He has spoken at conferences globally on topics such as secure design, mobile application security, and cloud-native security.&lt;br /&gt;
*21h00 - 21h30: '''Networking drink''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID will be needed to enter the security on site. &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Therefore, please register via this form at the European Commission: https://ec.europa.eu/eusurvey/runner/OWASPBelgiumChapterMeetingSept17 .&lt;br /&gt;
&lt;br /&gt;
'''The registration deadline expires on ''Sunday, September 16th midnight''. After this time the registration and admission to the event will not be possible.'''&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 19 March 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: ING Belgium&lt;br /&gt;
; Address&lt;br /&gt;
: Cours St Michel 60 - 1040 Brussel&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''KRACKing WPA2 in Practice Using Key Reinstallation Attacks''' (by Mathy Vanhoef, imec-DistriNet-KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
:All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
:Talk talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
:''Bio:'' '''Mathy Vanhoef''' is  a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where is discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Making the web secure by design''' (by Glenn Ten Cate, ING Belgium, and Riccardo Ten Cate, Xebia)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
:''Bio:'' As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
:''Bio:'' As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
*21h00 - 21h30: '''Networking drink''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 20 February 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
; Address&lt;br /&gt;
: Department of Computer Science (foyer at ground floor)&amp;lt;br/&amp;gt;Celestijnenlaan 200 A&amp;lt;br/&amp;gt;3001 Heverlee&lt;br /&gt;
: ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update]''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''[https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf Developers are not the enemy -- Usable Security for Experts]''' (by Prof. Matthew Smith, University of Bonn)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
:''Bio:'' '''Matthew Smith''' is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at amongst others IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.  &lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''[https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf The Code Behind The Vulnerability]''' (by Barry Dorrans)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
:''Bio:'' '''Barry Dorrans''' is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium&amp;diff=242726</id>
		<title>Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium&amp;diff=242726"/>
				<updated>2018-08-22T12:39:16Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Upcoming chapter meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Belgium|extra=The chapter leader is [mailto:seba@owasp.org Sebastien Deleersnyder]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} &lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
== Upcoming chapter meetings ==&lt;br /&gt;
* '''17 September 2018: Brussels'''&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID is needed to enter the venue. More info on the chapter meeting tab !!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
'''''The registration deadline expires on Sunday, September 16th midnight. After this time the registration and admission to the event will not be possible.'''''&lt;br /&gt;
&lt;br /&gt;
Past meetings:&lt;br /&gt;
* 19 March 2018: Brussels (Registration page: https://owasp-belgium-2018-03-19.eventbrite.com)&lt;br /&gt;
* 20 February 2018: Leuven&lt;br /&gt;
See https://www.owasp.org/index.php/Belgium#Chapter_Meetings for more details.&lt;br /&gt;
&lt;br /&gt;
== '''Stay in touch''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]] &lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].&lt;br /&gt;
&lt;br /&gt;
== Structural Sponsors 2018  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2018 and the OWASP BeNeLux Days 2017: &lt;br /&gt;
&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
[https://secwatch.nl https://www.owasp.org/images/f/ff/Secwatch_logo_small.png]&lt;br /&gt;
[[File:Avi Logo Transparent Background 300pix.png|200px|link=https://avinetworks.com/]] &lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|link=http://www.nviso.be]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]&lt;br /&gt;
&lt;br /&gt;
= Chapter Meetings  =&lt;br /&gt;
&lt;br /&gt;
{{:Belgium_Events_2018}}&lt;br /&gt;
&lt;br /&gt;
== Previous Years  ==&lt;br /&gt;
&lt;br /&gt;
Events held in&lt;br /&gt;
[[Belgium Events 2017|2017]],&lt;br /&gt;
[[Belgium Events 2016|2016]],&lt;br /&gt;
[[Belgium Events 2015|2015]],&lt;br /&gt;
[[Belgium Events 2014|2014]],&lt;br /&gt;
[[Belgium Events 2013|2013]],&lt;br /&gt;
[[Belgium Events 2012|2012]],&lt;br /&gt;
[[Belgium Events 2011|2011]],&lt;br /&gt;
[[Belgium Events 2010|2010]],&lt;br /&gt;
[[Belgium Events 2009|2009]],&lt;br /&gt;
[[Belgium Events 2008|2008]],&lt;br /&gt;
[[Belgium Events 2007|2007]],&lt;br /&gt;
[[Belgium Events 2006|2006]],&lt;br /&gt;
[[Belgium Events 2005|2005]].&lt;br /&gt;
&lt;br /&gt;
= Belgium OWASP Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Belgium Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*Sebastien Deleersnyder, Toreon&lt;br /&gt;
*Erwin Geirnaert, Zion Security &lt;br /&gt;
*Lieven Desmet, KU Leuven &lt;br /&gt;
*Bart De Win, PWC&lt;br /&gt;
*David Mathy, Freelance&lt;br /&gt;
*Adolfo Solero, Freelance&lt;br /&gt;
*Stella Dineva, Ingenico Payment Services&lt;br /&gt;
*Thomas Herlea, NVISO&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=242725</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=242725"/>
				<updated>2018-08-22T12:33:09Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* REGISTRATION */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 17 September 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 17 September 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: European Commission&lt;br /&gt;
: Place Madou, 1&lt;br /&gt;
:1210 - Saint-Josse-Ten-Noode&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID is needed to enter the venue; see registration link below!!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''TBD''' (by TBD)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' TBD&lt;br /&gt;
:''Bio:'' TBD&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''TBD''' (by TBD)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' TBD&lt;br /&gt;
:''Bio:'' TBD&lt;br /&gt;
*21h00 - 21h30: '''Networking drink''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID will be needed to enter the security on site. &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Therefore, please register via this form at the European Commission: https://ec.europa.eu/eusurvey/runner/OWASPBelgiumChapterMeetingSept17 .&lt;br /&gt;
&lt;br /&gt;
'''The registration deadline expires on ''Sunday, September 16th midnight''. After this time the registration and admission to the event will not be possible.'''&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 19 March 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: ING Belgium&lt;br /&gt;
; Address&lt;br /&gt;
: Cours St Michel 60 - 1040 Brussel&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''KRACKing WPA2 in Practice Using Key Reinstallation Attacks''' (by Mathy Vanhoef, imec-DistriNet-KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
:All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
:Talk talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
:''Bio:'' '''Mathy Vanhoef''' is  a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where is discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Making the web secure by design''' (by Glenn Ten Cate, ING Belgium, and Riccardo Ten Cate, Xebia)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
:''Bio:'' As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
:''Bio:'' As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
*21h00 - 21h30: '''Networking drink''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 20 February 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
; Address&lt;br /&gt;
: Department of Computer Science (foyer at ground floor)&amp;lt;br/&amp;gt;Celestijnenlaan 200 A&amp;lt;br/&amp;gt;3001 Heverlee&lt;br /&gt;
: ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update]''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''[https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf Developers are not the enemy -- Usable Security for Experts]''' (by Prof. Matthew Smith, University of Bonn)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
:''Bio:'' '''Matthew Smith''' is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at amongst others IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.  &lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''[https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf The Code Behind The Vulnerability]''' (by Barry Dorrans)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
:''Bio:'' '''Barry Dorrans''' is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=242722</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=242722"/>
				<updated>2018-08-22T11:37:24Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: sept 17: template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 17 September 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 17 September 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: European Commission&lt;br /&gt;
: Place Madou, 1&lt;br /&gt;
:1210 - Saint-Josse-Ten-Noode&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID is needed to enter the venue; see registration link below!!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''TBD''' (by TBD)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' TBD&lt;br /&gt;
:''Bio:'' TBD&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''TBD''' (by TBD)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' TBD&lt;br /&gt;
:''Bio:'' TBD&lt;br /&gt;
*21h00 - 21h30: '''Networking drink''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color: red&amp;quot;&amp;gt;&lt;br /&gt;
Pre-registration of the participants' ID will be needed to enter the security on site. &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Therefore, please register via this form at the European Commission: https://ec.europa.eu/eusurvey/runner/OWASPBelgiumChapterMeetingSept17 .&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 19 March 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: ING Belgium&lt;br /&gt;
; Address&lt;br /&gt;
: Cours St Michel 60 - 1040 Brussel&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''KRACKing WPA2 in Practice Using Key Reinstallation Attacks''' (by Mathy Vanhoef, imec-DistriNet-KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
:All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
:Talk talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
:''Bio:'' '''Mathy Vanhoef''' is  a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where is discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Making the web secure by design''' (by Glenn Ten Cate, ING Belgium, and Riccardo Ten Cate, Xebia)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
:''Bio:'' As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
:''Bio:'' As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
*21h00 - 21h30: '''Networking drink''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 20 February 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
; Address&lt;br /&gt;
: Department of Computer Science (foyer at ground floor)&amp;lt;br/&amp;gt;Celestijnenlaan 200 A&amp;lt;br/&amp;gt;3001 Heverlee&lt;br /&gt;
: ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update]''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''[https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf Developers are not the enemy -- Usable Security for Experts]''' (by Prof. Matthew Smith, University of Bonn)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
:''Bio:'' '''Matthew Smith''' is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at amongst others IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.  &lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''[https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf The Code Behind The Vulnerability]''' (by Barry Dorrans)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
:''Bio:'' '''Barry Dorrans''' is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=238421</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=238421"/>
				<updated>2018-03-07T15:33:22Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* PROGRAM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 19 March 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: ING Belgium&lt;br /&gt;
; Address&lt;br /&gt;
: Cours St Michel 60 - 1040 Brussel&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''KRACKing WPA2 in Practice Using Key Reinstallation Attacks''' (by Mathy Vanhoef, imec-DistriNet-KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
:All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
:Talk talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
:''Bio:'' '''Mathy Vanhoef''' is  a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where is discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
*20h00 - 20h10: break &amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Making the web secure by design''' (by Glenn Ten Cate, ING Belgium, and Riccardo Ten Cate, Xebia)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
:''Bio:'' As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
:''Bio:'' As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
*21h00 - 21h30: '''Networking drink''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 20 February 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
; Address&lt;br /&gt;
: Department of Computer Science (foyer at ground floor)&amp;lt;br/&amp;gt;Celestijnenlaan 200 A&amp;lt;br/&amp;gt;3001 Heverlee&lt;br /&gt;
: ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update]''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''[https://schd.ws/hosted_files/secappdev2018/a9/Developer%20are%20not%20the%20enemy%20SecAppDev%20web.pdf Developers are not the enemy -- Usable Security for Experts]''' (by Prof. Matthew Smith, University of Bonn)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
:''Bio:'' '''Matthew Smith''' is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at amongst others IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.  &lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''[https://schd.ws/hosted_files/secappdev2018/75/The%20code%20behind%20the%20vulnerability.pdf The Code Behind The Vulnerability]''' (by Barry Dorrans)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
:''Bio:'' '''Barry Dorrans''' is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium&amp;diff=238193</id>
		<title>Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium&amp;diff=238193"/>
				<updated>2018-03-01T14:12:12Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Belgium|extra=The chapter leader is [mailto:seba@owasp.org Sebastien Deleersnyder]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} &lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
== Upcoming chapter meetings ==&lt;br /&gt;
&lt;br /&gt;
* '''19 March 2018: Brussels''' (Registration page: https://owasp-belgium-2018-03-19.eventbrite.com)&lt;br /&gt;
Past meetings:&lt;br /&gt;
* 20 February 2018: Leuven&lt;br /&gt;
See https://www.owasp.org/index.php/Belgium#Chapter_Meetings for more details.&lt;br /&gt;
&lt;br /&gt;
== '''Stay in touch''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]] &lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].&lt;br /&gt;
&lt;br /&gt;
== Structural Sponsors 2018  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2018 and the OWASP BeNeLux Days 2017: &lt;br /&gt;
&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
[https://secwatch.nl https://www.owasp.org/images/f/ff/Secwatch_logo_small.png]&lt;br /&gt;
[[File:Avi Logo Transparent Background 300pix.png|200px|link=https://avinetworks.com/]] &lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|link=http://www.nviso.be]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]&lt;br /&gt;
&lt;br /&gt;
= Chapter Meetings  =&lt;br /&gt;
&lt;br /&gt;
{{:Belgium_Events_2018}}&lt;br /&gt;
&lt;br /&gt;
== Previous Years  ==&lt;br /&gt;
&lt;br /&gt;
Events held in&lt;br /&gt;
[[Belgium Events 2017|2017]],&lt;br /&gt;
[[Belgium Events 2016|2016]],&lt;br /&gt;
[[Belgium Events 2015|2015]],&lt;br /&gt;
[[Belgium Events 2014|2014]],&lt;br /&gt;
[[Belgium Events 2013|2013]],&lt;br /&gt;
[[Belgium Events 2012|2012]],&lt;br /&gt;
[[Belgium Events 2011|2011]],&lt;br /&gt;
[[Belgium Events 2010|2010]],&lt;br /&gt;
[[Belgium Events 2009|2009]],&lt;br /&gt;
[[Belgium Events 2008|2008]],&lt;br /&gt;
[[Belgium Events 2007|2007]],&lt;br /&gt;
[[Belgium Events 2006|2006]],&lt;br /&gt;
[[Belgium Events 2005|2005]].&lt;br /&gt;
&lt;br /&gt;
= Belgium OWASP Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Belgium Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*Sebastien Deleersnyder, Toreon&lt;br /&gt;
*Erwin Geirnaert, Zion Security &lt;br /&gt;
*Lieven Desmet, KU Leuven &lt;br /&gt;
*Bart De Win, PWC&lt;br /&gt;
*David Mathy, Freelance&lt;br /&gt;
*Adolfo Solero, Freelance&lt;br /&gt;
*Stella Dineva, Ingenico Payment Services&lt;br /&gt;
*Thomas Herlea, NVISO&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium&amp;diff=238192</id>
		<title>Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium&amp;diff=238192"/>
				<updated>2018-03-01T14:10:54Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Belgium|extra=The chapter leader is [mailto:seba@owasp.org Sebastien Deleersnyder]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} &lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
== Upcoming chapter meetings ==&lt;br /&gt;
&lt;br /&gt;
* 19 March 2018: Brussels&lt;br /&gt;
Past meetings:&lt;br /&gt;
* 20 February 2018: Leuven&lt;br /&gt;
See https://www.owasp.org/index.php/Belgium#Chapter_Meetings for more details.&lt;br /&gt;
&lt;br /&gt;
== '''Stay in touch''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]] &lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].&lt;br /&gt;
&lt;br /&gt;
== Structural Sponsors 2018  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2018 and the OWASP BeNeLux Days 2017: &lt;br /&gt;
&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
[https://secwatch.nl https://www.owasp.org/images/f/ff/Secwatch_logo_small.png]&lt;br /&gt;
[[File:Avi Logo Transparent Background 300pix.png|200px|link=https://avinetworks.com/]] &lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|link=http://www.nviso.be]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]&lt;br /&gt;
&lt;br /&gt;
= Chapter Meetings  =&lt;br /&gt;
&lt;br /&gt;
{{:Belgium_Events_2018}}&lt;br /&gt;
&lt;br /&gt;
== Previous Years  ==&lt;br /&gt;
&lt;br /&gt;
Events held in&lt;br /&gt;
[[Belgium Events 2017|2017]],&lt;br /&gt;
[[Belgium Events 2016|2016]],&lt;br /&gt;
[[Belgium Events 2015|2015]],&lt;br /&gt;
[[Belgium Events 2014|2014]],&lt;br /&gt;
[[Belgium Events 2013|2013]],&lt;br /&gt;
[[Belgium Events 2012|2012]],&lt;br /&gt;
[[Belgium Events 2011|2011]],&lt;br /&gt;
[[Belgium Events 2010|2010]],&lt;br /&gt;
[[Belgium Events 2009|2009]],&lt;br /&gt;
[[Belgium Events 2008|2008]],&lt;br /&gt;
[[Belgium Events 2007|2007]],&lt;br /&gt;
[[Belgium Events 2006|2006]],&lt;br /&gt;
[[Belgium Events 2005|2005]].&lt;br /&gt;
&lt;br /&gt;
= Belgium OWASP Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Belgium Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*Sebastien Deleersnyder, Toreon&lt;br /&gt;
*Erwin Geirnaert, Zion Security &lt;br /&gt;
*Lieven Desmet, KU Leuven &lt;br /&gt;
*Bart De Win, PWC&lt;br /&gt;
*David Mathy, Freelance&lt;br /&gt;
*Adolfo Solero, Freelance&lt;br /&gt;
*Stella Dineva, Ingenico Payment Services&lt;br /&gt;
*Thomas Herlea, NVISO&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=238191</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=238191"/>
				<updated>2018-03-01T11:52:17Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: Added chapter meeting of 19 March&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 19 March 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 19 March 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: ING Belgium&lt;br /&gt;
; Address&lt;br /&gt;
: TBD&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''KRACKing WPA2 in Practice Using Key Reinstallation Attacks''' (by Mathy Vanhoef, imec-DistriNet-KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  This talk presents the key reinstallation attack against WPA2 (KRACK attack). It abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key’s associated parameters such as transmit nonces and receive replay counters. Several cryptographic Wi-Fi handshakes are affected by the attack.&lt;br /&gt;
:All protected Wi-Fi networks use the 4-way handshake to generate a fresh session key. So far, this 14-year-old handshake has remained free from attacks. However, we show that the 4-way handshake is vulnerable to a key reinstallation attack. Here, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying handshake messages. When reinstalling the key, associated parameters such as the incremental transmit packet number (nonce) and receive packet number (replay counter) are reset to their initial value.&lt;br /&gt;
:Talk talk also discusses the vulnerability disclosure process that was followed. Since the discovery affected numerous vendors, coordinating the disclosure was non-trivial.&lt;br /&gt;
:''Bio:'' '''Mathy Vanhoef''' is  a postdoctoral researcher at KU Leuven. He did his PhD on the security of WPA-TKIP, TLS, and RC4. His research interest is in computer security with a focus on wireless security (e.g. Wi-Fi), network protocols in general, the RC4 stream cipher (where is discovered the RC NOMORE attack), and software security (discovering and exploiting vulnerabilities). Currently his main research is about automatically discovering vulnerabilities in network protocol implementations, and proving the correctness of protocol implementations.&lt;br /&gt;
*20h10 - 21h00: '''Making the web secure by design''' (by Glenn Ten Cate, ING Belgium, and Riccardo Ten Cate, Xebia)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Education is the first step in the Secure Software Development Lifecycle. The free OWASP Security Knowledge Framework (SKF) is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. This talk will help you as a developer to become THE Neo of your development team. We will show how you can do security by design and introduce other quality gates into your development pipeline to ensure high end quality and security of your project.&lt;br /&gt;
:''Bio:'' As a coder, hacker, speaker, trainer and security researcher employed at ING Belgium, '''Glenn Ten Cate'''  has over 10 years experience in the field of security. One of the founders of defensive development [defdev] a security training and conference series dedicated to helping you build and maintain secure software and also speaking at multiple other security conferences in the world. His goals is to create an open-source software development life cycle with the tools and knowledge gathered over the years.&lt;br /&gt;
:''Bio:'' As a penetration tester from the Netherlands employed at Xebia, '''Riccardo Ten Cate''' specialises in web-application security and has extensive knowledge in securing web applications in multiple coding languages. He is also a specialist in setting up Secure Software Development Life Cycles.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-03-19.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 20 February 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
; Address&lt;br /&gt;
: Department of Computer Science (foyer at ground floor)&amp;lt;br/&amp;gt;Celestijnenlaan 200 A&amp;lt;br/&amp;gt;3001 Heverlee&lt;br /&gt;
: ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/7/7a/Owasp_Belgium_update_2018-02-20_v1.pdf OWASP Update]''' (by Sebastien Deleersnyder, OWASP) &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''Developers are not the enemy -- Usable Security for Experts''' (by Prof. Matthew Smith, University of Bonn)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
:''Bio:'' '''Matthew Smith''' is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at amongst others IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.  &lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''The Code Behind The Vulnerability''' (by Barry Dorrans)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
:''Bio:'' '''Barry Dorrans''' is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium&amp;diff=236970</id>
		<title>Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium&amp;diff=236970"/>
				<updated>2018-01-22T15:19:52Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Belgium|extra=The chapter leader is [mailto:seba@owasp.org Sebastien Deleersnyder]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} &lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
== Upcoming chapter meetings ==&lt;br /&gt;
&lt;br /&gt;
* 20 February 2018: Leuven&lt;br /&gt;
&lt;br /&gt;
See https://www.owasp.org/index.php/Belgium#Chapter_Meetings for more details.&lt;br /&gt;
&lt;br /&gt;
== '''Stay in touch''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]] &lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].&lt;br /&gt;
&lt;br /&gt;
== Structural Sponsors 2017  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2017 and the OWASP BeNeLux Days 2016: &lt;br /&gt;
&lt;br /&gt;
[[File:VeraCode logo.png|250px|link=https://www.veracode.com]] &lt;br /&gt;
[[File:Vest.jpg|250px|link=http://www.vest.nl]] &lt;br /&gt;
[[File:Intigriti_verticaal.jpg|link=http://www.intigriti.be]] &lt;br /&gt;
[[File:Ecurify-2016.png|link=http://www.securify.nl]] &lt;br /&gt;
[[File:HPE_logo_250.png|link=http://www8.hp.com/nl/nl/software-solutions/enterprise-security.html]] &lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:Zionsecurity.jpg|link=http://www.zionsecurity.com]] &lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|link=http://www.nviso.be]] &lt;br /&gt;
[[File:Whitehat-security_hor.jpg|link=http://www.whitehatsec.com]] &lt;br /&gt;
&lt;br /&gt;
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]&lt;br /&gt;
&lt;br /&gt;
= Chapter Meetings  =&lt;br /&gt;
&lt;br /&gt;
{{:Belgium_Events_2018}}&lt;br /&gt;
&lt;br /&gt;
== Previous Years  ==&lt;br /&gt;
&lt;br /&gt;
Events held in&lt;br /&gt;
[[Belgium Events 2017|2017]],&lt;br /&gt;
[[Belgium Events 2016|2016]],&lt;br /&gt;
[[Belgium Events 2015|2015]],&lt;br /&gt;
[[Belgium Events 2014|2014]],&lt;br /&gt;
[[Belgium Events 2013|2013]],&lt;br /&gt;
[[Belgium Events 2012|2012]],&lt;br /&gt;
[[Belgium Events 2011|2011]],&lt;br /&gt;
[[Belgium Events 2010|2010]],&lt;br /&gt;
[[Belgium Events 2009|2009]],&lt;br /&gt;
[[Belgium Events 2008|2008]],&lt;br /&gt;
[[Belgium Events 2007|2007]],&lt;br /&gt;
[[Belgium Events 2006|2006]],&lt;br /&gt;
[[Belgium Events 2005|2005]].&lt;br /&gt;
&lt;br /&gt;
= Belgium OWASP Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Belgium Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*Sebastien Deleersnyder, Toreon&lt;br /&gt;
*Erwin Geirnaert, Zion Security &lt;br /&gt;
*Lieven Desmet, KU Leuven &lt;br /&gt;
*Bart De Win, PWC&lt;br /&gt;
*David Mathy, Freelance&lt;br /&gt;
*Adolfo Solero, Freelance&lt;br /&gt;
*Stella Dineva, Ingenico Payment Services&lt;br /&gt;
*Thomas Herlea, NVISO&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=236969</id>
		<title>Belgium Events 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2018&amp;diff=236969"/>
				<updated>2018-01-22T15:11:05Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: Created page with &amp;quot;&amp;lt;noinclude&amp;gt; These are the 2018 events of the OWASP Belgium Chapter.  Previous year: 2017. &amp;lt;/noinclude&amp;gt; == 20 February 2018 Meeting ==  ===...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2018 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2017|2017]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 20 February 2018 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 20 February 2018&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://distrinet.cs.kuleuven.be DistriNet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2018-02-19 to 2018-02-23.)&lt;br /&gt;
; Address&lt;br /&gt;
: Department of Computer Science (foyer at ground floor)&amp;lt;br/&amp;gt;Celestijnenlaan 200 A&amp;lt;br/&amp;gt;3001 Heverlee&lt;br /&gt;
: ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''OWASP Update''' &amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''Developers are not the enemy -- Usable Security for Experts''' (by Prof. Matthew Smith, University of Bonn)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Usability problems are a major cause of many of today's IT-security incidents. Security systems are often too complicated, time-consuming, and error prone. For more than a decade researchers in the domain of usable security (USEC) have attempted to combat these problems by conducting interdisciplinary research focusing on the root causes of the problems and on the creation of usable security mechanisms. While major improvements have been made, to date USEC research has focused almost entirely on the non-expert end-user. However, many of the most catastrophic security incidents were not caused by end-users, but by developers or administrators. Heartbleed and Shellshock were both caused by single developers yet had global consequences. The Sony hack in 2014 compromised an entire multi-national IT-infrastructure and misappropriated over 100 TB of data, unnoticed. Fundamentally, every software vulnerability and misconfigured system is caused by developers or administrators making mistakes, but very little research has been done into the underlying causalities and possible mitigation strategies. In this talk we will explore the transition from end-user to expert usable security research and look at several application areas, including TLS, passwords, malware analysis and vulnerability analysis.&lt;br /&gt;
:''Bio:'' '''Matthew Smith''' is  a Professor for Usable Security and Privacy at the University of Bonn. His research is focused on human factors of security and privacy mechanisms with a wide range of application areas, including TLS and network security, authentication, mobile and app security and, most recently, usable security for developers and administrators. His work has been published at amongst others IEEE S&amp;amp;P, ACM CCS, USENIX Security, NDSS, ACM SIGCHI and SOUPS the Symposium on Usable Security and Privacy. In 2015 his ERC Starting Grant &amp;quot;Frontiers of Usable Security&amp;quot; was selected for funding.  &lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''The Code Behind The Vulnerability''' (by Barry Dorrans)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Everyone makes security mistakes, and that includes Microsoft (seriously!). Many developers can spot and prevent vulnerabilities listed in the OWASP top 10. But that narrative changes when we look beyond the scope of the OWASP top 10. Compared to some more recent attacks, fixing XSS or SQL injection almost seems easy. In this session, we dive into a couple of .NET core cases that have been reported to the Microsoft Security Response Center (MSRC). Mind you; these vulnerabilities are not just framework vulnerabilities. Instead, they are coding patterns that you may have introduced in your applications. Examples are issues with hash tables, compression, encryption, regular expressions and more. In this session, you will learn how to spot these vulnerabilities in your code. On top of that, you will walk away with the skills to fix them.&lt;br /&gt;
:''Bio:'' '''Barry Dorrans''' is the .NET Security Czar, which means he tries to tell everyone else how to code securely and taking the credit when it goes right, as well as running the .NET Core Bug Bounty. He also ends up triaging publicly and privately reported vulnerabilities when it goes wrong before getting someone else to fix the mistakes. This he gets all the fun and none of the real work, aside from the endless stress wondering when the next vulnerability will be discovered.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2018-02-20.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Day_2017&amp;diff=234852</id>
		<title>OWASP BeNeLux-Day 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Day_2017&amp;diff=234852"/>
				<updated>2017-11-02T19:53:37Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* OWASP BeNeLux conference is free, but registration is required! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Header-BNL-2017.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
== Keynote speaker ==&lt;br /&gt;
{{#switchtablink:Conferenceday|&amp;lt;p&amp;gt;&lt;br /&gt;
*  Jacoba Sieders&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday|&amp;lt;p&amp;gt;&lt;br /&gt;
* Achim D. Brucker&lt;br /&gt;
* Lieven Desmet&lt;br /&gt;
* Philippe De Ryck&lt;br /&gt;
* Sebastian Lekies&lt;br /&gt;
* Matias Madou&lt;br /&gt;
* Mattijs van Ommeren&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers ==&lt;br /&gt;
{{#switchtablink:Trainingday|&amp;lt;p&amp;gt;&lt;br /&gt;
* Nanne Baars&lt;br /&gt;
* Sebastien Deleersnyder&lt;br /&gt;
* Bart De Win&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]]&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Joren Poll, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl17 #owaspbnl17]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]]&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training is reserved for OWASP members, and registration is required! ==&lt;br /&gt;
To support the OWASP organisation, we ask training attendees to consider becoming an OWASP member, it's only US$50!&lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[https://owasp-benelux-day-2017.eventbrite.com Register now!]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The venue is located:&lt;br /&gt;
&lt;br /&gt;
'''Interpolis''' &lt;br /&gt;
&lt;br /&gt;
Spoorlaan 298, &lt;br /&gt;
&lt;br /&gt;
5017JZ Tilburg&lt;br /&gt;
&lt;br /&gt;
Netherlands&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
Map: [https://goo.gl/maps/5CJYYSMAJD92 Google map]&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
=== Trainingday is November 23rd  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room TBA !! Room TBA !! Room TBA&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | WebGoat - Teaching application security 101]] &amp;lt;br&amp;gt;by [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | Nanne Baars]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[OWASP_BeNeLux-Day_2017#Whiteboard_Hacking_aka_Hands-on_Threat Modeling_by_Sebastien Deleersnyder  | Whiteboard Hacking aka Hands-on Threat Modeling]] &amp;lt;br&amp;gt;by [[OWASP_BeNeLux-Day_2017#Whiteboard_Hacking_aka_Hands-on_Threat Modeling_by_Sebastien Deleersnyder | Sebastien Deleersnyder]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[OWASP_BeNeLux-Day_2017#Secure_Development:_Models_and_best_practices_by_Bart_De_Win | Secure Development: Models and best practices]] &amp;lt;br&amp;gt;by [[OWASP_BeNeLux-Day_2017#Secure_Development:_Models_and_best_practices_by_Bart_De_Win | Bart De Win]]&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Trainings ==&lt;br /&gt;
=== WebGoat - Teaching application security 101 by Nanne Baars ===&lt;br /&gt;
====Topic(s) ====&lt;br /&gt;
* Web Application Breaker&lt;br /&gt;
* Other&lt;br /&gt;
====Keywords ====&lt;br /&gt;
WebGoat application, security teaching secure development&lt;br /&gt;
&lt;br /&gt;
====Abstract ====&lt;br /&gt;
A good defense against insecure code requires understanding the mechanics behind how attackers exploit simple programming mistakes.&lt;br /&gt;
The WebGoat team will walk through exercises like SQL Injection, XSS, XXE, CSRF, ... and demonstrate how these exploits work.&lt;br /&gt;
 &lt;br /&gt;
We will show you how you can use WebGoat to train your developers to avoid these simple but common programming mistakes.&lt;br /&gt;
 &lt;br /&gt;
We also show you how to extend WebGoat to create lessons specific to your environment.&lt;br /&gt;
Join us to learn the most basic, but common, application security problems.&lt;br /&gt;
&lt;br /&gt;
Tired of all the lessons? During the training we will host a small CTF competition which you can take a shot at and compete with each other...&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Nanne Baars works as a security consultant &amp;amp; developer at JDriven and is one of the primary developers of WebGoat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Whiteboard Hacking aka Hands-on Threat Modeling by Sebastien Deleersnyder ===&lt;br /&gt;
====Topic(s) ====&lt;br /&gt;
* Threat modeling introduction&lt;br /&gt;
* Diagrams – what are you building?&lt;br /&gt;
* Identifying threats – what can go wrong?&lt;br /&gt;
* Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and secure update service&lt;br /&gt;
* Addressing each threats&lt;br /&gt;
* Hands-on: threat mitigations OAuth scenarios for web and mobile applications&lt;br /&gt;
&lt;br /&gt;
====Keywords ====&lt;br /&gt;
Threat Modeling, STRIDE, Technical risk assessment&lt;br /&gt;
&lt;br /&gt;
====Abstract ====&lt;br /&gt;
This is a one day version of our Black Hat training on Threat Modeling. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and secure update service&lt;br /&gt;
* An HR services OAuth scenario for mobile and web applications &lt;br /&gt;
Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. It also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model. &amp;lt;br&amp;gt;&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications, databases &amp;amp; Single sign on (SSO) principles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Sebastien (lead application security consultant Toreon) led engagements in the domain of ICT-security, Web and Mobile Security with several customers in the private and public sector. Sebastien is the Belgian OWASP Chapter Leader and is co-project leader of OWASP SAMM.&lt;br /&gt;
&lt;br /&gt;
=== Secure Development: Models and best practices by Bart De Win ===&lt;br /&gt;
====Topic(s) ====&lt;br /&gt;
* Software Assurance maturity models&lt;br /&gt;
* Secure Development in agile development&lt;br /&gt;
* Tips and tricks for practical SDLC&lt;br /&gt;
* Hands-on: SAMM analysis of your enterprise using SAMM 1.5&lt;br /&gt;
* Sneak preview of SAMM 2.0&lt;br /&gt;
&lt;br /&gt;
====Keywords ====&lt;br /&gt;
SDLC, SAMM, Agile development, &lt;br /&gt;
&lt;br /&gt;
====Abstract ====&lt;br /&gt;
It takes much more than a good developer to build secure software within an organisation. Indeed, building secure software is about ensuring that security is taken into consideration during the entire software lifecycle. It is about ensuring that security best practices are being employed efficiently, and that uncovered risks are appropriately dealt with in due time.&lt;br /&gt;
&lt;br /&gt;
During this one-day training, we will introduce and discuss different secure development approaches and models. We will look into waterfall vs. agile development and discuss different strategies to successfully run an SDLC program. Finally, we will also put theorie into practice and take your organisation to perform a mini SDLC assessment and improvement exercise.&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Bart is an application security consultant and enthousiast and is spending considerable time on secure development projects. Bart is board member of the Belgian OWASP Chapter and is co-project leader of OWASP SAMM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is November 24th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;190pt&amp;quot; | Speaker &lt;br /&gt;
! width=&amp;quot;400pt&amp;quot; | Topic&lt;br /&gt;
&amp;lt;!-- ! width=&amp;quot;100pt&amp;quot; | Slides --&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 09h15&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Opening''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Jacoba Sieders]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Attribute Based Access Control. Why, what, how?]] &lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou | Matias Madou]]&lt;br /&gt;
||   [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou | How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | Achim D. Brucker]]&lt;br /&gt;
||   [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | The evil friend in your browser]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Lieven Desmet]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Exploring the ecosystem of malicious domain registrations in the .eu TLD]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Sebastian Lekies]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Don't trust the DOM: Bypassing XSS mitigations via script gadgets]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | Mattijs van Ommeren]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | A Series of Unfortunate Events: Where Malware Meets Murphy]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 ||  [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Philippe De Ryck]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Common REST API security pitfalls]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Jeroen Willemsen]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Closing'' &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
===Attribute Based Access Control. Why, what, how? by Jacoba Sieders===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Digitization is rapidly transforming the traditional world and regulation on security and data protection is gaining weight. Digital identity, but also data protection become crucial capabilities for businesses.  What are the trends in IAM and what role can Attribute Based Access Control (ABAC) play here? ABNAMRO started implementing ABAC in 2014. What were the approach and the lessons learnt?&lt;br /&gt;
====Bio====&lt;br /&gt;
Jacoba Sieders, Head of Digital Identity- &amp;amp; Access, ABNAMRO Bank.&amp;lt;br /&amp;gt;&lt;br /&gt;
Jacoba is an all-round Digital Identity and Information Security expert with 17 years of experience in the international finance industry, in technology, governance, consultancy, and implementation. She is accountable for digital identity services and access control for customers, employees and partners to the bank’s data and infrastructure. &lt;br /&gt;
Major topics on her agenda today are ABAC, data centric security, API-banking and PSDII requirements, the interaction of IAM tools with the rest of the bank’s cybersecurity landscape, and the new authentication concept for which ABNAMRO is acquiring a patent. Her special interests are legal requirements impacting identity, e.g. Generic Data Protection Regulation, the EU e-IDAS scheme, KYC and AML legislation.  &lt;br /&gt;
Jacoba is a member of the Advisory Board of the independent European think-tank ID Next and is regularly speaking on the topic of IAM. She holds a master degree in Classics from Leiden University (Greek, Latin, Hebrew). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou===&lt;br /&gt;
====Abstract====&lt;br /&gt;
In a recent global study, the average cost of a data breach is $3.62M globally. This session will discuss infamous examples of data breaches that has made headlines around the world. We will explore the technical details of the vulnerability itself and what a coding solution may have been to prevent the breach. We will also dive deeper on exploring different solutions, processes and techniques you can apply in your day-to-day to prevent application security vulnerabilities in your code.&lt;br /&gt;
====Bio====&lt;br /&gt;
Matias Madou is a Co-Founder and CTO of Secure Code Warrior where he is responsible for leading the company’s technology vision and overseeing the engineering team. Matias has more than 15 years of hands-on software security experience and has developed solution for companies such as HP Fortify, and founded a company called Sensei Security. Matias has led multiple application security research projects which have led to commercial products and boasts over 10 patents under his belt. When he is away from his desk, Matias has served as an instructor for advanced application security training courses and regularly speaks at global conferences including RSA Conference, Black Hat, DefCon, BSIMM, OWASP AppSec and BruCon. Matias holds a Ph.D. in Computer Engineering from Ghent University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===The evil friend in your browser by Achim D. Brucker===&lt;br /&gt;
====Abstract====&lt;br /&gt;
On the one hand, browser extensions, e.g., for Chrome, are very useful, as they extend web browsers with additional functionality&lt;br /&gt;
(e.g., blocking ads). On the other hand, they are the most dangerous code that runs in your browsers: extension can read and modify both the content displayed in the browser. As they also can communicate with any web-site or web-service, they can report both data and metadata to external parties.&lt;br /&gt;
&lt;br /&gt;
The current security model for browser extensions seems to be inadequate for expressing the security or privacy needs of browser users. Consequently, browser extensions are a &amp;quot;juice target&amp;quot; for attackers targeting web users.&lt;br /&gt;
&lt;br /&gt;
We present results of analysing over 60000 browser extensions on how they use the current security model and discuss examples of extensions that are potentially of high risk. Based on the results of our analysis of real world browser extensions as well as our own threat model, we discuss the limitations of the current security model form a user perspective.  need of browser users.&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Dr. Achim D. Brucker (www.brucker.uk) is a Senior Lecturer and consultant for software and systems assurance at the Computer Science Department of The University of Sheffield, UK.  Until December 2015, he was a Research Expert (Architect), Security Testing Strategist, and Project Lead in the Global Security Team of SAP SE, where he defined the risk-based security testing strategy of SAP that combines static, dynamic, and interactive security testing methods and integrates them deeply into SAP's Secure Software Development Lifecycle. He has experience in rolling out *AST tools to world-wide development organisations.&lt;br /&gt;
&lt;br /&gt;
===Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet===&lt;br /&gt;
====Abstract====&lt;br /&gt;
In this talk, we report on an extensive analysis of 14 months of domain registration in the .eu TLD. The purpose is to identify large-scale malicious campaigns. Overall, the dataset of this study contains 824,121 new domain registrations; 2.53% of which have been flagged as malicious by blacklisting services. We explore the ecosystem and modus operandi of elaborate cybercriminal entities that recurrently register large amounts of domains for one-shot, malicious use. Although these malicious domains are short-lived, we establish that at least 80.04% of them can be framed in to 20 larger campaigns with varying duration and intensity. We further report on insights in the operational aspects of this business and observe, amongst other findings, that their processes are only partially automated. &lt;br /&gt;
====Bio====&lt;br /&gt;
Lieven Desmet is a Senior Research Manager on Secure Software in the imec-DistriNet Research Group at the Katholieke Universiteit Leuven (Belgium), where he outlines and implements the research strategy, coaches junior researchers in application security, and participates in dissemination, valorisation and spin-off activities. Lieven is also involved in OWASP as a board member of the Belgium OWASP Chapter, and part of the organisation team of the OWASP BeNeLux Day.&lt;br /&gt;
&lt;br /&gt;
===Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Cross-Site Scripting is a constant problem of the Web platform. Over the years many techniques have been introduced to prevent or mitigate XSS. Most of these techniques, thereby, focus on script tags and event handlers. HTML sanitizers, for example, aim at removing potentially dangerous tags and attributes. Another example is the Content Security Policy, which forbids inline event handlers and aims at white listing of legitimate scripts.&lt;br /&gt;
&lt;br /&gt;
In this talk, we present a novel Web hacking technique that enables an attacker to circumvent most XSS mitigations. In order to do so, the attacker abuses so-called script gadgets. A script gadget Is a legitimate piece of JavaScript in a page that reads elements from the DOM via selectors and processes them in a way that results in script execution. To abuse a script gadget, the attacker injects a benign looking element into the page that matches the gadget's selector. Subsequently, the gadget selects the benign-looking element and executes attacker-controlled scripts. As the initially injected element is benign it passes HTML sanitizers and security policies. The XSS only surfaces when the gadget mistakenly elevates the privileges of the element.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will demonstrate that these gadgets are present in almost all modern JavaScript libraries, APIs and applications. We will present several case studies and real-world examples that demonstrate that many mitigation techniques are not suited for modern applications. As a result, we argue that the Web should start focusing more on preventive mechanisms instead of mitigations.&lt;br /&gt;
====Bio====&lt;br /&gt;
Sebastian Lekies is tech leading the Web application security scanning team at Google. Before joining Google, he was part of SAP's Security Research team, where he conducted academic research in the area of client-side Web application security. Sebastian is regularly speaking at academic and non-academic security conferences such as BlackHat US/EU/Asia, DeepSec, OWASP AppSec EU, Usenix Security, CCS, and many more...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren===&lt;br /&gt;
====Abstract====&lt;br /&gt;
When an end user reports some “strange looking file names”, which, after investigating, you discover include several hundreds of Gigabytes of encrypted data, you of course know you are going to have a bad day. Your AV solution has failed you, your firewall has failed you, and your SIEM has failed you. Basically, every piece of security infrastructure you have put your trust (and money) into has left you out in the cold and you thank &amp;lt;deity of choice&amp;gt; that at least the nightly backup was completed successfully. Spin up the tape drive, and soon you will be back in business, or not…?&lt;br /&gt;
 &lt;br /&gt;
This talk is about failure. Not only about a failing security infrastructure, but also about failure in doing the Right Thing™ as a first responder, about the failure of Operating System tools, failing APIs, and ironically, also the failure of malware (which is unfortunately not as positive as it may sound). The scenario presented comes pretty close to the worst chain of events you can imagine, in an attempt to recover from a ransomware incident.&lt;br /&gt;
 &lt;br /&gt;
Luckily – this story has a happy ending. We will reveal how one can be prepared for when both Count Olaf and Murphy come knocking on your door simultaneously.&lt;br /&gt;
====Bio====&lt;br /&gt;
Mattijs van Ommeren has been poking hardware and software for 15 years. He has spent most of his working life as a security consultant, attacking and defending both traditional IT environments as well as more esoteric embedded devices and industrial systems. Presently he has a lot of fun at Nixu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Common REST API security pitfalls by Philippe De Ryck===&lt;br /&gt;
====Abstract====&lt;br /&gt;
The shift towards a REST API landscape indicates a significant evolution in the way we build applications. The rise of JavaScript and mobile applications have sparked an explosion of easily-accessible REST APIs. But how do you protect access to your API? Which security aspects are no longer relevant? Which security features are an absolutely must-have, and which additional security measures do you need to take into account?&lt;br /&gt;
&lt;br /&gt;
These are hard questions, as evidenced by the deployment of numerous insecure REST APIs. Attend this session to find out about common API security pitfalls, that often result in compromised user accounts and unauthorized access to your data. We expose the problem that lies at the root of each of these pitfalls, and offer actionable advice to address these security problems. After this session, you will know how to assess the security of your APIs, and the best practices to improve them towards the future.&lt;br /&gt;
====Bio====&lt;br /&gt;
Philippe De Ryck is a professional speaker and trainer on software security and web security. Since he obtained his PhD at the imec-DistriNet research group (KU Leuven, Belgium), he has been running the group's Web Security Training program, which ensures a sustainable knowledge transfer of the group’s security expertise towards practitioners.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Join us on our adventure of setting up a appsec pipeline with Docker containers. What did go wrong, how did we succeed? How do you fight false positives and how do you get the best out of the products out there without bothering the development teams too much.&lt;br /&gt;
====Bio====&lt;br /&gt;
Jeroen Willemsen is a security architect with a passion for mobile and risk management. He loves to work on secure building blocks, security automation pipelines and embedding information security risk management controls in an agile environment. He is dedicated to help developers, product owners and architects to take security seriously in their daily development life (but not too serious of course ;-)).In his spare time he loves to experiment with new technologies and frameworks.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event,starting at 7PM ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
There are 3 combined sponsorship packages (Gold, Silver or Bronze) that cover the BeNeLux chapter meetings 2018 and the BeNeLux OWASP Days 2017 in Tilburg, the Netherlands.&lt;br /&gt;
&lt;br /&gt;
Download our sponsor brochure TBD and contact [mailto:seba@owasp.org us] for questions or sponsorship confirmation!&lt;br /&gt;
&lt;br /&gt;
Your sponsorship will be invested directly in the chapter meetings, supporting speaker and catering expenses. &lt;br /&gt;
&lt;br /&gt;
The sponsorship will also be dedicated to cover the costs of the OWASP 2017 BeNeLux event.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
'''Hosted by'''&lt;br /&gt;
INSERT INTERPOLIS&lt;br /&gt;
&lt;br /&gt;
'''Gold:'''&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
[https://secwatch.nl https://www.owasp.org/images/f/ff/Secwatch_logo_small.png]&lt;br /&gt;
&lt;br /&gt;
'''Silver:'''&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
[https://www.sig.eu https://www.owasp.org/images/9/99/SIG_LOGO.png]&lt;br /&gt;
[https://www.secura.com/ https://www.owasp.org/images/7/78/Secura_logo_small.png]&lt;br /&gt;
&lt;br /&gt;
'''Bronze:'''&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[https://www.netsparker.com/ https://www.owasp.org/images/8/88/200x60_netsparker_logo.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] &lt;br /&gt;
[[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Day_2017&amp;diff=234851</id>
		<title>OWASP BeNeLux-Day 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Day_2017&amp;diff=234851"/>
				<updated>2017-11-02T19:53:18Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* OWASP BeNeLux training is reserved for OWASP members, and registration is required! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Header-BNL-2017.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
== Keynote speaker ==&lt;br /&gt;
{{#switchtablink:Conferenceday|&amp;lt;p&amp;gt;&lt;br /&gt;
*  Jacoba Sieders&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday|&amp;lt;p&amp;gt;&lt;br /&gt;
* Achim D. Brucker&lt;br /&gt;
* Lieven Desmet&lt;br /&gt;
* Philippe De Ryck&lt;br /&gt;
* Sebastian Lekies&lt;br /&gt;
* Matias Madou&lt;br /&gt;
* Mattijs van Ommeren&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers ==&lt;br /&gt;
{{#switchtablink:Trainingday|&amp;lt;p&amp;gt;&lt;br /&gt;
* Nanne Baars&lt;br /&gt;
* Sebastien Deleersnyder&lt;br /&gt;
* Bart De Win&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Joren Poll, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl17 #owaspbnl17]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]]&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training is reserved for OWASP members, and registration is required! ==&lt;br /&gt;
To support the OWASP organisation, we ask training attendees to consider becoming an OWASP member, it's only US$50!&lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[https://owasp-benelux-day-2017.eventbrite.com Register now!]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The venue is located:&lt;br /&gt;
&lt;br /&gt;
'''Interpolis''' &lt;br /&gt;
&lt;br /&gt;
Spoorlaan 298, &lt;br /&gt;
&lt;br /&gt;
5017JZ Tilburg&lt;br /&gt;
&lt;br /&gt;
Netherlands&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
Map: [https://goo.gl/maps/5CJYYSMAJD92 Google map]&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
=== Trainingday is November 23rd  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room TBA !! Room TBA !! Room TBA&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | WebGoat - Teaching application security 101]] &amp;lt;br&amp;gt;by [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | Nanne Baars]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[OWASP_BeNeLux-Day_2017#Whiteboard_Hacking_aka_Hands-on_Threat Modeling_by_Sebastien Deleersnyder  | Whiteboard Hacking aka Hands-on Threat Modeling]] &amp;lt;br&amp;gt;by [[OWASP_BeNeLux-Day_2017#Whiteboard_Hacking_aka_Hands-on_Threat Modeling_by_Sebastien Deleersnyder | Sebastien Deleersnyder]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[OWASP_BeNeLux-Day_2017#Secure_Development:_Models_and_best_practices_by_Bart_De_Win | Secure Development: Models and best practices]] &amp;lt;br&amp;gt;by [[OWASP_BeNeLux-Day_2017#Secure_Development:_Models_and_best_practices_by_Bart_De_Win | Bart De Win]]&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Trainings ==&lt;br /&gt;
=== WebGoat - Teaching application security 101 by Nanne Baars ===&lt;br /&gt;
====Topic(s) ====&lt;br /&gt;
* Web Application Breaker&lt;br /&gt;
* Other&lt;br /&gt;
====Keywords ====&lt;br /&gt;
WebGoat application, security teaching secure development&lt;br /&gt;
&lt;br /&gt;
====Abstract ====&lt;br /&gt;
A good defense against insecure code requires understanding the mechanics behind how attackers exploit simple programming mistakes.&lt;br /&gt;
The WebGoat team will walk through exercises like SQL Injection, XSS, XXE, CSRF, ... and demonstrate how these exploits work.&lt;br /&gt;
 &lt;br /&gt;
We will show you how you can use WebGoat to train your developers to avoid these simple but common programming mistakes.&lt;br /&gt;
 &lt;br /&gt;
We also show you how to extend WebGoat to create lessons specific to your environment.&lt;br /&gt;
Join us to learn the most basic, but common, application security problems.&lt;br /&gt;
&lt;br /&gt;
Tired of all the lessons? During the training we will host a small CTF competition which you can take a shot at and compete with each other...&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Nanne Baars works as a security consultant &amp;amp; developer at JDriven and is one of the primary developers of WebGoat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Whiteboard Hacking aka Hands-on Threat Modeling by Sebastien Deleersnyder ===&lt;br /&gt;
====Topic(s) ====&lt;br /&gt;
* Threat modeling introduction&lt;br /&gt;
* Diagrams – what are you building?&lt;br /&gt;
* Identifying threats – what can go wrong?&lt;br /&gt;
* Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and secure update service&lt;br /&gt;
* Addressing each threats&lt;br /&gt;
* Hands-on: threat mitigations OAuth scenarios for web and mobile applications&lt;br /&gt;
&lt;br /&gt;
====Keywords ====&lt;br /&gt;
Threat Modeling, STRIDE, Technical risk assessment&lt;br /&gt;
&lt;br /&gt;
====Abstract ====&lt;br /&gt;
This is a one day version of our Black Hat training on Threat Modeling. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and secure update service&lt;br /&gt;
* An HR services OAuth scenario for mobile and web applications &lt;br /&gt;
Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. It also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model. &amp;lt;br&amp;gt;&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications, databases &amp;amp; Single sign on (SSO) principles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Sebastien (lead application security consultant Toreon) led engagements in the domain of ICT-security, Web and Mobile Security with several customers in the private and public sector. Sebastien is the Belgian OWASP Chapter Leader and is co-project leader of OWASP SAMM.&lt;br /&gt;
&lt;br /&gt;
=== Secure Development: Models and best practices by Bart De Win ===&lt;br /&gt;
====Topic(s) ====&lt;br /&gt;
* Software Assurance maturity models&lt;br /&gt;
* Secure Development in agile development&lt;br /&gt;
* Tips and tricks for practical SDLC&lt;br /&gt;
* Hands-on: SAMM analysis of your enterprise using SAMM 1.5&lt;br /&gt;
* Sneak preview of SAMM 2.0&lt;br /&gt;
&lt;br /&gt;
====Keywords ====&lt;br /&gt;
SDLC, SAMM, Agile development, &lt;br /&gt;
&lt;br /&gt;
====Abstract ====&lt;br /&gt;
It takes much more than a good developer to build secure software within an organisation. Indeed, building secure software is about ensuring that security is taken into consideration during the entire software lifecycle. It is about ensuring that security best practices are being employed efficiently, and that uncovered risks are appropriately dealt with in due time.&lt;br /&gt;
&lt;br /&gt;
During this one-day training, we will introduce and discuss different secure development approaches and models. We will look into waterfall vs. agile development and discuss different strategies to successfully run an SDLC program. Finally, we will also put theorie into practice and take your organisation to perform a mini SDLC assessment and improvement exercise.&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Bart is an application security consultant and enthousiast and is spending considerable time on secure development projects. Bart is board member of the Belgian OWASP Chapter and is co-project leader of OWASP SAMM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is November 24th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;190pt&amp;quot; | Speaker &lt;br /&gt;
! width=&amp;quot;400pt&amp;quot; | Topic&lt;br /&gt;
&amp;lt;!-- ! width=&amp;quot;100pt&amp;quot; | Slides --&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 09h15&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Opening''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Jacoba Sieders]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Attribute Based Access Control. Why, what, how?]] &lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou | Matias Madou]]&lt;br /&gt;
||   [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou | How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | Achim D. Brucker]]&lt;br /&gt;
||   [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | The evil friend in your browser]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Lieven Desmet]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Exploring the ecosystem of malicious domain registrations in the .eu TLD]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Sebastian Lekies]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Don't trust the DOM: Bypassing XSS mitigations via script gadgets]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | Mattijs van Ommeren]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | A Series of Unfortunate Events: Where Malware Meets Murphy]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 ||  [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Philippe De Ryck]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Common REST API security pitfalls]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Jeroen Willemsen]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Closing'' &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
===Attribute Based Access Control. Why, what, how? by Jacoba Sieders===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Digitization is rapidly transforming the traditional world and regulation on security and data protection is gaining weight. Digital identity, but also data protection become crucial capabilities for businesses.  What are the trends in IAM and what role can Attribute Based Access Control (ABAC) play here? ABNAMRO started implementing ABAC in 2014. What were the approach and the lessons learnt?&lt;br /&gt;
====Bio====&lt;br /&gt;
Jacoba Sieders, Head of Digital Identity- &amp;amp; Access, ABNAMRO Bank.&amp;lt;br /&amp;gt;&lt;br /&gt;
Jacoba is an all-round Digital Identity and Information Security expert with 17 years of experience in the international finance industry, in technology, governance, consultancy, and implementation. She is accountable for digital identity services and access control for customers, employees and partners to the bank’s data and infrastructure. &lt;br /&gt;
Major topics on her agenda today are ABAC, data centric security, API-banking and PSDII requirements, the interaction of IAM tools with the rest of the bank’s cybersecurity landscape, and the new authentication concept for which ABNAMRO is acquiring a patent. Her special interests are legal requirements impacting identity, e.g. Generic Data Protection Regulation, the EU e-IDAS scheme, KYC and AML legislation.  &lt;br /&gt;
Jacoba is a member of the Advisory Board of the independent European think-tank ID Next and is regularly speaking on the topic of IAM. She holds a master degree in Classics from Leiden University (Greek, Latin, Hebrew). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou===&lt;br /&gt;
====Abstract====&lt;br /&gt;
In a recent global study, the average cost of a data breach is $3.62M globally. This session will discuss infamous examples of data breaches that has made headlines around the world. We will explore the technical details of the vulnerability itself and what a coding solution may have been to prevent the breach. We will also dive deeper on exploring different solutions, processes and techniques you can apply in your day-to-day to prevent application security vulnerabilities in your code.&lt;br /&gt;
====Bio====&lt;br /&gt;
Matias Madou is a Co-Founder and CTO of Secure Code Warrior where he is responsible for leading the company’s technology vision and overseeing the engineering team. Matias has more than 15 years of hands-on software security experience and has developed solution for companies such as HP Fortify, and founded a company called Sensei Security. Matias has led multiple application security research projects which have led to commercial products and boasts over 10 patents under his belt. When he is away from his desk, Matias has served as an instructor for advanced application security training courses and regularly speaks at global conferences including RSA Conference, Black Hat, DefCon, BSIMM, OWASP AppSec and BruCon. Matias holds a Ph.D. in Computer Engineering from Ghent University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===The evil friend in your browser by Achim D. Brucker===&lt;br /&gt;
====Abstract====&lt;br /&gt;
On the one hand, browser extensions, e.g., for Chrome, are very useful, as they extend web browsers with additional functionality&lt;br /&gt;
(e.g., blocking ads). On the other hand, they are the most dangerous code that runs in your browsers: extension can read and modify both the content displayed in the browser. As they also can communicate with any web-site or web-service, they can report both data and metadata to external parties.&lt;br /&gt;
&lt;br /&gt;
The current security model for browser extensions seems to be inadequate for expressing the security or privacy needs of browser users. Consequently, browser extensions are a &amp;quot;juice target&amp;quot; for attackers targeting web users.&lt;br /&gt;
&lt;br /&gt;
We present results of analysing over 60000 browser extensions on how they use the current security model and discuss examples of extensions that are potentially of high risk. Based on the results of our analysis of real world browser extensions as well as our own threat model, we discuss the limitations of the current security model form a user perspective.  need of browser users.&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Dr. Achim D. Brucker (www.brucker.uk) is a Senior Lecturer and consultant for software and systems assurance at the Computer Science Department of The University of Sheffield, UK.  Until December 2015, he was a Research Expert (Architect), Security Testing Strategist, and Project Lead in the Global Security Team of SAP SE, where he defined the risk-based security testing strategy of SAP that combines static, dynamic, and interactive security testing methods and integrates them deeply into SAP's Secure Software Development Lifecycle. He has experience in rolling out *AST tools to world-wide development organisations.&lt;br /&gt;
&lt;br /&gt;
===Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet===&lt;br /&gt;
====Abstract====&lt;br /&gt;
In this talk, we report on an extensive analysis of 14 months of domain registration in the .eu TLD. The purpose is to identify large-scale malicious campaigns. Overall, the dataset of this study contains 824,121 new domain registrations; 2.53% of which have been flagged as malicious by blacklisting services. We explore the ecosystem and modus operandi of elaborate cybercriminal entities that recurrently register large amounts of domains for one-shot, malicious use. Although these malicious domains are short-lived, we establish that at least 80.04% of them can be framed in to 20 larger campaigns with varying duration and intensity. We further report on insights in the operational aspects of this business and observe, amongst other findings, that their processes are only partially automated. &lt;br /&gt;
====Bio====&lt;br /&gt;
Lieven Desmet is a Senior Research Manager on Secure Software in the imec-DistriNet Research Group at the Katholieke Universiteit Leuven (Belgium), where he outlines and implements the research strategy, coaches junior researchers in application security, and participates in dissemination, valorisation and spin-off activities. Lieven is also involved in OWASP as a board member of the Belgium OWASP Chapter, and part of the organisation team of the OWASP BeNeLux Day.&lt;br /&gt;
&lt;br /&gt;
===Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Cross-Site Scripting is a constant problem of the Web platform. Over the years many techniques have been introduced to prevent or mitigate XSS. Most of these techniques, thereby, focus on script tags and event handlers. HTML sanitizers, for example, aim at removing potentially dangerous tags and attributes. Another example is the Content Security Policy, which forbids inline event handlers and aims at white listing of legitimate scripts.&lt;br /&gt;
&lt;br /&gt;
In this talk, we present a novel Web hacking technique that enables an attacker to circumvent most XSS mitigations. In order to do so, the attacker abuses so-called script gadgets. A script gadget Is a legitimate piece of JavaScript in a page that reads elements from the DOM via selectors and processes them in a way that results in script execution. To abuse a script gadget, the attacker injects a benign looking element into the page that matches the gadget's selector. Subsequently, the gadget selects the benign-looking element and executes attacker-controlled scripts. As the initially injected element is benign it passes HTML sanitizers and security policies. The XSS only surfaces when the gadget mistakenly elevates the privileges of the element.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will demonstrate that these gadgets are present in almost all modern JavaScript libraries, APIs and applications. We will present several case studies and real-world examples that demonstrate that many mitigation techniques are not suited for modern applications. As a result, we argue that the Web should start focusing more on preventive mechanisms instead of mitigations.&lt;br /&gt;
====Bio====&lt;br /&gt;
Sebastian Lekies is tech leading the Web application security scanning team at Google. Before joining Google, he was part of SAP's Security Research team, where he conducted academic research in the area of client-side Web application security. Sebastian is regularly speaking at academic and non-academic security conferences such as BlackHat US/EU/Asia, DeepSec, OWASP AppSec EU, Usenix Security, CCS, and many more...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren===&lt;br /&gt;
====Abstract====&lt;br /&gt;
When an end user reports some “strange looking file names”, which, after investigating, you discover include several hundreds of Gigabytes of encrypted data, you of course know you are going to have a bad day. Your AV solution has failed you, your firewall has failed you, and your SIEM has failed you. Basically, every piece of security infrastructure you have put your trust (and money) into has left you out in the cold and you thank &amp;lt;deity of choice&amp;gt; that at least the nightly backup was completed successfully. Spin up the tape drive, and soon you will be back in business, or not…?&lt;br /&gt;
 &lt;br /&gt;
This talk is about failure. Not only about a failing security infrastructure, but also about failure in doing the Right Thing™ as a first responder, about the failure of Operating System tools, failing APIs, and ironically, also the failure of malware (which is unfortunately not as positive as it may sound). The scenario presented comes pretty close to the worst chain of events you can imagine, in an attempt to recover from a ransomware incident.&lt;br /&gt;
 &lt;br /&gt;
Luckily – this story has a happy ending. We will reveal how one can be prepared for when both Count Olaf and Murphy come knocking on your door simultaneously.&lt;br /&gt;
====Bio====&lt;br /&gt;
Mattijs van Ommeren has been poking hardware and software for 15 years. He has spent most of his working life as a security consultant, attacking and defending both traditional IT environments as well as more esoteric embedded devices and industrial systems. Presently he has a lot of fun at Nixu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Common REST API security pitfalls by Philippe De Ryck===&lt;br /&gt;
====Abstract====&lt;br /&gt;
The shift towards a REST API landscape indicates a significant evolution in the way we build applications. The rise of JavaScript and mobile applications have sparked an explosion of easily-accessible REST APIs. But how do you protect access to your API? Which security aspects are no longer relevant? Which security features are an absolutely must-have, and which additional security measures do you need to take into account?&lt;br /&gt;
&lt;br /&gt;
These are hard questions, as evidenced by the deployment of numerous insecure REST APIs. Attend this session to find out about common API security pitfalls, that often result in compromised user accounts and unauthorized access to your data. We expose the problem that lies at the root of each of these pitfalls, and offer actionable advice to address these security problems. After this session, you will know how to assess the security of your APIs, and the best practices to improve them towards the future.&lt;br /&gt;
====Bio====&lt;br /&gt;
Philippe De Ryck is a professional speaker and trainer on software security and web security. Since he obtained his PhD at the imec-DistriNet research group (KU Leuven, Belgium), he has been running the group's Web Security Training program, which ensures a sustainable knowledge transfer of the group’s security expertise towards practitioners.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Join us on our adventure of setting up a appsec pipeline with Docker containers. What did go wrong, how did we succeed? How do you fight false positives and how do you get the best out of the products out there without bothering the development teams too much.&lt;br /&gt;
====Bio====&lt;br /&gt;
Jeroen Willemsen is a security architect with a passion for mobile and risk management. He loves to work on secure building blocks, security automation pipelines and embedding information security risk management controls in an agile environment. He is dedicated to help developers, product owners and architects to take security seriously in their daily development life (but not too serious of course ;-)).In his spare time he loves to experiment with new technologies and frameworks.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event,starting at 7PM ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
There are 3 combined sponsorship packages (Gold, Silver or Bronze) that cover the BeNeLux chapter meetings 2018 and the BeNeLux OWASP Days 2017 in Tilburg, the Netherlands.&lt;br /&gt;
&lt;br /&gt;
Download our sponsor brochure TBD and contact [mailto:seba@owasp.org us] for questions or sponsorship confirmation!&lt;br /&gt;
&lt;br /&gt;
Your sponsorship will be invested directly in the chapter meetings, supporting speaker and catering expenses. &lt;br /&gt;
&lt;br /&gt;
The sponsorship will also be dedicated to cover the costs of the OWASP 2017 BeNeLux event.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
'''Hosted by'''&lt;br /&gt;
INSERT INTERPOLIS&lt;br /&gt;
&lt;br /&gt;
'''Gold:'''&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
[https://secwatch.nl https://www.owasp.org/images/f/ff/Secwatch_logo_small.png]&lt;br /&gt;
&lt;br /&gt;
'''Silver:'''&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
[https://www.sig.eu https://www.owasp.org/images/9/99/SIG_LOGO.png]&lt;br /&gt;
[https://www.secura.com/ https://www.owasp.org/images/7/78/Secura_logo_small.png]&lt;br /&gt;
&lt;br /&gt;
'''Bronze:'''&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[https://www.netsparker.com/ https://www.owasp.org/images/8/88/200x60_netsparker_logo.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] &lt;br /&gt;
[[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Day_2017&amp;diff=234850</id>
		<title>OWASP BeNeLux-Day 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Day_2017&amp;diff=234850"/>
				<updated>2017-11-02T19:47:58Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: Added link to registration page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Header-BNL-2017.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
== Keynote speaker ==&lt;br /&gt;
{{#switchtablink:Conferenceday|&amp;lt;p&amp;gt;&lt;br /&gt;
*  Jacoba Sieders&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday|&amp;lt;p&amp;gt;&lt;br /&gt;
* Achim D. Brucker&lt;br /&gt;
* Lieven Desmet&lt;br /&gt;
* Philippe De Ryck&lt;br /&gt;
* Sebastian Lekies&lt;br /&gt;
* Matias Madou&lt;br /&gt;
* Mattijs van Ommeren&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers ==&lt;br /&gt;
{{#switchtablink:Trainingday|&amp;lt;p&amp;gt;&lt;br /&gt;
* Nanne Baars&lt;br /&gt;
* Sebastien Deleersnyder&lt;br /&gt;
* Bart De Win&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Joren Poll, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl17 #owaspbnl17]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]]&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux training is reserved for OWASP members, and registration is required! ==&lt;br /&gt;
To support the OWASP organisation, we ask training attendees to become an OWASP member, it's only US$50!&lt;br /&gt;
Students and faculty are invited to become member as well, but can freely attend.&lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[https://owasp-benelux-day-2017.eventbrite.com Register now!]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The venue is located:&lt;br /&gt;
&lt;br /&gt;
'''Interpolis''' &lt;br /&gt;
&lt;br /&gt;
Spoorlaan 298, &lt;br /&gt;
&lt;br /&gt;
5017JZ Tilburg&lt;br /&gt;
&lt;br /&gt;
Netherlands&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
Map: [https://goo.gl/maps/5CJYYSMAJD92 Google map]&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
=== Trainingday is November 23rd  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room TBA !! Room TBA !! Room TBA&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | WebGoat - Teaching application security 101]] &amp;lt;br&amp;gt;by [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | Nanne Baars]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[OWASP_BeNeLux-Day_2017#Whiteboard_Hacking_aka_Hands-on_Threat Modeling_by_Sebastien Deleersnyder  | Whiteboard Hacking aka Hands-on Threat Modeling]] &amp;lt;br&amp;gt;by [[OWASP_BeNeLux-Day_2017#Whiteboard_Hacking_aka_Hands-on_Threat Modeling_by_Sebastien Deleersnyder | Sebastien Deleersnyder]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[OWASP_BeNeLux-Day_2017#Secure_Development:_Models_and_best_practices_by_Bart_De_Win | Secure Development: Models and best practices]] &amp;lt;br&amp;gt;by [[OWASP_BeNeLux-Day_2017#Secure_Development:_Models_and_best_practices_by_Bart_De_Win | Bart De Win]]&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Trainings ==&lt;br /&gt;
=== WebGoat - Teaching application security 101 by Nanne Baars ===&lt;br /&gt;
====Topic(s) ====&lt;br /&gt;
* Web Application Breaker&lt;br /&gt;
* Other&lt;br /&gt;
====Keywords ====&lt;br /&gt;
WebGoat application, security teaching secure development&lt;br /&gt;
&lt;br /&gt;
====Abstract ====&lt;br /&gt;
A good defense against insecure code requires understanding the mechanics behind how attackers exploit simple programming mistakes.&lt;br /&gt;
The WebGoat team will walk through exercises like SQL Injection, XSS, XXE, CSRF, ... and demonstrate how these exploits work.&lt;br /&gt;
 &lt;br /&gt;
We will show you how you can use WebGoat to train your developers to avoid these simple but common programming mistakes.&lt;br /&gt;
 &lt;br /&gt;
We also show you how to extend WebGoat to create lessons specific to your environment.&lt;br /&gt;
Join us to learn the most basic, but common, application security problems.&lt;br /&gt;
&lt;br /&gt;
Tired of all the lessons? During the training we will host a small CTF competition which you can take a shot at and compete with each other...&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Nanne Baars works as a security consultant &amp;amp; developer at JDriven and is one of the primary developers of WebGoat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Whiteboard Hacking aka Hands-on Threat Modeling by Sebastien Deleersnyder ===&lt;br /&gt;
====Topic(s) ====&lt;br /&gt;
* Threat modeling introduction&lt;br /&gt;
* Diagrams – what are you building?&lt;br /&gt;
* Identifying threats – what can go wrong?&lt;br /&gt;
* Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and secure update service&lt;br /&gt;
* Addressing each threats&lt;br /&gt;
* Hands-on: threat mitigations OAuth scenarios for web and mobile applications&lt;br /&gt;
&lt;br /&gt;
====Keywords ====&lt;br /&gt;
Threat Modeling, STRIDE, Technical risk assessment&lt;br /&gt;
&lt;br /&gt;
====Abstract ====&lt;br /&gt;
This is a one day version of our Black Hat training on Threat Modeling. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and secure update service&lt;br /&gt;
* An HR services OAuth scenario for mobile and web applications &lt;br /&gt;
Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. It also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model. &amp;lt;br&amp;gt;&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications, databases &amp;amp; Single sign on (SSO) principles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Sebastien (lead application security consultant Toreon) led engagements in the domain of ICT-security, Web and Mobile Security with several customers in the private and public sector. Sebastien is the Belgian OWASP Chapter Leader and is co-project leader of OWASP SAMM.&lt;br /&gt;
&lt;br /&gt;
=== Secure Development: Models and best practices by Bart De Win ===&lt;br /&gt;
====Topic(s) ====&lt;br /&gt;
* Software Assurance maturity models&lt;br /&gt;
* Secure Development in agile development&lt;br /&gt;
* Tips and tricks for practical SDLC&lt;br /&gt;
* Hands-on: SAMM analysis of your enterprise using SAMM 1.5&lt;br /&gt;
* Sneak preview of SAMM 2.0&lt;br /&gt;
&lt;br /&gt;
====Keywords ====&lt;br /&gt;
SDLC, SAMM, Agile development, &lt;br /&gt;
&lt;br /&gt;
====Abstract ====&lt;br /&gt;
It takes much more than a good developer to build secure software within an organisation. Indeed, building secure software is about ensuring that security is taken into consideration during the entire software lifecycle. It is about ensuring that security best practices are being employed efficiently, and that uncovered risks are appropriately dealt with in due time.&lt;br /&gt;
&lt;br /&gt;
During this one-day training, we will introduce and discuss different secure development approaches and models. We will look into waterfall vs. agile development and discuss different strategies to successfully run an SDLC program. Finally, we will also put theorie into practice and take your organisation to perform a mini SDLC assessment and improvement exercise.&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Bart is an application security consultant and enthousiast and is spending considerable time on secure development projects. Bart is board member of the Belgian OWASP Chapter and is co-project leader of OWASP SAMM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is November 24th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;190pt&amp;quot; | Speaker &lt;br /&gt;
! width=&amp;quot;400pt&amp;quot; | Topic&lt;br /&gt;
&amp;lt;!-- ! width=&amp;quot;100pt&amp;quot; | Slides --&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 09h15&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Opening''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Jacoba Sieders]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Attribute Based Access Control. Why, what, how?]] &lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou | Matias Madou]]&lt;br /&gt;
||   [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou | How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | Achim D. Brucker]]&lt;br /&gt;
||   [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | The evil friend in your browser]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Lieven Desmet]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Exploring the ecosystem of malicious domain registrations in the .eu TLD]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Sebastian Lekies]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Don't trust the DOM: Bypassing XSS mitigations via script gadgets]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | Mattijs van Ommeren]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | A Series of Unfortunate Events: Where Malware Meets Murphy]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 ||  [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Philippe De Ryck]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Common REST API security pitfalls]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Jeroen Willemsen]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Closing'' &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
===Attribute Based Access Control. Why, what, how? by Jacoba Sieders===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Digitization is rapidly transforming the traditional world and regulation on security and data protection is gaining weight. Digital identity, but also data protection become crucial capabilities for businesses.  What are the trends in IAM and what role can Attribute Based Access Control (ABAC) play here? ABNAMRO started implementing ABAC in 2014. What were the approach and the lessons learnt?&lt;br /&gt;
====Bio====&lt;br /&gt;
Jacoba Sieders, Head of Digital Identity- &amp;amp; Access, ABNAMRO Bank.&amp;lt;br /&amp;gt;&lt;br /&gt;
Jacoba is an all-round Digital Identity and Information Security expert with 17 years of experience in the international finance industry, in technology, governance, consultancy, and implementation. She is accountable for digital identity services and access control for customers, employees and partners to the bank’s data and infrastructure. &lt;br /&gt;
Major topics on her agenda today are ABAC, data centric security, API-banking and PSDII requirements, the interaction of IAM tools with the rest of the bank’s cybersecurity landscape, and the new authentication concept for which ABNAMRO is acquiring a patent. Her special interests are legal requirements impacting identity, e.g. Generic Data Protection Regulation, the EU e-IDAS scheme, KYC and AML legislation.  &lt;br /&gt;
Jacoba is a member of the Advisory Board of the independent European think-tank ID Next and is regularly speaking on the topic of IAM. She holds a master degree in Classics from Leiden University (Greek, Latin, Hebrew). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou===&lt;br /&gt;
====Abstract====&lt;br /&gt;
In a recent global study, the average cost of a data breach is $3.62M globally. This session will discuss infamous examples of data breaches that has made headlines around the world. We will explore the technical details of the vulnerability itself and what a coding solution may have been to prevent the breach. We will also dive deeper on exploring different solutions, processes and techniques you can apply in your day-to-day to prevent application security vulnerabilities in your code.&lt;br /&gt;
====Bio====&lt;br /&gt;
Matias Madou is a Co-Founder and CTO of Secure Code Warrior where he is responsible for leading the company’s technology vision and overseeing the engineering team. Matias has more than 15 years of hands-on software security experience and has developed solution for companies such as HP Fortify, and founded a company called Sensei Security. Matias has led multiple application security research projects which have led to commercial products and boasts over 10 patents under his belt. When he is away from his desk, Matias has served as an instructor for advanced application security training courses and regularly speaks at global conferences including RSA Conference, Black Hat, DefCon, BSIMM, OWASP AppSec and BruCon. Matias holds a Ph.D. in Computer Engineering from Ghent University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===The evil friend in your browser by Achim D. Brucker===&lt;br /&gt;
====Abstract====&lt;br /&gt;
On the one hand, browser extensions, e.g., for Chrome, are very useful, as they extend web browsers with additional functionality&lt;br /&gt;
(e.g., blocking ads). On the other hand, they are the most dangerous code that runs in your browsers: extension can read and modify both the content displayed in the browser. As they also can communicate with any web-site or web-service, they can report both data and metadata to external parties.&lt;br /&gt;
&lt;br /&gt;
The current security model for browser extensions seems to be inadequate for expressing the security or privacy needs of browser users. Consequently, browser extensions are a &amp;quot;juice target&amp;quot; for attackers targeting web users.&lt;br /&gt;
&lt;br /&gt;
We present results of analysing over 60000 browser extensions on how they use the current security model and discuss examples of extensions that are potentially of high risk. Based on the results of our analysis of real world browser extensions as well as our own threat model, we discuss the limitations of the current security model form a user perspective.  need of browser users.&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Dr. Achim D. Brucker (www.brucker.uk) is a Senior Lecturer and consultant for software and systems assurance at the Computer Science Department of The University of Sheffield, UK.  Until December 2015, he was a Research Expert (Architect), Security Testing Strategist, and Project Lead in the Global Security Team of SAP SE, where he defined the risk-based security testing strategy of SAP that combines static, dynamic, and interactive security testing methods and integrates them deeply into SAP's Secure Software Development Lifecycle. He has experience in rolling out *AST tools to world-wide development organisations.&lt;br /&gt;
&lt;br /&gt;
===Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet===&lt;br /&gt;
====Abstract====&lt;br /&gt;
In this talk, we report on an extensive analysis of 14 months of domain registration in the .eu TLD. The purpose is to identify large-scale malicious campaigns. Overall, the dataset of this study contains 824,121 new domain registrations; 2.53% of which have been flagged as malicious by blacklisting services. We explore the ecosystem and modus operandi of elaborate cybercriminal entities that recurrently register large amounts of domains for one-shot, malicious use. Although these malicious domains are short-lived, we establish that at least 80.04% of them can be framed in to 20 larger campaigns with varying duration and intensity. We further report on insights in the operational aspects of this business and observe, amongst other findings, that their processes are only partially automated. &lt;br /&gt;
====Bio====&lt;br /&gt;
Lieven Desmet is a Senior Research Manager on Secure Software in the imec-DistriNet Research Group at the Katholieke Universiteit Leuven (Belgium), where he outlines and implements the research strategy, coaches junior researchers in application security, and participates in dissemination, valorisation and spin-off activities. Lieven is also involved in OWASP as a board member of the Belgium OWASP Chapter, and part of the organisation team of the OWASP BeNeLux Day.&lt;br /&gt;
&lt;br /&gt;
===Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Cross-Site Scripting is a constant problem of the Web platform. Over the years many techniques have been introduced to prevent or mitigate XSS. Most of these techniques, thereby, focus on script tags and event handlers. HTML sanitizers, for example, aim at removing potentially dangerous tags and attributes. Another example is the Content Security Policy, which forbids inline event handlers and aims at white listing of legitimate scripts.&lt;br /&gt;
&lt;br /&gt;
In this talk, we present a novel Web hacking technique that enables an attacker to circumvent most XSS mitigations. In order to do so, the attacker abuses so-called script gadgets. A script gadget Is a legitimate piece of JavaScript in a page that reads elements from the DOM via selectors and processes them in a way that results in script execution. To abuse a script gadget, the attacker injects a benign looking element into the page that matches the gadget's selector. Subsequently, the gadget selects the benign-looking element and executes attacker-controlled scripts. As the initially injected element is benign it passes HTML sanitizers and security policies. The XSS only surfaces when the gadget mistakenly elevates the privileges of the element.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will demonstrate that these gadgets are present in almost all modern JavaScript libraries, APIs and applications. We will present several case studies and real-world examples that demonstrate that many mitigation techniques are not suited for modern applications. As a result, we argue that the Web should start focusing more on preventive mechanisms instead of mitigations.&lt;br /&gt;
====Bio====&lt;br /&gt;
Sebastian Lekies is tech leading the Web application security scanning team at Google. Before joining Google, he was part of SAP's Security Research team, where he conducted academic research in the area of client-side Web application security. Sebastian is regularly speaking at academic and non-academic security conferences such as BlackHat US/EU/Asia, DeepSec, OWASP AppSec EU, Usenix Security, CCS, and many more...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren===&lt;br /&gt;
====Abstract====&lt;br /&gt;
When an end user reports some “strange looking file names”, which, after investigating, you discover include several hundreds of Gigabytes of encrypted data, you of course know you are going to have a bad day. Your AV solution has failed you, your firewall has failed you, and your SIEM has failed you. Basically, every piece of security infrastructure you have put your trust (and money) into has left you out in the cold and you thank &amp;lt;deity of choice&amp;gt; that at least the nightly backup was completed successfully. Spin up the tape drive, and soon you will be back in business, or not…?&lt;br /&gt;
 &lt;br /&gt;
This talk is about failure. Not only about a failing security infrastructure, but also about failure in doing the Right Thing™ as a first responder, about the failure of Operating System tools, failing APIs, and ironically, also the failure of malware (which is unfortunately not as positive as it may sound). The scenario presented comes pretty close to the worst chain of events you can imagine, in an attempt to recover from a ransomware incident.&lt;br /&gt;
 &lt;br /&gt;
Luckily – this story has a happy ending. We will reveal how one can be prepared for when both Count Olaf and Murphy come knocking on your door simultaneously.&lt;br /&gt;
====Bio====&lt;br /&gt;
Mattijs van Ommeren has been poking hardware and software for 15 years. He has spent most of his working life as a security consultant, attacking and defending both traditional IT environments as well as more esoteric embedded devices and industrial systems. Presently he has a lot of fun at Nixu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Common REST API security pitfalls by Philippe De Ryck===&lt;br /&gt;
====Abstract====&lt;br /&gt;
The shift towards a REST API landscape indicates a significant evolution in the way we build applications. The rise of JavaScript and mobile applications have sparked an explosion of easily-accessible REST APIs. But how do you protect access to your API? Which security aspects are no longer relevant? Which security features are an absolutely must-have, and which additional security measures do you need to take into account?&lt;br /&gt;
&lt;br /&gt;
These are hard questions, as evidenced by the deployment of numerous insecure REST APIs. Attend this session to find out about common API security pitfalls, that often result in compromised user accounts and unauthorized access to your data. We expose the problem that lies at the root of each of these pitfalls, and offer actionable advice to address these security problems. After this session, you will know how to assess the security of your APIs, and the best practices to improve them towards the future.&lt;br /&gt;
====Bio====&lt;br /&gt;
Philippe De Ryck is a professional speaker and trainer on software security and web security. Since he obtained his PhD at the imec-DistriNet research group (KU Leuven, Belgium), he has been running the group's Web Security Training program, which ensures a sustainable knowledge transfer of the group’s security expertise towards practitioners.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Join us on our adventure of setting up a appsec pipeline with Docker containers. What did go wrong, how did we succeed? How do you fight false positives and how do you get the best out of the products out there without bothering the development teams too much.&lt;br /&gt;
====Bio====&lt;br /&gt;
Jeroen Willemsen is a security architect with a passion for mobile and risk management. He loves to work on secure building blocks, security automation pipelines and embedding information security risk management controls in an agile environment. He is dedicated to help developers, product owners and architects to take security seriously in their daily development life (but not too serious of course ;-)).In his spare time he loves to experiment with new technologies and frameworks.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event,starting at 7PM ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
There are 3 combined sponsorship packages (Gold, Silver or Bronze) that cover the BeNeLux chapter meetings 2018 and the BeNeLux OWASP Days 2017 in Tilburg, the Netherlands.&lt;br /&gt;
&lt;br /&gt;
Download our sponsor brochure TBD and contact [mailto:seba@owasp.org us] for questions or sponsorship confirmation!&lt;br /&gt;
&lt;br /&gt;
Your sponsorship will be invested directly in the chapter meetings, supporting speaker and catering expenses. &lt;br /&gt;
&lt;br /&gt;
The sponsorship will also be dedicated to cover the costs of the OWASP 2017 BeNeLux event.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
'''Hosted by'''&lt;br /&gt;
INSERT INTERPOLIS&lt;br /&gt;
&lt;br /&gt;
'''Gold:'''&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
[https://secwatch.nl https://www.owasp.org/images/f/ff/Secwatch_logo_small.png]&lt;br /&gt;
&lt;br /&gt;
'''Silver:'''&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
[https://www.sig.eu https://www.owasp.org/images/9/99/SIG_LOGO.png]&lt;br /&gt;
[https://www.secura.com/ https://www.owasp.org/images/7/78/Secura_logo_small.png]&lt;br /&gt;
&lt;br /&gt;
'''Bronze:'''&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[https://www.netsparker.com/ https://www.owasp.org/images/8/88/200x60_netsparker_logo.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] &lt;br /&gt;
[[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Day_2017&amp;diff=234790</id>
		<title>OWASP BeNeLux-Day 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Day_2017&amp;diff=234790"/>
				<updated>2017-10-31T21:39:09Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Bio */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Header-BNL-2017.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
== Keynote speaker ==&lt;br /&gt;
{{#switchtablink:Conferenceday|&amp;lt;p&amp;gt;&lt;br /&gt;
*  Jacoba Sieders&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday|&amp;lt;p&amp;gt;&lt;br /&gt;
* Achim D. Brucker&lt;br /&gt;
* Lieven Desmet&lt;br /&gt;
* Philippe De Ryck&lt;br /&gt;
* Sebastian Lekies&lt;br /&gt;
* Matias Madou&lt;br /&gt;
* Mattijs van Ommeren&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers ==&lt;br /&gt;
{{#switchtablink:Trainingday|&amp;lt;p&amp;gt;&lt;br /&gt;
* Nanne Baars&lt;br /&gt;
* Sebastien Deleersnyder&lt;br /&gt;
* Bart De Win&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Joren Poll, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl17 #owaspbnl17]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== OWASP BeNeLux training is reserved for OWASP members, and registration is required! ==&lt;br /&gt;
To support the OWASP organisation, we ask training attendees to become an OWASP member, it's only US$50!&lt;br /&gt;
Students and faculty are invited to become member as well, but can freely attend.&lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[https://owasp-benelux-day-2017.eventbrite.com Register now!]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The venue is located:&lt;br /&gt;
&lt;br /&gt;
'''Interpolis''' &lt;br /&gt;
&lt;br /&gt;
Spoorlaan 298, &lt;br /&gt;
&lt;br /&gt;
5017JZ Tilburg&lt;br /&gt;
&lt;br /&gt;
Netherlands&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
Map: [https://goo.gl/maps/5CJYYSMAJD92 Google map]&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
=== Trainingday is November 23rd  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room TBA !! Room TBA !! Room TBA&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | WebGoat - Teaching application security 101]] &amp;lt;br&amp;gt;by [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | Nanne Baars]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[OWASP_BeNeLux-Day_2017#Whiteboard_Hacking_aka_Hands-on_Threat Modeling_by_Sebastien Deleersnyder  | Whiteboard Hacking aka Hands-on Threat Modeling]] &amp;lt;br&amp;gt;by [[OWASP_BeNeLux-Day_2017#Whiteboard_Hacking_aka_Hands-on_Threat Modeling_by_Sebastien Deleersnyder | Sebastien Deleersnyder]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Bart De Win&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Trainings ==&lt;br /&gt;
=== WebGoat - Teaching application security 101 by Nanne Baars ===&lt;br /&gt;
====Topic(s) ====&lt;br /&gt;
* Web Application Breaker&lt;br /&gt;
* Other&lt;br /&gt;
====Keywords ====&lt;br /&gt;
WebGoat application, security teaching secure development&lt;br /&gt;
&lt;br /&gt;
====Abstract ====&lt;br /&gt;
A good defense against insecure code requires understanding the mechanics behind how attackers exploit simple programming mistakes.&lt;br /&gt;
The WebGoat team will walk through exercises like SQL Injection, XSS, XXE, CSRF, ... and demonstrate how these exploits work.&lt;br /&gt;
 &lt;br /&gt;
We will show you how you can use WebGoat to train your developers to avoid these simple but common programming mistakes.&lt;br /&gt;
 &lt;br /&gt;
We also show you how to extend WebGoat to create lessons specific to your environment.&lt;br /&gt;
Join us to learn the most basic, but common, application security problems.&lt;br /&gt;
&lt;br /&gt;
Tired of all the lessons? During the training we will host a small CTF competition which you can take a shot at and compete with each other...&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Nanne Baars works as a security consultant &amp;amp; developer at JDriven and is one of the primary developers of WebGoat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Whiteboard Hacking aka Hands-on Threat Modeling by Sebastien Deleersnyder ===&lt;br /&gt;
====Topic(s) ====&lt;br /&gt;
* Threat modeling introduction&lt;br /&gt;
* Diagrams – what are you building?&lt;br /&gt;
* Identifying threats – what can go wrong?&lt;br /&gt;
* Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and secure update service&lt;br /&gt;
* Addressing each threats&lt;br /&gt;
* Hands-on: threat mitigations OAuth scenarios for web and mobile applications&lt;br /&gt;
&lt;br /&gt;
====Keywords ====&lt;br /&gt;
Threat Modeling, STRIDE, Technical risk assessment&lt;br /&gt;
&lt;br /&gt;
====Abstract ====&lt;br /&gt;
This is a one day version of our Black Hat training on Threat Modeling. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and secure update service&lt;br /&gt;
* An HR services OAuth scenario for mobile and web applications &lt;br /&gt;
Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. It also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model. &amp;lt;br&amp;gt;&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications, databases &amp;amp; Single sign on (SSO) principles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Sebastien (lead application security consultant Toreon) led engagements in the domain of ICT-security, Web and Mobile Security with several customers in the private and public sector. Sebastien is the Belgian OWASP Chapter Leader and is co-project leader of OWASP SAMM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is November 24th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;190pt&amp;quot; | Speaker &lt;br /&gt;
! width=&amp;quot;400pt&amp;quot; | Topic&lt;br /&gt;
&amp;lt;!-- ! width=&amp;quot;100pt&amp;quot; | Slides --&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 09h15&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Opening''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Jacoba Sieders]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Attribute Based Access Control. Why, what, how?]] &lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou | Matias Madou]]&lt;br /&gt;
||   [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou | How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | Achim D. Brucker]]&lt;br /&gt;
||   [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | The evil friend in your browser]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Lieven Desmet]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Exploring the ecosystem of malicious domain registrations in the .eu TLD]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Sebastian Lekies]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Don't trust the DOM: Bypassing XSS mitigations via script gadgets]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | Mattijs van Ommeren]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | A Series of Unfortunate Events: Where Malware Meets Murphy]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 ||  [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Philippe De Ryck]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Common REST API security pitfalls]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Jeroen Willemsen]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Closing'' &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
===Attribute Based Access Control. Why, what, how? by Jacoba Sieders===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Digitization is rapidly transforming the traditional world and regulation on security and data protection is gaining weight. Digital identity, but also data protection become crucial capabilities for businesses.  What are the trends in IAM and what role can Attribute Based Access Control (ABAC) play here? ABNAMRO started implementing ABAC in 2014. What were the approach and the lessons learnt?&lt;br /&gt;
====Bio====&lt;br /&gt;
Jacoba Sieders, Head of Digital Identity- &amp;amp; Access, ABNAMRO Bank.&amp;lt;br /&amp;gt;&lt;br /&gt;
Jacoba is an all-round Digital Identity and Information Security expert with 17 years of experience in the international finance industry, in technology, governance, consultancy, and implementation. She is accountable for digital identity services and access control for customers, employees and partners to the bank’s data and infrastructure. &lt;br /&gt;
Major topics on her agenda today are ABAC, data centric security, API-banking and PSDII requirements, the interaction of IAM tools with the rest of the bank’s cybersecurity landscape, and the new authentication concept for which ABNAMRO is acquiring a patent. Her special interests are legal requirements impacting identity, e.g. Generic Data Protection Regulation, the EU e-IDAS scheme, KYC and AML legislation.  &lt;br /&gt;
Jacoba is a member of the Advisory Board of the independent European think-tank ID Next and is regularly speaking on the topic of IAM. She holds a master degree in Classics from Leiden University (Greek, Latin, Hebrew). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou===&lt;br /&gt;
====Abstract====&lt;br /&gt;
In a recent global study, the average cost of a data breach is $3.62M globally. This session will discuss infamous examples of data breaches that has made headlines around the world. We will explore the technical details of the vulnerability itself and what a coding solution may have been to prevent the breach. We will also dive deeper on exploring different solutions, processes and techniques you can apply in your day-to-day to prevent application security vulnerabilities in your code.&lt;br /&gt;
====Bio====&lt;br /&gt;
Matias Madou is a Co-Founder and CTO of Secure Code Warrior where he is responsible for leading the company’s technology vision and overseeing the engineering team. Matias has more than 15 years of hands-on software security experience and has developed solution for companies such as HP Fortify, and founded a company called Sensei Security. Matias has led multiple application security research projects which have led to commercial products and boasts over 10 patents under his belt. When he is away from his desk, Matias has served as an instructor for advanced application security training courses and regularly speaks at global conferences including RSA Conference, Black Hat, DefCon, BSIMM, OWASP AppSec and BruCon. Matias holds a Ph.D. in Computer Engineering from Ghent University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===The evil friend in your browser by Achim D. Brucker===&lt;br /&gt;
====Abstract====&lt;br /&gt;
On the one hand, browser extensions, e.g., for Chrome, are very useful, as they extend web browsers with additional functionality&lt;br /&gt;
(e.g., blocking ads). On the other hand, they are the most dangerous code that runs in your browsers: extension can read and modify both the content displayed in the browser. As they also can communicate with any web-site or web-service, they can report both data and metadata to external parties.&lt;br /&gt;
&lt;br /&gt;
The current security model for browser extensions seems to be inadequate for expressing the security or privacy needs of browser users. Consequently, browser extensions are a &amp;quot;juice target&amp;quot; for attackers targeting web users.&lt;br /&gt;
&lt;br /&gt;
We present results of analysing over 60000 browser extensions on how they use the current security model and discuss examples of extensions that are potentially of high risk. Based on the results of our analysis of real world browser extensions as well as our own threat model, we discuss the limitations of the current security model form a user perspective.  need of browser users.&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Dr. Achim D. Brucker (www.brucker.uk) is a Senior Lecturer and consultant for software and systems assurance at the Computer Science Department of The University of Sheffield, UK.  Until December 2015, he was a Research Expert (Architect), Security Testing Strategist, and Project Lead in the Global Security Team of SAP SE, where he defined the risk-based security testing strategy of SAP that combines static, dynamic, and interactive security testing methods and integrates them deeply into SAP's Secure Software Development Lifecycle. He has experience in rolling out *AST tools to world-wide development organisations.&lt;br /&gt;
&lt;br /&gt;
===Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet===&lt;br /&gt;
====Abstract====&lt;br /&gt;
In this talk, we report on an extensive analysis of 14 months of domain registration in the .eu TLD. The purpose is to identify large-scale malicious campaigns. Overall, the dataset of this study contains 824,121 new domain registrations; 2.53% of which have been flagged as malicious by blacklisting services. We explore the ecosystem and modus operandi of elaborate cybercriminal entities that recurrently register large amounts of domains for one-shot, malicious use. Although these malicious domains are short-lived, we establish that at least 80.04% of them can be framed in to 20 larger campaigns with varying duration and intensity. We further report on insights in the operational aspects of this business and observe, amongst other findings, that their processes are only partially automated. &lt;br /&gt;
====Bio====&lt;br /&gt;
Lieven Desmet is a Senior Research Manager on Secure Software in the imec-DistriNet Research Group at the Katholieke Universiteit Leuven (Belgium), where he outlines and implements the research strategy, coaches junior researchers in application security, and participates in dissemination, valorisation and spin-off activities. Lieven is also involved in OWASP as a board member of the Belgium OWASP Chapter, and part of the organisation team of the OWASP BeNeLux Day.&lt;br /&gt;
&lt;br /&gt;
===Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Cross-Site Scripting is a constant problem of the Web platform. Over the years many techniques have been introduced to prevent or mitigate XSS. Most of these techniques, thereby, focus on script tags and event handlers. HTML sanitizers, for example, aim at removing potentially dangerous tags and attributes. Another example is the Content Security Policy, which forbids inline event handlers and aims at white listing of legitimate scripts.&lt;br /&gt;
&lt;br /&gt;
In this talk, we present a novel Web hacking technique that enables an attacker to circumvent most XSS mitigations. In order to do so, the attacker abuses so-called script gadgets. A script gadget Is a legitimate piece of JavaScript in a page that reads elements from the DOM via selectors and processes them in a way that results in script execution. To abuse a script gadget, the attacker injects a benign looking element into the page that matches the gadget's selector. Subsequently, the gadget selects the benign-looking element and executes attacker-controlled scripts. As the initially injected element is benign it passes HTML sanitizers and security policies. The XSS only surfaces when the gadget mistakenly elevates the privileges of the element.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will demonstrate that these gadgets are present in almost all modern JavaScript libraries, APIs and applications. We will present several case studies and real-world examples that demonstrate that many mitigation techniques are not suited for modern applications. As a result, we argue that the Web should start focusing more on preventive mechanisms instead of mitigations.&lt;br /&gt;
====Bio====&lt;br /&gt;
Sebastian Lekies is tech leading the Web application security scanning team at Google. Before joining Google, he was part of SAP's Security Research team, where he conducted academic research in the area of client-side Web application security. Sebastian is regularly speaking at academic and non-academic security conferences such as BlackHat US/EU/Asia, DeepSec, OWASP AppSec EU, Usenix Security, CCS, and many more...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren===&lt;br /&gt;
====Abstract====&lt;br /&gt;
When an end user reports some “strange looking file names”, which, after investigating, you discover include several hundreds of Gigabytes of encrypted data, you of course know you are going to have a bad day. Your AV solution has failed you, your firewall has failed you, and your SIEM has failed you. Basically, every piece of security infrastructure you have put your trust (and money) into has left you out in the cold and you thank &amp;lt;deity of choice&amp;gt; that at least the nightly backup was completed successfully. Spin up the tape drive, and soon you will be back in business, or not…?&lt;br /&gt;
 &lt;br /&gt;
This talk is about failure. Not only about a failing security infrastructure, but also about failure in doing the Right Thing™ as a first responder, about the failure of Operating System tools, failing APIs, and ironically, also the failure of malware (which is unfortunately not as positive as it may sound). The scenario presented comes pretty close to the worst chain of events you can imagine, in an attempt to recover from a ransomware incident.&lt;br /&gt;
 &lt;br /&gt;
Luckily – this story has a happy ending. We will reveal how one can be prepared for when both Count Olaf and Murphy come knocking on your door simultaneously.&lt;br /&gt;
====Bio====&lt;br /&gt;
Mattijs van Ommeren has been poking hardware and software for 15 years. He has spent most of his working life as a security consultant, attacking and defending both traditional IT environments as well as more esoteric embedded devices and industrial systems. Presently he has a lot of fun at Nixu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Common REST API security pitfalls by Philippe De Ryck===&lt;br /&gt;
====Abstract====&lt;br /&gt;
The shift towards a REST API landscape indicates a significant evolution in the way we build applications. The rise of JavaScript and mobile applications have sparked an explosion of easily-accessible REST APIs. But how do you protect access to your API? Which security aspects are no longer relevant? Which security features are an absolutely must-have, and which additional security measures do you need to take into account?&lt;br /&gt;
&lt;br /&gt;
These are hard questions, as evidenced by the deployment of numerous insecure REST APIs. Attend this session to find out about common API security pitfalls, that often result in compromised user accounts and unauthorized access to your data. We expose the problem that lies at the root of each of these pitfalls, and offer actionable advice to address these security problems. After this session, you will know how to assess the security of your APIs, and the best practices to improve them towards the future.&lt;br /&gt;
====Bio====&lt;br /&gt;
Philippe De Ryck is a professional speaker and trainer on software security and web security. Since he obtained his PhD at the imec-DistriNet research group (KU Leuven, Belgium), he has been running the group's Web Security Training program, which ensures a sustainable knowledge transfer of the group’s security expertise towards practitioners.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Join us on our adventure of setting up a appsec pipeline with Docker containers. What did go wrong, how did we succeed? How do you fight false positives and how do you get the best out of the products out there without bothering the development teams too much.&lt;br /&gt;
====Bio====&lt;br /&gt;
Jeroen Willemsen is a security architect with a passion for mobile and risk management. He loves to work on secure building blocks, security automation pipelines and embedding information security risk management controls in an agile environment. He is dedicated to help developers, product owners and architects to take security seriously in their daily development life (but not too serious of course ;-)).In his spare time he loves to experiment with new technologies and frameworks.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event,starting at 7PM ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
There are 3 combined sponsorship packages (Gold, Silver or Bronze) that cover the BeNeLux chapter meetings 2018 and the BeNeLux OWASP Days 2017 in Tilburg, the Netherlands.&lt;br /&gt;
&lt;br /&gt;
Download our sponsor brochure TBD and contact [mailto:seba@owasp.org us] for questions or sponsorship confirmation!&lt;br /&gt;
&lt;br /&gt;
Your sponsorship will be invested directly in the chapter meetings, supporting speaker and catering expenses. &lt;br /&gt;
&lt;br /&gt;
The sponsorship will also be dedicated to cover the costs of the OWASP 2017 BeNeLux event.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
'''Hosted by'''&lt;br /&gt;
INSERT INTERPOLIS&lt;br /&gt;
&lt;br /&gt;
'''Gold:'''&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
[https://secwatch.nl https://www.owasp.org/images/f/ff/Secwatch_logo_small.png]&lt;br /&gt;
&lt;br /&gt;
'''Silver:'''&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
[https://www.sig.eu https://www.owasp.org/images/9/99/SIG_LOGO.png]&lt;br /&gt;
[https://www.secura.com/ https://www.owasp.org/images/7/78/Secura_logo_small.png]&lt;br /&gt;
&lt;br /&gt;
'''Bronze:'''&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[https://www.netsparker.com/ https://www.owasp.org/images/8/88/200x60_netsparker_logo.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] &lt;br /&gt;
[[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Day_2017&amp;diff=234789</id>
		<title>OWASP BeNeLux-Day 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_BeNeLux-Day_2017&amp;diff=234789"/>
				<updated>2017-10-31T21:38:38Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Header-BNL-2017.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Information  =&lt;br /&gt;
== Keynote speaker ==&lt;br /&gt;
{{#switchtablink:Conferenceday|&amp;lt;p&amp;gt;&lt;br /&gt;
*  Jacoba Sieders&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Confirmed speakers Conference ==&lt;br /&gt;
{{#switchtablink:Conferenceday|&amp;lt;p&amp;gt;&lt;br /&gt;
* Achim D. Brucker&lt;br /&gt;
* Lieven Desmet&lt;br /&gt;
* Philippe De Ryck&lt;br /&gt;
* Sebastian Lekies&lt;br /&gt;
* Matias Madou&lt;br /&gt;
* Mattijs van Ommeren&lt;br /&gt;
* Jeroen Willemsen&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== Confirmed trainers ==&lt;br /&gt;
{{#switchtablink:Trainingday|&amp;lt;p&amp;gt;&lt;br /&gt;
* Nanne Baars&lt;br /&gt;
* Sebastien Deleersnyder&lt;br /&gt;
* Bart De Win&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== The OWASP BeNeLux Program Committee ==&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Joren Poll, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tweet! ==&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl17 #owaspbnl17]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Donate to OWASP BeNeLux ==&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP BeNeLux conference is free, but registration is required! ==&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[[image:Register_now_red.png|link=https://owasp-benelux-day-2017.eventbrite.com |alt=Register for the OWASP BeNeLux Day 2017 | Register for the OWASP BeNeLux Day 2017 ]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== OWASP BeNeLux training is reserved for OWASP members, and registration is required! ==&lt;br /&gt;
To support the OWASP organisation, we ask training attendees to become an OWASP member, it's only US$50!&lt;br /&gt;
Students and faculty are invited to become member as well, but can freely attend.&lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[https://owasp-benelux-day-2017.eventbrite.com Register now!]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
== Venue  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The venue is located:&lt;br /&gt;
&lt;br /&gt;
'''Interpolis''' &lt;br /&gt;
&lt;br /&gt;
Spoorlaan 298, &lt;br /&gt;
&lt;br /&gt;
5017JZ Tilburg&lt;br /&gt;
&lt;br /&gt;
Netherlands&lt;br /&gt;
=== How to reach the venue? ===&lt;br /&gt;
Map: [https://goo.gl/maps/5CJYYSMAJD92 Google map]&lt;br /&gt;
&lt;br /&gt;
=== Hotel nearby ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
=== Trainingday is November 23rd  ===&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room TBA !! Room TBA !! Room TBA&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | WebGoat - Teaching application security 101]] &amp;lt;br&amp;gt;by [[OWASP_BeNeLux-Day_2017#WebGoat_-_Teaching_application_security_101_by_Nanne_Baars | Nanne Baars]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[OWASP_BeNeLux-Day_2017#Whiteboard_Hacking_aka_Hands-on_Threat Modeling_by_Sebastien Deleersnyder  | Whiteboard Hacking aka Hands-on Threat Modeling]] &amp;lt;br&amp;gt;by [[OWASP_BeNeLux-Day_2017#Whiteboard_Hacking_aka_Hands-on_Threat Modeling_by_Sebastien Deleersnyder | Sebastien Deleersnyder]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | Bart De Win&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Trainings ==&lt;br /&gt;
=== WebGoat - Teaching application security 101 by Nanne Baars ===&lt;br /&gt;
====Topic(s) ====&lt;br /&gt;
* Web Application Breaker&lt;br /&gt;
* Other&lt;br /&gt;
====Keywords ====&lt;br /&gt;
WebGoat application, security teaching secure development&lt;br /&gt;
&lt;br /&gt;
====Abstract ====&lt;br /&gt;
A good defense against insecure code requires understanding the mechanics behind how attackers exploit simple programming mistakes.&lt;br /&gt;
The WebGoat team will walk through exercises like SQL Injection, XSS, XXE, CSRF, ... and demonstrate how these exploits work.&lt;br /&gt;
 &lt;br /&gt;
We will show you how you can use WebGoat to train your developers to avoid these simple but common programming mistakes.&lt;br /&gt;
 &lt;br /&gt;
We also show you how to extend WebGoat to create lessons specific to your environment.&lt;br /&gt;
Join us to learn the most basic, but common, application security problems.&lt;br /&gt;
&lt;br /&gt;
Tired of all the lessons? During the training we will host a small CTF competition which you can take a shot at and compete with each other...&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Nanne Baars works as a security consultant &amp;amp; developer at JDriven and is one of the primary developers of WebGoat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Whiteboard Hacking aka Hands-on Threat Modeling by Sebastien Deleersnyder ===&lt;br /&gt;
====Topic(s) ====&lt;br /&gt;
* Threat modeling introduction&lt;br /&gt;
* Diagrams – what are you building?&lt;br /&gt;
* Identifying threats – what can go wrong?&lt;br /&gt;
* Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on premise gateway and secure update service&lt;br /&gt;
* Addressing each threats&lt;br /&gt;
* Hands-on: threat mitigations OAuth scenarios for web and mobile applications&lt;br /&gt;
&lt;br /&gt;
====Keywords ====&lt;br /&gt;
Threat Modeling, STRIDE, Technical risk assessment&lt;br /&gt;
&lt;br /&gt;
====Abstract ====&lt;br /&gt;
This is a one day version of our Black Hat training on Threat Modeling. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of threat modeling on:&lt;br /&gt;
* An Internet of Things (IoT) deployment with an on premise gateway and secure update service&lt;br /&gt;
* An HR services OAuth scenario for mobile and web applications &lt;br /&gt;
Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities. It also allows consideration of security issues at the component or application level. The threat modeling course will teach you to perform threat modeling through a series of workshops, where our trainer will guide you through the different stages of a practical threat model. &amp;lt;br&amp;gt;&lt;br /&gt;
This course is aimed at software developers, architects, system managers or security professionals. Before attending this course, students should be familiar with basic knowledge of web and mobile Applications, databases &amp;amp; Single sign on (SSO) principles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Sebastien (lead application security consultant Toreon) led engagements in the domain of ICT-security, Web and Mobile Security with several customers in the private and public sector. Sebastien is the Belgian OWASP Chapter Leader and is co-project leader of OWASP SAMM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
=== Conferenceday is November 24th  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;120pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;190pt&amp;quot; | Speaker &lt;br /&gt;
! width=&amp;quot;400pt&amp;quot; | Topic&lt;br /&gt;
&amp;lt;!-- ! width=&amp;quot;100pt&amp;quot; | Slides --&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| 08h30 - 09h00&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 09h15&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Opening''&lt;br /&gt;
|- &lt;br /&gt;
| 09h15 - 10h00 || [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Jacoba Sieders]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Attribute Based Access Control. Why, what, how? by Jacoba Sieders | Attribute Based Access Control. Why, what, how?]] &lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h00 - 10h45 || [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou | Matias Madou]]&lt;br /&gt;
||   [[OWASP_BeNeLux-Day_2017#How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou | How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 10h45 - 11h15 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h15 - 12h00 || [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | Achim D. Brucker]]&lt;br /&gt;
||   [[OWASP_BeNeLux-Day_2017#The evil friend in your browser by Achim D. Brucker | The evil friend in your browser]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h00 - 12h45 || [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Lieven Desmet]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet | Exploring the ecosystem of malicious domain registrations in the .eu TLD]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h45 - 13h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h45 - 14h30 || [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Sebastian Lekies]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies | Don't trust the DOM: Bypassing XSS mitigations via script gadgets]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h30 - 15h15 || [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | Mattijs van Ommeren]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren | A Series of Unfortunate Events: Where Malware Meets Murphy]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h15 - 15h45&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h45 - 16h30 ||  [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Philippe De Ryck]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Common REST API security pitfalls by Philippe De Ryck | Common REST API security pitfalls]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h15 || [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Jeroen Willemsen]]&lt;br /&gt;
|| [[OWASP_BeNeLux-Day_2017#Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen | Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded]]&lt;br /&gt;
&amp;lt;!-- || [link_to_presentation Download] --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 17h15 - 17h30&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Closing'' &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TBD&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Talks == &lt;br /&gt;
&lt;br /&gt;
===Attribute Based Access Control. Why, what, how? by Jacoba Sieders===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Digitization is rapidly transforming the traditional world and regulation on security and data protection is gaining weight. Digital identity, but also data protection become crucial capabilities for businesses.  What are the trends in IAM and what role can Attribute Based Access Control (ABAC) play here? ABNAMRO started implementing ABAC in 2014. What were the approach and the lessons learnt?&lt;br /&gt;
====Bio====&lt;br /&gt;
Jacoba Sieders, Head of Digital Identity- &amp;amp; Access, ABNAMRO Bank.&amp;lt;br /&amp;gt;&lt;br /&gt;
Jacoba is an all-round Digital Identity and Information Security expert with 17 years of experience in the international finance industry, in technology, governance, consultancy, and implementation. She is accountable for digital identity services and access control for customers, employees and partners to the bank’s data and infrastructure. &lt;br /&gt;
Major topics on her agenda today are ABAC, data centric security, API-banking and PSDII requirements, the interaction of IAM tools with the rest of the bank’s cybersecurity landscape, and the new authentication concept for which ABNAMRO is acquiring a patent. Her special interests are legal requirements impacting identity, e.g. Generic Data Protection Regulation, the EU e-IDAS scheme, KYC and AML legislation.  &lt;br /&gt;
Jacoba is a member of the Advisory Board of the independent European think-tank ID Next and is regularly speaking on the topic of IAM. She holds a master degree in Classics from Leiden University (Greek, Latin, Hebrew). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to spend $3.6mil on one coding mistake, and other fun stuff you can do with $3.6mil by Matia Madou===&lt;br /&gt;
====Abstract====&lt;br /&gt;
In a recent global study, the average cost of a data breach is $3.62M globally. This session will discuss infamous examples of data breaches that has made headlines around the world. We will explore the technical details of the vulnerability itself and what a coding solution may have been to prevent the breach. We will also dive deeper on exploring different solutions, processes and techniques you can apply in your day-to-day to prevent application security vulnerabilities in your code.&lt;br /&gt;
====Bio====&lt;br /&gt;
Matias Madou is a Co-Founder and CTO of Secure Code Warrior where he is responsible for leading the company’s technology vision and overseeing the engineering team. Matias has more than 15 years of hands-on software security experience and has developed solution for companies such as HP Fortify, and founded a company called Sensei Security. Matias has led multiple application security research projects which have led to commercial products and boasts over 10 patents under his belt. When he is away from his desk, Matias has served as an instructor for advanced application security training courses and regularly speaks at global conferences including RSA Conference, Black Hat, DefCon, BSIMM, OWASP AppSec and BruCon. Matias holds a Ph.D. in Computer Engineering from Ghent University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===The evil friend in your browser by Achim D. Brucker===&lt;br /&gt;
====Abstract====&lt;br /&gt;
On the one hand, browser extensions, e.g., for Chrome, are very useful, as they extend web browsers with additional functionality&lt;br /&gt;
(e.g., blocking ads). On the other hand, they are the most dangerous code that runs in your browsers: extension can read and modify both the content displayed in the browser. As they also can communicate with any web-site or web-service, they can report both data and metadata to external parties.&lt;br /&gt;
&lt;br /&gt;
The current security model for browser extensions seems to be inadequate for expressing the security or privacy needs of browser users. Consequently, browser extensions are a &amp;quot;juice target&amp;quot; for attackers targeting web users.&lt;br /&gt;
&lt;br /&gt;
We present results of analysing over 60000 browser extensions on how they use the current security model and discuss examples of extensions that are potentially of high risk. Based on the results of our analysis of real world browser extensions as well as our own threat model, we discuss the limitations of the current security model form a user perspective.  need of browser users.&lt;br /&gt;
&lt;br /&gt;
====Bio====&lt;br /&gt;
Dr. Achim D. Brucker (www.brucker.uk) is a Senior Lecturer and consultant for software and systems assurance at the Computer Science Department of The University of Sheffield, UK.  Until December 2015, he was a Research Expert (Architect), Security Testing Strategist, and Project Lead in the Global Security Team of SAP SE, where he defined the risk-based security testing strategy of SAP that combines static, dynamic, and interactive security testing methods and integrates them deeply into SAP's Secure Software Development Lifecycle. He has experience in rolling out *AST tools to world-wide development organisations.&lt;br /&gt;
&lt;br /&gt;
===Exploring the ecosystem of malicious domain registrations in the .eu TLD by Lieven Desmet===&lt;br /&gt;
====Abstract====&lt;br /&gt;
In this talk, we report on an extensive analysis of 14 months of domain registration in the .eu TLD. The purpose is to identify large-scale malicious campaigns. Overall, the dataset of this study contains 824,121 new domain registrations; 2.53% of which have been flagged as malicious by blacklisting services. We explore the ecosystem and modus operandi of elaborate cybercriminal entities that recurrently register large amounts of domains for one-shot, malicious use. Although these malicious domains are short-lived, we establish that at least 80.04% of them can be framed in to 20 larger campaigns with varying duration and intensity. We further report on insights in the operational aspects of this business and observe, amongst other findings, that their processes are only partially automated. &lt;br /&gt;
====Bio====&lt;br /&gt;
Lieven is a Senior Research Manager on Secure Software in the imec-DistriNet Research Group at the Katholieke Universiteit Leuven (Belgium), where he outlines and implements the research strategy, coaches junior researchers in application security, and participates in dissemination, valorisation and spin-off activities. Lieven is also involved in OWASP as a board member of the Belgium OWASP Chapter, and part of the organisation team of the OWASP BeNeLux Day.&lt;br /&gt;
&lt;br /&gt;
===Don't trust the DOM: Bypassing XSS mitigations via script gadgets by Sebastian Lekies===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Cross-Site Scripting is a constant problem of the Web platform. Over the years many techniques have been introduced to prevent or mitigate XSS. Most of these techniques, thereby, focus on script tags and event handlers. HTML sanitizers, for example, aim at removing potentially dangerous tags and attributes. Another example is the Content Security Policy, which forbids inline event handlers and aims at white listing of legitimate scripts.&lt;br /&gt;
&lt;br /&gt;
In this talk, we present a novel Web hacking technique that enables an attacker to circumvent most XSS mitigations. In order to do so, the attacker abuses so-called script gadgets. A script gadget Is a legitimate piece of JavaScript in a page that reads elements from the DOM via selectors and processes them in a way that results in script execution. To abuse a script gadget, the attacker injects a benign looking element into the page that matches the gadget's selector. Subsequently, the gadget selects the benign-looking element and executes attacker-controlled scripts. As the initially injected element is benign it passes HTML sanitizers and security policies. The XSS only surfaces when the gadget mistakenly elevates the privileges of the element.&lt;br /&gt;
&lt;br /&gt;
In this talk, we will demonstrate that these gadgets are present in almost all modern JavaScript libraries, APIs and applications. We will present several case studies and real-world examples that demonstrate that many mitigation techniques are not suited for modern applications. As a result, we argue that the Web should start focusing more on preventive mechanisms instead of mitigations.&lt;br /&gt;
====Bio====&lt;br /&gt;
Sebastian Lekies is tech leading the Web application security scanning team at Google. Before joining Google, he was part of SAP's Security Research team, where he conducted academic research in the area of client-side Web application security. Sebastian is regularly speaking at academic and non-academic security conferences such as BlackHat US/EU/Asia, DeepSec, OWASP AppSec EU, Usenix Security, CCS, and many more...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===A Series of Unfortunate Events: Where Malware Meets Murphy by Mattijs van Ommeren===&lt;br /&gt;
====Abstract====&lt;br /&gt;
When an end user reports some “strange looking file names”, which, after investigating, you discover include several hundreds of Gigabytes of encrypted data, you of course know you are going to have a bad day. Your AV solution has failed you, your firewall has failed you, and your SIEM has failed you. Basically, every piece of security infrastructure you have put your trust (and money) into has left you out in the cold and you thank &amp;lt;deity of choice&amp;gt; that at least the nightly backup was completed successfully. Spin up the tape drive, and soon you will be back in business, or not…?&lt;br /&gt;
 &lt;br /&gt;
This talk is about failure. Not only about a failing security infrastructure, but also about failure in doing the Right Thing™ as a first responder, about the failure of Operating System tools, failing APIs, and ironically, also the failure of malware (which is unfortunately not as positive as it may sound). The scenario presented comes pretty close to the worst chain of events you can imagine, in an attempt to recover from a ransomware incident.&lt;br /&gt;
 &lt;br /&gt;
Luckily – this story has a happy ending. We will reveal how one can be prepared for when both Count Olaf and Murphy come knocking on your door simultaneously.&lt;br /&gt;
====Bio====&lt;br /&gt;
Mattijs van Ommeren has been poking hardware and software for 15 years. He has spent most of his working life as a security consultant, attacking and defending both traditional IT environments as well as more esoteric embedded devices and industrial systems. Presently he has a lot of fun at Nixu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Common REST API security pitfalls by Philippe De Ryck===&lt;br /&gt;
====Abstract====&lt;br /&gt;
The shift towards a REST API landscape indicates a significant evolution in the way we build applications. The rise of JavaScript and mobile applications have sparked an explosion of easily-accessible REST APIs. But how do you protect access to your API? Which security aspects are no longer relevant? Which security features are an absolutely must-have, and which additional security measures do you need to take into account?&lt;br /&gt;
&lt;br /&gt;
These are hard questions, as evidenced by the deployment of numerous insecure REST APIs. Attend this session to find out about common API security pitfalls, that often result in compromised user accounts and unauthorized access to your data. We expose the problem that lies at the root of each of these pitfalls, and offer actionable advice to address these security problems. After this session, you will know how to assess the security of your APIs, and the best practices to improve them towards the future.&lt;br /&gt;
====Bio====&lt;br /&gt;
Philippe De Ryck is a professional speaker and trainer on software security and web security. Since he obtained his PhD at the imec-DistriNet research group (KU Leuven, Belgium), he has been running the group's Web Security Training program, which ensures a sustainable knowledge transfer of the group’s security expertise towards practitioners.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Creating An AppSec Pipeline With Containers In A Week How We Failed And Succeeded by Jeroen Willemsen===&lt;br /&gt;
====Abstract====&lt;br /&gt;
Join us on our adventure of setting up a appsec pipeline with Docker containers. What did go wrong, how did we succeed? How do you fight false positives and how do you get the best out of the products out there without bothering the development teams too much.&lt;br /&gt;
====Bio====&lt;br /&gt;
Jeroen Willemsen is a security architect with a passion for mobile and risk management. He loves to work on secure building blocks, security automation pipelines and embedding information security risk management controls in an agile environment. He is dedicated to help developers, product owners and architects to take security seriously in their daily development life (but not too serious of course ;-)).In his spare time he loves to experiment with new technologies and frameworks.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
== Social Event,starting at 7PM ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
=== Become a sponsor of OWASP BeNeLux ===&lt;br /&gt;
&lt;br /&gt;
There are 3 combined sponsorship packages (Gold, Silver or Bronze) that cover the BeNeLux chapter meetings 2018 and the BeNeLux OWASP Days 2017 in Tilburg, the Netherlands.&lt;br /&gt;
&lt;br /&gt;
Download our sponsor brochure TBD and contact [mailto:seba@owasp.org us] for questions or sponsorship confirmation!&lt;br /&gt;
&lt;br /&gt;
Your sponsorship will be invested directly in the chapter meetings, supporting speaker and catering expenses. &lt;br /&gt;
&lt;br /&gt;
The sponsorship will also be dedicated to cover the costs of the OWASP 2017 BeNeLux event.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Made possible by our {{#switchtablink:Sponsor|Sponsors}}===&lt;br /&gt;
'''Hosted by'''&lt;br /&gt;
INSERT INTERPOLIS&lt;br /&gt;
&lt;br /&gt;
'''Gold:'''&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/6/67/Vest.jpg]&lt;br /&gt;
[https://secwatch.nl https://www.owasp.org/images/f/ff/Secwatch_logo_small.png]&lt;br /&gt;
&lt;br /&gt;
'''Silver:'''&lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
[https://www.sig.eu https://www.owasp.org/images/9/99/SIG_LOGO.png]&lt;br /&gt;
[https://www.secura.com/ https://www.owasp.org/images/7/78/Secura_logo_small.png]&lt;br /&gt;
&lt;br /&gt;
'''Bronze:'''&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[https://www.netsparker.com/ https://www.owasp.org/images/8/88/200x60_netsparker_logo.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] &lt;br /&gt;
[[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2017&amp;diff=230113</id>
		<title>Belgium Events 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2017&amp;diff=230113"/>
				<updated>2017-05-30T08:02:51Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* PROGRAM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2017 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2016|2016]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 19 June 2017 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 19 June 2017&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://www.nviso.be NVISO]&lt;br /&gt;
; Address&lt;br /&gt;
: Sinter-Goedelevoorplein 5 Parvis Sainte Gudule,&amp;lt;br/&amp;gt;1000 Brussels&lt;br /&gt;
: ([https://www.google.com/maps/place/Place+Sainte-Gudule+5,+1000+Bruxelles,+Belgium/@50.8474433,4.3586377,151m/data=!3m2!1e3!4b1!4m5!3m4!1s0x47c3c4800313a0a5:0xb62b4416d53a6f8d!8m2!3d50.8474433!4d4.3591849 map], [https://www.google.com/maps/dir//Place+Sainte-Gudule+5,+1000+Bruxelles,+Belgium/@50.8474433,4.3586377,151m/data=!3m1!1e3!4m16!1m7!3m6!1s0x47c3c4800313a0a5:0xb62b4416d53a6f8d!2sPlace+Sainte-Gudule+5,+1000+Bruxelles,+Belgium!3b1!8m2!3d50.8474433!4d4.3591849!4m7!1m0!1m5!1m1!1s0x47c3c4800313a0a5:0xb62b4416d53a6f8d!2m2!1d4.3591849!2d50.8474433 directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h00 - 18h50: '''Welcome &amp;amp; sandwiches'''&lt;br /&gt;
&lt;br /&gt;
*18h50 - 19h00: '''OWASP Update'''&lt;br /&gt;
&lt;br /&gt;
*19h00 - 19h45: '''Threat modeling lessons from Star Wars''' (by Adam Shostack, freelance security consultant)&lt;br /&gt;
:''Abstract:''  Everyone knows you ought to threat model, but in practical reality it turns out to be tricky. If past efforts to threat model haven't panned out, perhaps part of the problem is confusion over what works, and how the various approaches conflict or align. This talk captures lessons from years of work helping people throughout the software industry threat model more effectively.  It's designed to help security pros, developers and systems managers, all of whom will leave with both threat modeling lessons from Star Wars and a proven foundation, enabling them to threat model effectively.&lt;br /&gt;
:''Bio:'' Adam is a consultant, entrepreneur, technologist, author and game designer. He's a member of the BlackHat Review Board, and helped found the CVE and many other things. He's currently helping a variety of organizations improve their security, and advising and mentoring startups as a Mach37 Star Mentor. While at Microsoft, he drove the Autorun fix into Windows Update, was the lead designer of the SDL Threat Modeling Tool v3 and created the &amp;quot;Elevation of Privilege&amp;quot; game. Adam is the author of &amp;quot;Threat Modeling: Designing for Security,&amp;quot; and the co-author of &amp;quot;The New School of Information Security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*19h45 - 20h30: '''T.B.D.''' (by T.B.D)&lt;br /&gt;
:''Abstract:'' T.B.D.&lt;br /&gt;
:''Bio:'' T.B.D.&lt;br /&gt;
&lt;br /&gt;
*20h30 - ... : '''Reception'''&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2017-06-19.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== 29 May 2017 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 29 May 2017&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://www.ey.com Ernst &amp;amp; Young]&lt;br /&gt;
; Address&lt;br /&gt;
: De Kleetlaan 2,&amp;lt;br/&amp;gt;1831 Machelen&lt;br /&gt;
: ([https://www.google.com/maps/place/EY+Belgium/@50.88652,4.448027,605m/data=!3m1!1e3!4m5!3m4!1s0x0:0x1d0b0a9e75dc9641!8m2!3d50.8871901!4d4.4500013 map], [https://www.google.com/maps/dir//EY+Belgium,+De+Kleetlaan+2,+1831+Machelen,+Belgium/@50.88652,4.448027,746m/data=!3m1!1e3!4m15!1m6!3m5!1s0x0:0x1d0b0a9e75dc9641!2sEY+Belgium!8m2!3d50.8871901!4d4.4500013!4m7!1m0!1m5!1m1!1s0x47c3dd1d72c2032f:0x1d0b0a9e75dc9641!2m2!1d4.4500011!2d50.8871901 directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h00 - 18h50: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*18h50 - 19h00: '''[https://www.owasp.org/images/6/6c/Owasp_Belgium_update_2017-05-29.pdf OWASP Update]''' (by Lieven Desmet)&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h45: '''HTTP for the worst and the best''' (by Xavier Mertens, freelance security consultant)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Today, the classic infection vectors remain SMTP and HTTP. Many spam &amp;amp; phishing campaigns are delivered to the victim’s mailbox and usually the next step of the attack is performed on top of HTTP, by visiting a malicious website or downloading a piece of malicious code. This talk will be split in two parts. To begin, I’ll explain how HTTP techniques are used to make the life of security researchers and incident handlers more difficult (attackers use many techniques to prevent access to their juicy data). The next part will demonstrate that attackers are also humans and make mistakes like all of us. They also need to follow the OWASP Top-10! I’ll review some example of bad code / bad configuration that I found during my investigations.&lt;br /&gt;
:''Bio:'' '''Xavier Mertens''' is a freelance security consultant based in Belgium. His job focuses on protecting his customers by applying “offensive” (pentesting) as well as “defensive” security (incident handling, log management, SIEM, security visualisation, OSINT). Xavier is also a SANS Internet Storm Center handler (&amp;lt;nowiki&amp;gt;https://isc.sans.org&amp;lt;/nowiki&amp;gt;). He’s also maintaining his security blog (&amp;lt;nowiki&amp;gt;https://blog.rootshell.be&amp;lt;/nowiki&amp;gt;) and is a co-organizer of the BruCON security conference (&amp;lt;nowiki&amp;gt;http://www.brucon.org&amp;lt;/nowiki&amp;gt;).&amp;lt;br&amp;gt;&lt;br /&gt;
*19h45 - 20h30: '''Reverse engineering with Panopticon: a Libre Cross-Platform Disassembler''' (by Kai Michaelis)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' The Panopticon project aims to develop a tool to end the dominance of proprietary software for reverse engineering.&lt;br /&gt;
:Panopticon is a graphical disassembler written in Rust that runs on GNU/Linux, Windows and OS X, which aims to create a free replacement for tools like IDA Pro and BinDiff.&lt;br /&gt;
:What sets Panopticon apart from other free disassembler is the belief that an intuitive GUI is paramount to aid human analysts to understand as much of the binary as possible. As such Panopticon comes with an Qt 5 UI written in QML that allows browsing and annotating control flow graphs. &lt;br /&gt;
:''Bio:'' '''Kai Michaelis''' studies IT-Security in Bochum, Germany and works part-time on Free Software. When he's not on the campus you can meet him at the local hackerspace. His interests are program analysis, reverse engineering and cryptography.&lt;br /&gt;
*20h30 - ... : '''Reception'''&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2017-05-29.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== 28 February 2017 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 28 Feburary 2017&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://distrinet.cs.kuleuven.be Distrinet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2017-02-27 to 2017-03-03.)&lt;br /&gt;
; Address&lt;br /&gt;
: Department of Computer Science (foyer at ground floor)&amp;lt;br/&amp;gt;Celestijnenlaan 200 A&amp;lt;br/&amp;gt;3001 Heverlee&lt;br /&gt;
: ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/2/24/Owasp_Belgium_update_2017-02-28.pdf OWASP Update]''' (by Lieven Desmet)&amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''[https://www.owasp.org/images/c/c6/Manico_XSS_Defense_Summary_2017-02-28.pdf XSS defense strategies]''' (by Jim Manico, Manicode Security)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  TBD&lt;br /&gt;
:''Bio:'' '''Jim Manico''' is the founder of Manicode Security where he trains software developers on secure coding and security engineering. Jim is a frequent speaker on secure software practices and is a member of the Java-One Rock Star speaker community. Jim was a Global Board Member for the OWASP foundation  and is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill..&lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''[https://www.owasp.org/images/d/db/DeRyck_OWASP_WebSecurityOverview_2017-02-28.pdf Why traditional Web security technologies no longer suffice]''' (by Philippe De Ryck, KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Not a day goes by without a story on a Web security incident somewhere. A data breach disclosing millions of people’s details. A defacement of a major Web site. Malware served from a legitimate Web site to thousands of users. Contrary to popular belief, the people running these Web sites are generally not clueless about security, but getting it right is just not that easy. Recent evolutions, like the rise of public networks, or the strong dependence on third-party code, have made it easier to attack Web sites, and harder to defend them. Join us to get an overview of these threats, and to take a dive into HTTP Strict Transport Security (HSTS), one of the latest Web security technologies that really help you improve security.&lt;br /&gt;
:''Bio:'' '''Philippe De Ryck''' is a professional speaker and trainer on software security and web security. Since he obtained his PhD at the imec-DistriNet research group (KU Leuven, Belgium), he has been running the group's Web Security Training program, which ensures a sustainable knowledge transfer of the group’s security expertise towards practitioners.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2017-02-28.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp_Belgium_update_2017-05-29.pdf&amp;diff=230112</id>
		<title>File:Owasp Belgium update 2017-05-29.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp_Belgium_update_2017-05-29.pdf&amp;diff=230112"/>
				<updated>2017-05-30T07:57:51Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: OWASP Update (Belgium Chapter meeting 29 May 2017)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Update (Belgium Chapter meeting 29 May 2017)&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2017&amp;diff=230080</id>
		<title>Belgium Events 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2017&amp;diff=230080"/>
				<updated>2017-05-29T14:58:31Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* PROGRAM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2017 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2016|2016]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 19 June 2017 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 19 June 2017&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://www.nviso.be NVISO]&lt;br /&gt;
; Address&lt;br /&gt;
: Sinter-Goedelevoorplein 5 Parvis Sainte Gudule,&amp;lt;br/&amp;gt;1000 Brussels&lt;br /&gt;
: ([https://www.google.com/maps/place/Place+Sainte-Gudule+5,+1000+Bruxelles,+Belgium/@50.8474433,4.3586377,151m/data=!3m2!1e3!4b1!4m5!3m4!1s0x47c3c4800313a0a5:0xb62b4416d53a6f8d!8m2!3d50.8474433!4d4.3591849 map], [https://www.google.com/maps/dir//Place+Sainte-Gudule+5,+1000+Bruxelles,+Belgium/@50.8474433,4.3586377,151m/data=!3m1!1e3!4m16!1m7!3m6!1s0x47c3c4800313a0a5:0xb62b4416d53a6f8d!2sPlace+Sainte-Gudule+5,+1000+Bruxelles,+Belgium!3b1!8m2!3d50.8474433!4d4.3591849!4m7!1m0!1m5!1m1!1s0x47c3c4800313a0a5:0xb62b4416d53a6f8d!2m2!1d4.3591849!2d50.8474433 directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h00 - 18h50: '''Welcome &amp;amp; sandwiches'''&lt;br /&gt;
&lt;br /&gt;
*18h50 - 19h00: '''OWASP Update'''&lt;br /&gt;
&lt;br /&gt;
*19h00 - 19h45: '''Threat modeling lessons from Star Wars''' (by Adam Shostack, freelance security consultant)&lt;br /&gt;
:''Abstract:''  Everyone knows you ought to threat model, but in practical reality it turns out to be tricky. If past efforts to threat model haven't panned out, perhaps part of the problem is confusion over what works, and how the various approaches conflict or align. This talk captures lessons from years of work helping people throughout the software industry threat model more effectively.  It's designed to help security pros, developers and systems managers, all of whom will leave with both threat modeling lessons from Star Wars and a proven foundation, enabling them to threat model effectively.&lt;br /&gt;
:''Bio:'' Adam is a consultant, entrepreneur, technologist, author and game designer. He's a member of the BlackHat Review Board, and helped found the CVE and many other things. He's currently helping a variety of organizations improve their security, and advising and mentoring startups as a Mach37 Star Mentor. While at Microsoft, he drove the Autorun fix into Windows Update, was the lead designer of the SDL Threat Modeling Tool v3 and created the &amp;quot;Elevation of Privilege&amp;quot; game. Adam is the author of &amp;quot;Threat Modeling: Designing for Security,&amp;quot; and the co-author of &amp;quot;The New School of Information Security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
*19h45 - 20h30: '''T.B.D.''' (by T.B.D)&lt;br /&gt;
:''Abstract:'' T.B.D.&lt;br /&gt;
:''Bio:'' T.B.D.&lt;br /&gt;
&lt;br /&gt;
*20h30 - ... : '''Reception'''&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2017-06-19.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meeting (29 May 2017) in Machelen ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 29 May 2017&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://www.ey.com Ernst &amp;amp; Young]&lt;br /&gt;
; Address&lt;br /&gt;
: De Kleetlaan 2,&amp;lt;br/&amp;gt;1831 Machelen&lt;br /&gt;
: ([https://www.google.com/maps/place/EY+Belgium/@50.88652,4.448027,605m/data=!3m1!1e3!4m5!3m4!1s0x0:0x1d0b0a9e75dc9641!8m2!3d50.8871901!4d4.4500013 map], [https://www.google.com/maps/dir//EY+Belgium,+De+Kleetlaan+2,+1831+Machelen,+Belgium/@50.88652,4.448027,746m/data=!3m1!1e3!4m15!1m6!3m5!1s0x0:0x1d0b0a9e75dc9641!2sEY+Belgium!8m2!3d50.8871901!4d4.4500013!4m7!1m0!1m5!1m1!1s0x47c3dd1d72c2032f:0x1d0b0a9e75dc9641!2m2!1d4.4500011!2d50.8871901 directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h00 - 18h50: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*18h50 - 19h00: '''OWASP Update'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h45: '''HTTP for the worst and the best''' (by Xavier Mertens, freelance security consultant)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Today, the classic infection vectors remain SMTP and HTTP. Many spam &amp;amp; phishing campaigns are delivered to the victim’s mailbox and usually the next step of the attack is performed on top of HTTP, by visiting a malicious website or downloading a piece of malicious code. This talk will be split in two parts. To begin, I’ll explain how HTTP techniques are used to make the life of security researchers and incident handlers more difficult (attackers use many techniques to prevent access to their juicy data). The next part will demonstrate that attackers are also humans and make mistakes like all of us. They also need to follow the OWASP Top-10! I’ll review some example of bad code / bad configuration that I found during my investigations.&lt;br /&gt;
:''Bio:'' '''Xavier Mertens''' is a freelance security consultant based in Belgium. His job focuses on protecting his customers by applying “offensive” (pentesting) as well as “defensive” security (incident handling, log management, SIEM, security visualisation, OSINT). Xavier is also a SANS Internet Storm Center handler (&amp;lt;nowiki&amp;gt;https://isc.sans.org&amp;lt;/nowiki&amp;gt;). He’s also maintaining his security blog (&amp;lt;nowiki&amp;gt;https://blog.rootshell.be&amp;lt;/nowiki&amp;gt;) and is a co-organizer of the BruCON security conference (&amp;lt;nowiki&amp;gt;http://www.brucon.org&amp;lt;/nowiki&amp;gt;).&amp;lt;br&amp;gt;&lt;br /&gt;
*19h45 - 20h30: '''Reverse engineering with Panopticon: a Libre Cross-Platform Disassembler''' (by Kai Michaelis)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' The Panopticon project aims to develop a tool to end the dominance of proprietary software for reverse engineering.&lt;br /&gt;
:Panopticon is a graphical disassembler written in Rust that runs on GNU/Linux, Windows and OS X, which aims to create a free replacement for tools like IDA Pro and BinDiff.&lt;br /&gt;
:What sets Panopticon apart from other free disassembler is the belief that an intuitive GUI is paramount to aid human analysts to understand as much of the binary as possible. As such Panopticon comes with an Qt 5 UI written in QML that allows browsing and annotating control flow graphs. &lt;br /&gt;
:''Bio:'' '''Kai Michaelis''' studies IT-Security in Bochum, Germany and works part-time on Free Software. When he's not on the campus you can meet him at the local hackerspace. His interests are program analysis, reverse engineering and cryptography.&lt;br /&gt;
*20h30 - ... : '''Reception'''&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2017-05-29.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting (28 February 2017) in Leuven ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 28 Feburary 2017&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://distrinet.cs.kuleuven.be Distrinet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2017-02-27 to 2017-03-03.)&lt;br /&gt;
; Address&lt;br /&gt;
: Department of Computer Science (foyer at ground floor)&amp;lt;br/&amp;gt;Celestijnenlaan 200 A&amp;lt;br/&amp;gt;3001 Heverlee&lt;br /&gt;
: ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/2/24/Owasp_Belgium_update_2017-02-28.pdf OWASP Update]''' (by Lieven Desmet)&amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''[https://www.owasp.org/images/c/c6/Manico_XSS_Defense_Summary_2017-02-28.pdf XSS defense strategies]''' (by Jim Manico, Manicode Security)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  TBD&lt;br /&gt;
:''Bio:'' '''Jim Manico''' is the founder of Manicode Security where he trains software developers on secure coding and security engineering. Jim is a frequent speaker on secure software practices and is a member of the Java-One Rock Star speaker community. Jim was a Global Board Member for the OWASP foundation  and is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill..&lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''[https://www.owasp.org/images/d/db/DeRyck_OWASP_WebSecurityOverview_2017-02-28.pdf Why traditional Web security technologies no longer suffice]''' (by Philippe De Ryck, KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Not a day goes by without a story on a Web security incident somewhere. A data breach disclosing millions of people’s details. A defacement of a major Web site. Malware served from a legitimate Web site to thousands of users. Contrary to popular belief, the people running these Web sites are generally not clueless about security, but getting it right is just not that easy. Recent evolutions, like the rise of public networks, or the strong dependence on third-party code, have made it easier to attack Web sites, and harder to defend them. Join us to get an overview of these threats, and to take a dive into HTTP Strict Transport Security (HSTS), one of the latest Web security technologies that really help you improve security.&lt;br /&gt;
:''Bio:'' '''Philippe De Ryck''' is a professional speaker and trainer on software security and web security. Since he obtained his PhD at the imec-DistriNet research group (KU Leuven, Belgium), he has been running the group's Web Security Training program, which ensures a sustainable knowledge transfer of the group’s security expertise towards practitioners.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2017-02-28.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium&amp;diff=230079</id>
		<title>Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium&amp;diff=230079"/>
				<updated>2017-05-29T14:52:54Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* Upcoming chapter meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Belgium|extra=The chapter leader is [mailto:seba@owasp.org Sebastien Deleersnyder]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} &lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
== Upcoming events ==&lt;br /&gt;
&lt;br /&gt;
=== Upcoming chapter meetings ===&lt;br /&gt;
* [[Belgium_Events_2017#Upcoming_Meeting_.2829_May_2017.29_in_Machelen|29 May 2017 in Machelen]]&lt;br /&gt;
* [[Belgium_Events_2017#19_June_2017_Meeting|19 June 2017 in Brussels]]&lt;br /&gt;
&lt;br /&gt;
See https://www.owasp.org/index.php/Belgium#Chapter_Meetings for more details.&lt;br /&gt;
&lt;br /&gt;
== '''Stay in touch''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]] &lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].&lt;br /&gt;
&lt;br /&gt;
== Structural Sponsors 2017  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2017 and the OWASP BeNeLux Days 2016: &lt;br /&gt;
&lt;br /&gt;
[[File:VeraCode logo.png|250px|link=https://www.veracode.com]] &lt;br /&gt;
[[File:Vest.jpg|250px|link=http://www.vest.nl]] &lt;br /&gt;
[[File:Intigriti_verticaal.jpg|link=http://www.intigriti.be]] &lt;br /&gt;
[[File:Ecurify-2016.png|link=http://www.securify.nl]] &lt;br /&gt;
[[File:HPE_logo_250.png|link=http://www8.hp.com/nl/nl/software-solutions/enterprise-security.html]] &lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:Zionsecurity.jpg|link=http://www.zionsecurity.com]] &lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|link=http://www.nviso.be]] &lt;br /&gt;
[[File:Whitehat-security_hor.jpg|link=http://www.whitehatsec.com]] &lt;br /&gt;
&lt;br /&gt;
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]&lt;br /&gt;
&lt;br /&gt;
= Chapter Meetings  =&lt;br /&gt;
&lt;br /&gt;
{{:Belgium_Events_2017}}&lt;br /&gt;
{{:Belgium_Events_2016}}&lt;br /&gt;
&lt;br /&gt;
== Previous Years  ==&lt;br /&gt;
*Events held in [[Belgium Events 2015|2015]]&lt;br /&gt;
*Events held in [[Belgium Events 2014|2014]]&lt;br /&gt;
*Events held in [[Belgium Events 2013|2013]]&lt;br /&gt;
*Events held in [[Belgium Events 2012|2012]]&lt;br /&gt;
*Events held in [[Belgium Events 2011|2011]] &lt;br /&gt;
*Events held in [[Belgium Events 2010|2010]] &lt;br /&gt;
*Events held in [[Belgium Events 2009|2009]] &lt;br /&gt;
*Events held in [[Belgium Events 2008|2008]] &lt;br /&gt;
*Events held in [[Belgium Events 2007|2007]] &lt;br /&gt;
*Events held in [[Belgium Events 2006|2006]] &lt;br /&gt;
*Events held in [[Belgium Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
= Belgium OWASP Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Belgium Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*Sebastien Deleersnyder, Toreon&lt;br /&gt;
*Erwin Geirnaert, Zion Security &lt;br /&gt;
*Philippe Bogaerts, AviNetworks &lt;br /&gt;
*Lieven Desmet, KU Leuven &lt;br /&gt;
*Bart De Win, PWC&lt;br /&gt;
*David Mathy, Freelance&lt;br /&gt;
*Adolfo Solero, Freelance&lt;br /&gt;
*Stella Dineva, Ingenico Payment Services&lt;br /&gt;
*Thomas Hermes, NVISO&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium_Events_2017&amp;diff=230078</id>
		<title>Belgium Events 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium_Events_2017&amp;diff=230078"/>
				<updated>2017-05-29T14:51:21Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;&lt;br /&gt;
These are the 2017 events of the [[Belgium|OWASP Belgium Chapter]].&lt;br /&gt;
&lt;br /&gt;
Previous year: [[Belgium Events 2016|2016]].&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
== 19 June 2017 Meeting ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 19 June 2017&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://www.nviso.be NVISO]&lt;br /&gt;
; Address&lt;br /&gt;
: Sinter-Goedelevoorplein 5 Parvis Sainte Gudule,&amp;lt;br/&amp;gt;1000 Brussels&lt;br /&gt;
: ([https://www.google.com/maps/place/Place+Sainte-Gudule+5,+1000+Bruxelles,+Belgium/@50.8474433,4.3586377,151m/data=!3m2!1e3!4b1!4m5!3m4!1s0x47c3c4800313a0a5:0xb62b4416d53a6f8d!8m2!3d50.8474433!4d4.3591849 map], [https://www.google.com/maps/dir//Place+Sainte-Gudule+5,+1000+Bruxelles,+Belgium/@50.8474433,4.3586377,151m/data=!3m1!1e3!4m16!1m7!3m6!1s0x47c3c4800313a0a5:0xb62b4416d53a6f8d!2sPlace+Sainte-Gudule+5,+1000+Bruxelles,+Belgium!3b1!8m2!3d50.8474433!4d4.3591849!4m7!1m0!1m5!1m1!1s0x47c3c4800313a0a5:0xb62b4416d53a6f8d!2m2!1d4.3591849!2d50.8474433 directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h00 - 18h50: '''Welcome &amp;amp; sandwiches'''&lt;br /&gt;
&lt;br /&gt;
*18h50 - 19h00: '''OWASP Update'''&lt;br /&gt;
&lt;br /&gt;
*19h00 - 19h45: '''Threat modeling lessons from Star Wars''' (by Adam Shostack, freelance security consultant)&lt;br /&gt;
:''Abstract:''  T.B.D.&lt;br /&gt;
:''Bio:''&lt;br /&gt;
&lt;br /&gt;
*19h45 - 20h30: '''T.B.D.''' (by T.B.D)&lt;br /&gt;
:''Abstract:'' T.B.D.&lt;br /&gt;
:''Bio:'' T.B.D.&lt;br /&gt;
&lt;br /&gt;
*20h30 - ... : '''Reception'''&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2017-06-19.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meeting (29 May 2017) in Machelen ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 29 May 2017&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://www.ey.com Ernst &amp;amp; Young]&lt;br /&gt;
; Address&lt;br /&gt;
: De Kleetlaan 2,&amp;lt;br/&amp;gt;1831 Machelen&lt;br /&gt;
: ([https://www.google.com/maps/place/EY+Belgium/@50.88652,4.448027,605m/data=!3m1!1e3!4m5!3m4!1s0x0:0x1d0b0a9e75dc9641!8m2!3d50.8871901!4d4.4500013 map], [https://www.google.com/maps/dir//EY+Belgium,+De+Kleetlaan+2,+1831+Machelen,+Belgium/@50.88652,4.448027,746m/data=!3m1!1e3!4m15!1m6!3m5!1s0x0:0x1d0b0a9e75dc9641!2sEY+Belgium!8m2!3d50.8871901!4d4.4500013!4m7!1m0!1m5!1m1!1s0x47c3dd1d72c2032f:0x1d0b0a9e75dc9641!2m2!1d4.4500011!2d50.8871901 directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h00 - 18h50: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*18h50 - 19h00: '''OWASP Update'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h45: '''HTTP for the worst and the best''' (by Xavier Mertens, freelance security consultant)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Today, the classic infection vectors remain SMTP and HTTP. Many spam &amp;amp; phishing campaigns are delivered to the victim’s mailbox and usually the next step of the attack is performed on top of HTTP, by visiting a malicious website or downloading a piece of malicious code. This talk will be split in two parts. To begin, I’ll explain how HTTP techniques are used to make the life of security researchers and incident handlers more difficult (attackers use many techniques to prevent access to their juicy data). The next part will demonstrate that attackers are also humans and make mistakes like all of us. They also need to follow the OWASP Top-10! I’ll review some example of bad code / bad configuration that I found during my investigations.&lt;br /&gt;
:''Bio:'' '''Xavier Mertens''' is a freelance security consultant based in Belgium. His job focuses on protecting his customers by applying “offensive” (pentesting) as well as “defensive” security (incident handling, log management, SIEM, security visualisation, OSINT). Xavier is also a SANS Internet Storm Center handler (&amp;lt;nowiki&amp;gt;https://isc.sans.org&amp;lt;/nowiki&amp;gt;). He’s also maintaining his security blog (&amp;lt;nowiki&amp;gt;https://blog.rootshell.be&amp;lt;/nowiki&amp;gt;) and is a co-organizer of the BruCON security conference (&amp;lt;nowiki&amp;gt;http://www.brucon.org&amp;lt;/nowiki&amp;gt;).&amp;lt;br&amp;gt;&lt;br /&gt;
*19h45 - 20h30: '''Reverse engineering with Panopticon: a Libre Cross-Platform Disassembler''' (by Kai Michaelis)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' The Panopticon project aims to develop a tool to end the dominance of proprietary software for reverse engineering.&lt;br /&gt;
:Panopticon is a graphical disassembler written in Rust that runs on GNU/Linux, Windows and OS X, which aims to create a free replacement for tools like IDA Pro and BinDiff.&lt;br /&gt;
:What sets Panopticon apart from other free disassembler is the belief that an intuitive GUI is paramount to aid human analysts to understand as much of the binary as possible. As such Panopticon comes with an Qt 5 UI written in QML that allows browsing and annotating control flow graphs. &lt;br /&gt;
:''Bio:'' '''Kai Michaelis''' studies IT-Security in Bochum, Germany and works part-time on Free Software. When he's not on the campus you can meet him at the local hackerspace. His interests are program analysis, reverse engineering and cryptography.&lt;br /&gt;
*20h30 - ... : '''Reception'''&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2017-05-29.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting (28 February 2017) in Leuven ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 28 Feburary 2017&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
&lt;br /&gt;
; Host: [https://distrinet.cs.kuleuven.be Distrinet Research Group (KU Leuven)] (Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course held in Leuven from 2017-02-27 to 2017-03-03.)&lt;br /&gt;
; Address&lt;br /&gt;
: Department of Computer Science (foyer at ground floor)&amp;lt;br/&amp;gt;Celestijnenlaan 200 A&amp;lt;br/&amp;gt;3001 Heverlee&lt;br /&gt;
: ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap map], [https://distrinet.cs.kuleuven.be/about/route/ directions])&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/2/24/Owasp_Belgium_update_2017-02-28.pdf OWASP Update]''' (by Lieven Desmet)&amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''[https://www.owasp.org/images/c/c6/Manico_XSS_Defense_Summary_2017-02-28.pdf XSS defense strategies]''' (by Jim Manico, Manicode Security)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  TBD&lt;br /&gt;
:''Bio:'' '''Jim Manico''' is the founder of Manicode Security where he trains software developers on secure coding and security engineering. Jim is a frequent speaker on secure software practices and is a member of the Java-One Rock Star speaker community. Jim was a Global Board Member for the OWASP foundation  and is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill..&lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''[https://www.owasp.org/images/d/db/DeRyck_OWASP_WebSecurityOverview_2017-02-28.pdf Why traditional Web security technologies no longer suffice]''' (by Philippe De Ryck, KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Not a day goes by without a story on a Web security incident somewhere. A data breach disclosing millions of people’s details. A defacement of a major Web site. Malware served from a legitimate Web site to thousands of users. Contrary to popular belief, the people running these Web sites are generally not clueless about security, but getting it right is just not that easy. Recent evolutions, like the rise of public networks, or the strong dependence on third-party code, have made it easier to attack Web sites, and harder to defend them. Join us to get an overview of these threats, and to take a dive into HTTP Strict Transport Security (HSTS), one of the latest Web security technologies that really help you improve security.&lt;br /&gt;
:''Bio:'' '''Philippe De Ryck''' is a professional speaker and trainer on software security and web security. Since he obtained his PhD at the imec-DistriNet research group (KU Leuven, Belgium), he has been running the group's Web Security Training program, which ensures a sustainable knowledge transfer of the group’s security expertise towards practitioners.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2017-02-28.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Belgium&amp;diff=229536</id>
		<title>Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Belgium&amp;diff=229536"/>
				<updated>2017-05-11T07:46:21Z</updated>
		
		<summary type="html">&lt;p&gt;LievenDesmet: /* WHERE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Belgium|extra=The chapter leader is [mailto:seba@owasp.org Sebastien Deleersnyder]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-belgium|emailarchives=http://lists.owasp.org/pipermail/owasp-belgium}} &lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
== Upcoming events ==&lt;br /&gt;
&lt;br /&gt;
=== Upcoming chapter meetings ===&lt;br /&gt;
* '''29 May 2017 in Machelen''' &lt;br /&gt;
* others to be decided&lt;br /&gt;
&lt;br /&gt;
See https://www.owasp.org/index.php/Belgium#Chapter_Meetings for more details.&lt;br /&gt;
&lt;br /&gt;
== '''Stay in touch''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Meetup-logo-2x.png|120px|link=http://www.meetup.com/Belgium-OWASP-Open-Web-Application-Security-Project/]] &lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-belgium]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasp_be]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=https://www.linkedin.com/groups/37865]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
If you want to be invited for the next OWASP Belgium Chapter meetings, please [http://eepurl.com/iFZtb drop us your contact info].&lt;br /&gt;
&lt;br /&gt;
== Structural Sponsors 2017  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2017 and the OWASP BeNeLux Days 2016: &lt;br /&gt;
&lt;br /&gt;
[[File:VeraCode logo.png|250px|link=https://www.veracode.com]] &lt;br /&gt;
[[File:Vest.jpg|250px|link=http://www.vest.nl]] &lt;br /&gt;
[[File:Intigriti_verticaal.jpg|link=http://www.intigriti.be]] &lt;br /&gt;
[[File:Ecurify-2016.png|link=http://www.securify.nl]] &lt;br /&gt;
[[File:HPE_logo_250.png|link=http://www8.hp.com/nl/nl/software-solutions/enterprise-security.html]] &lt;br /&gt;
[[File:LogoToreon.jpg|250px|link=https://www.toreon.com]] &lt;br /&gt;
[[File:Zionsecurity.jpg|link=http://www.zionsecurity.com]] &lt;br /&gt;
[[File:Nviso_logo_RGB_baseline_200px.png|link=http://www.nviso.be]] &lt;br /&gt;
[[File:Whitehat-security_hor.jpg|link=http://www.whitehatsec.com]] &lt;br /&gt;
&lt;br /&gt;
If you want to support our chapter, please contact [mailto:seba@owasp.org Seba Deleersnyder]&lt;br /&gt;
&lt;br /&gt;
= Chapter Meetings  =&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meeting (29 May 2017) in Machelen ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 29 May 2017&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
Hosted by Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
Address: &lt;br /&gt;
&lt;br /&gt;
De Kleetlaan 2, &lt;br /&gt;
&lt;br /&gt;
1831 Machelen&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h00 - 18h50: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*18h50 - 19h00: '''OWASP Update'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h45: '''HTTP for the worst and the best''' (by Xavier Mertens, freelance security consultant)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  Today, the classic infection vectors remain SMTP and HTTP. Many spam &amp;amp; phishing campaigns are delivered to the victim’s mailbox and usually the next step of the attack is performed on top of HTTP, by visiting a malicious website or downloading a piece of malicious code. This talk will be split in two parts. To begin, I’ll explain how HTTP techniques are used to make the life of security researchers and incident handlers more difficult (attackers use many techniques to prevent access to their juicy data). The next part will demonstrate that attackers are also humans and make mistakes like all of us. They also need to follow the OWASP Top-10! I’ll review some example of bad code / bad configuration that I found during my investigations.&lt;br /&gt;
:''Bio:'' '''Xavier Mertens''' is a freelance security consultant based in Belgium. His job focuses on protecting his customers by applying “offensive” (pentesting) as well as “defensive” security (incident handling, log management, SIEM, security visualisation, OSINT). Xavier is also a SANS Internet Storm Center handler (&amp;lt;nowiki&amp;gt;https://isc.sans.org&amp;lt;/nowiki&amp;gt;). He’s also maintaining his security blog (&amp;lt;nowiki&amp;gt;https://blog.rootshell.be&amp;lt;/nowiki&amp;gt;) and is a co-organizer of the BruCON security conference (&amp;lt;nowiki&amp;gt;http://www.brucon.org&amp;lt;/nowiki&amp;gt;).&amp;lt;br&amp;gt;&lt;br /&gt;
*19h45 - 20h30: '''Reverse engineering with Panopticon: a Libre Cross-Platform Disassembler''' (by Kai Michaelis)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' The Panopticon project aims to develop a tool to end the dominance of proprietary software for reverse engineering.&lt;br /&gt;
:Panopticon is a graphical disassembler written in Rust that runs on GNU/Linux, Windows and OS X, which aims to create a free replacement for tools like IDA Pro and BinDiff.&lt;br /&gt;
:What sets Panopticon apart from other free disassembler is the belief that an intuitive GUI is paramount to aid human analysts to understand as much of the binary as possible. As such Panopticon comes with an Qt 5 UI written in QML that allows browsing and annotating control flow graphs. &lt;br /&gt;
:''Bio:'' '''Kai Michaelis''' studies IT-Security in Bochum, Germany and works part-time on Free Software. When he's not on the campus you can meet him at the local hackerspace. His interests are program analysis, reverse engineering and cryptography.&lt;br /&gt;
*20h30 - ... : '''Reception'''&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2017-05-29.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting (28 February 2017) in Leuven ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 28 Feburary 2017&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
Hosted by [https://distrinet.cs.kuleuven.be Distrinet Research Group (KU Leuven)].&lt;br /&gt;
&lt;br /&gt;
Both speakers are faculty of the [https://www.secappdev.org/ Secure Application Development] course which is held in Leuven from February 27 to March 3.&lt;br /&gt;
&lt;br /&gt;
Address: &amp;lt;br&amp;gt;&lt;br /&gt;
Department of Computer Science (foyer at ground floor)&amp;lt;br&amp;gt; Celestijnenlaan 200 A&amp;lt;br&amp;gt; 3001 Heverlee ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap google maps])&lt;br /&gt;
&lt;br /&gt;
Routemap: https://distrinet.cs.kuleuven.be/about/route/&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/2/24/Owasp_Belgium_update_2017-02-28.pdf OWASP Update]''' (by Lieven Desmet)&amp;lt;br&amp;gt; &lt;br /&gt;
*19h10 - 20h00: '''[https://www.owasp.org/images/c/c6/Manico_XSS_Defense_Summary_2017-02-28.pdf XSS defense strategies]''' (by Jim Manico, Manicode Security)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:''  TBD&lt;br /&gt;
:''Bio:'' '''Jim Manico''' is the founder of Manicode Security where he trains software developers on secure coding and security engineering. Jim is a frequent speaker on secure software practices and is a member of the Java-One Rock Star speaker community. Jim was a Global Board Member for the OWASP foundation  and is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill..&lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''[https://www.owasp.org/images/d/db/DeRyck_OWASP_WebSecurityOverview_2017-02-28.pdf Why traditional Web security technologies no longer suffice]''' (by Philippe De Ryck, KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Not a day goes by without a story on a Web security incident somewhere. A data breach disclosing millions of people’s details. A defacement of a major Web site. Malware served from a legitimate Web site to thousands of users. Contrary to popular belief, the people running these Web sites are generally not clueless about security, but getting it right is just not that easy. Recent evolutions, like the rise of public networks, or the strong dependence on third-party code, have made it easier to attack Web sites, and harder to defend them. Join us to get an overview of these threats, and to take a dive into HTTP Strict Transport Security (HSTS), one of the latest Web security technologies that really help you improve security.&lt;br /&gt;
:''Bio:'' '''Philippe De Ryck''' is a professional speaker and trainer on software security and web security. Since he obtained his PhD at the imec-DistriNet research group (KU Leuven, Belgium), he has been running the group's Web Security Training program, which ensures a sustainable knowledge transfer of the group’s security expertise towards practitioners.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2017-02-28.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting (18 October 2016) in Ghent ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 18 October 2016&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
Hosted at [http://www.ugent.be/ UGent]&lt;br /&gt;
&lt;br /&gt;
Faculteit Ingenieurswetenschappen en Architectuur&amp;lt;br /&amp;gt;&lt;br /&gt;
Campus Boekentoren&amp;lt;br /&amp;gt;&lt;br /&gt;
Jozef Plateaustraat 22&amp;lt;br /&amp;gt;&lt;br /&gt;
9000 Gent&amp;lt;br /&amp;gt;&lt;br /&gt;
Belgium&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''[https://www.owasp.org/images/1/1c/Owasp_Belgium_update_2016-10-18_v1.pptx OWASP Update]  &amp;lt;br&amp;gt; '''&lt;br /&gt;
*19h15 - 19h45: '''[https://www.owasp.org/images/7/73/Presentation_Sensei_Security_v17_for_distribution.pdf Find and fix software security problems… wait, do not make security mistakes in the first place!]''' (by Matias Madou)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Today, companies do not have a shortage of known security problems in their solutions. Tools and people point out numerous software security problems that eventually should be fixed. So how do organizations deal with all these issues? What is the most effective way to get issues fixed? For companies taking security serious, the question is no longer “How many problems can you find?”, but the real question is “How many security issues can you fix or prevent developers from making?” In this session, we explore different routes on how to find and fix security issues, or prevent making them in the first place.&lt;br /&gt;
:''Bio:'' Matias is the founder of Sensei Security, a software security startup building solutions to effectively fix and prevent security problems in software. Matias has over a decade of hands-on software security experience ranging from the research to improve existing solutions to scoping and building new solutions. A dozen patents and a bunch of papers are the result of his research that eventually led to a hand full of commercial products.&lt;br /&gt;
*19h45 - 19h55: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h55 - 20h30: '''[https://www.owasp.org/images/b/b8/OWASP_MVEE.pptx Exploit mitigation using Multi-Variant Execution]''' (by Stijn Volckaert)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Software we rely on every day is riddled with security vulnerabilities that can be exploited to crash, extract data, or seize control of computer systems. Current exploit mitigations do not seem to suffice to remedy this situation because hackers can circumvent them with relative ease. In this talk, I will present GHUMVEE, a state-of-the-art Multi-Variant Execution framework that was developed at Ghent University. GHUMVEE can amplify the effectiveness of other exploit mitigations and enable them to detect and block zero-day attacks. The idea is to create multiple diversified replicas of a vulnerable program and to execute these replicas in parallel on the same inputs while simultaneously monitoring their behavior. The program replicas are functionally equivalent under normal circumstances but behave differently when attacked. GHUMVEE detects this behavioral difference using a monitor. In the talk, I will discuss GHUMVEE’s design and implementation, as well as some of the follow-up research sponsored by the Defense Advanced Research Projects Agency (DARPA) in the USA.&lt;br /&gt;
:''Bio:'' Stijn is a Postdoctoral Scholar in Prof. Michael Franz’ research group at the University of California, Irvine. He received his Ph.D. from Ghent University in 2015, under the supervision of Prof. Bjorn De Sutter and Prof. Koen De Bosschere. His research interests include systems security, reliability, and compilation. He is the recipient of the 2016 IBM Innovation Award (awarded by the F.W.O) for his PhD thesis on the topic of Multi-Variant Execution.&lt;br /&gt;
*20h30 - 20h40: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h40 - 21h15: '''[https://www.owasp.org/images/d/de/OWASP-ASPIRE.pdf ASPIRE: Advanced Software Protection: Integration, Research, and Exploitation]''' (by Bjorn De Sutter)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' ASPIRE is a three year European FP7 research project on software protection to mitigate Man-at-the-End attacks on native code libraries on mobile systems. Together with Nagravision, Gemalto, and SafeNet, world leaders in their respective security markets, four academic institutes aim for developing layered, but software-only protection techniques that can protect the assets embedded in mobile apps of content, software and service providers as well as can be achieved with custom hardware-based protections such as smart cards and dongles. The project also aims for developing a quantitative evaluation methodology to assess the value of combinations of protections, and decision support to aid users of the ASPIRE protection framework. ASPIRE ends in October 2016, so this talk will present a preview off the final project results. &lt;br /&gt;
:''Bio:'' Since 2008, Bjorn is a professor in the Computer Systems Lab at Ghent University. His research topics include compiler technologies and software protection, incl. binary rewriting techniques for a wide range of applications such as fault-injection mitigation, side-channel leakage mitigation, anti-reverse engineer, anti-tampering, and anti-debugging. He coordinates the ASPIRE project.&lt;br /&gt;
*21h15 - ...: '''drink and networking event'''&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2016-10-18.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting (8 September 2016) in Zaventem ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Thursday 8 September 2016&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
Hosted at [http://www.pwc.be PwC]&lt;br /&gt;
&lt;br /&gt;
Woluwedal 18&amp;lt;br /&amp;gt;&lt;br /&gt;
1932 Zaventem&amp;lt;br /&amp;gt;&lt;br /&gt;
Belgium&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Google Maps: https://goo.gl/maps/3Jo8u&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
&amp;lt;span style=&amp;quot;color: red;&amp;quot;&amp;gt;'''UPDATED AGENDA:'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h15: '''OWASP Update  &amp;lt;br&amp;gt; '''&lt;br /&gt;
*19h15 - 20h00: '''[https://www.owasp.org/images/0/0e/CloudPiercerOwasp_20160908.pdf CloudPiercer: Bypassing Cloud-based Security Providers]''' (by Thomas Vissers, iMinds-DistriNet-KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Many website owners turn to Cloud-based Security Providers (CBSPs) to protect their websites from DDoS and web application attacks. Some of these security services rely solely on changing the DNS settings of a customer’s domain name to reroute his traffic through the CBSP's cloud infrastructure. This allows for complete circumvention of the security service by directly attacking the website’s hosting IP address. Therefore, it is crucial that a web server's hosting IP address remains hidden from potential attackers. Despite this risk, our study has shown that, in practice, over 70% of CBSP-protected domains are exposing their real IP address. In this talk, we will discuss several significant attack vectors and steps administrators can take to prevent their IP address from being discovered by attackers.&lt;br /&gt;
:''Bio:'' '''Thomas Vissers'''  Thomas Vissers is a PhD Researcher at iMinds-Distrinet, KU Leuven. His research is broadly focused on internet security and privacy topics, such as cloud-based security, domain name abuse, denial-of-service attacks, email security and browser fingerprinting. Furthermore, he has a special interest in machine learning, data mining and large-scale analyses. Thomas has published and presented his research at various international conferences, such as CCS, NDSS and HotPETS. He obtained his Master’s degree in Engineering from the University of Antwerp and was a research intern at Anna University, India.&lt;br /&gt;
*20h00 - 20h15: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h15 - 21h15: '''[https://www.owasp.org/images/5/58/Owasp_Hackers_Do_we_shoot_or_do_we_hug.pdf Hackers! Do we shoot or do we hug?]''' (by Edwin van Andel, Zerocopter)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' In the ever changing security landscape we are slowly seeing a shift from labeling hackers per default as 'bad and malicious individuals', to accepting them slowly as 'useful and potentially friendly’. We see more and more compagnies starting a bug bounty program and/or a Responsible Disclosure (Coordinated vulnerability disclosure) program. &lt;br /&gt;
:We in te Netherlands are (at least in Europe) leading the pack on this last subject, also backed heavily by the Dutch NCSC, the Dutch government and the Dutch prosecution services with their Responsible Disclosure guideline .&lt;br /&gt;
:In this interactive and mostly humorous talk I’ll start with defining security (in a grotesk way), followed bij the definition of hackers, the way hackers think and work, and how they can be used instead of feared by compagnies. I’ll show how bug bounties and the Responsible Disclosure processes work, or how they sometimes do not. I will also take the audience with me on some examples on how and why some websites fail in being secure, and the development errors behind those fails. &lt;br /&gt;
:During the talk I interact a lot with the audience, do quiz questions about the subject, and reward good answers with a bottle of club-mate. At the end of the talk the combined audience consensus should of course be to hug the hackers!&lt;br /&gt;
:''Bio:'' '''Edwin van Andel''' , better known as @Yafsec, joined Zerocopter, where he's mostly working on publicly expanding their “continuous security” platform. Elected winner of the Lightning talks at BruCON 2013, and organizer of the alternative NCSC conference &amp;quot;because no hackers were invited&amp;quot; #ALT-S, he is now a renown speaker that will introduce you -in a humorous way- to the dangers, virtues and current state of affairs in the security landscape.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2016-09-08.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting (23 May 2016) in Mechelen ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Monday 23 May 2016&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
Hosted at Moonbeat (Mechelen), kindly offered by [http://www.is4u.be/ is4u].&lt;br /&gt;
&lt;br /&gt;
Venue address:&amp;lt;br&amp;gt;&lt;br /&gt;
Moonbeat &amp;lt;br&amp;gt;&lt;br /&gt;
Oude Brusselsestraat 10-12 &amp;lt;br&amp;gt;&lt;br /&gt;
2800 mechelen &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Route/Parking: http://www.moonbeat.be/contact .&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h00 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h10: '''OWASP Update  &amp;lt;br&amp;gt; '''&lt;br /&gt;
*19h10 - 20h00: '''All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS''' (by Mathy Vanhoef, iMinds-DistriNet-KU Leuven)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' We present new biases in RC4, break the Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP), and design a practical plaintext recovery attack against the Transport Layer Security (TLS) protocol. To empirically find new biases in the RC4 keystream we use statistical hypothesis tests. This reveals many new biases in the initial keystream bytes, as well as several new long-term biases. Our fixed-plaintext recovery algorithms are capable of using multiple types of biases, and return a list of plaintext candidates in decreasing likelihood.&lt;br /&gt;
:To break WPA-TKIP we introduce a method to generate a large number of identical packets. This packet is decrypted by generating its plaintext candidate list, and using redundant packet structure to prune bad candidates. From the decrypted packet we derive the TKIP MIC key, which can be used to inject and decrypt packets. In practice the attack can be executed within an hour. We also attack TLS as used by HTTPS, where we show how to decrypt a secure cookie with a high success rate using roughly one billion ciphertexts. This is done by injecting known data around the cookie, abusing this using Mantin's ABSAB bias, and brute-forcing the cookie by traversing the plaintext candidates. Using our traffic generation technique, we are able to execute the attack in merely 75 hours.&lt;br /&gt;
:''Bio:'' '''Mathy Vanhoef'''  is a PhD student at KU Leuven, where he performs research on RC4 and its usage in network protocols such as WPA-TKIP and SSL/TLS (e.g. he discovered the RC4 NOMORE attack). He also focuses on wireless security, where he studies MAC address randomization, analyzes protocols like WPA-TKIP, and implements low-layer Wi-Fi attacks using commodity hardware. Apart from research, he is also interested in low-level security, reverse engineering, and binary exploitation. He regularly participates in CTFs with KU Leuven's Hacknamstyle CTF team. &lt;br /&gt;
*20h00 - 20h10: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h10 - 21h00: '''Docker Security''' (by Nils De Moor, CTO at WooRank)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' Docker, the new kid on the block, has taken the Ops world by storm. Suddenly everybody wants applications to be containerized and kick them from a development machine up to a production stack in seconds. But this new paradigm obviously has consequences in terms of security and compliance. In this talk we'll look at how to construct a container around applications and dive deeper into how we can put a tight lock around it, thanks to the built-in security primitives.&lt;br /&gt;
:''Bio:'' '''Nils De Moor''' is co-founder and CTO at WooRank, a SaaS tool for digital marketing agencies to monitor online presence of a brand. By grabbing and calculating millions of data points every day, he developed a passion for automating, scaling and distributing applications. Besides that he is passionate about open source communities and has started some initiatives, like techbelgium.io, Docker and AWS meetup groups, etc.&lt;br /&gt;
*21h00 - ... : Networking drink&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2016-05-23.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting (8 March 2016) in Leuven ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN ===&lt;br /&gt;
Tuesday 8 March 2016&lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
Hosted by [https://distrinet.cs.kuleuven.be iMinds-Distrinet Research Group (KU Leuven)].&lt;br /&gt;
&lt;br /&gt;
Both speakers are faculty of the [http://www.secappdev.org/ Secure Application Development] course which is held in Leuven from 7-11 March 2016. OWASP Members get a 10% discount to attend the course.&lt;br /&gt;
&lt;br /&gt;
Address: &amp;lt;br&amp;gt;&lt;br /&gt;
Department of Computer Science (foyer at ground floor)&amp;lt;br&amp;gt; Celestijnenlaan 200 A&amp;lt;br&amp;gt; 3001 Heverlee ([http://googlemapsinterface.kuleuven.be/index.cgi?lang=N&amp;amp;nbol=(50.864186697481145,%204.678754210472107)&amp;amp;zoomlevel=17&amp;amp;plaatsnaam=Department+of+Computer+Science&amp;amp;maptype=roadmap google maps])&lt;br /&gt;
&lt;br /&gt;
Routemap: https://distrinet.cs.kuleuven.be/about/route/&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM ===&lt;br /&gt;
The agenda:&lt;br /&gt;
*18h15 - 19h00: '''Welcome &amp;amp; sandwiches'''&amp;lt;br&amp;gt; &lt;br /&gt;
*19h00 - 19h15: '''OWASP Update ([https://www.owasp.org/images/4/4e/Owasp_Belgium_update_2016-03-08_v1.pptx PDF])''' &amp;lt;br&amp;gt; &lt;br /&gt;
*19h15 - 20h15: '''[https://www.owasp.org/images/5/5f/JS_RobustModern_VanCutsem_OWASP2016.pdf Writing robust client-side code using Modern JavaScript]''' (by Tom Van Cutsem, Bell Labs, Nokia)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' In this talk, I will take the audience on a tour of recent evolutions in the JavaScript language (and surrounding ecosystem) and how they can use these changes to their advantage to write better client-side code that is more robust against bugs and other exploits. JavaScript — still unquestionably the dominant client-side language in use on the Web — has evolved significantly over the past five years, with two significant updates to ECMAScript, its defining standard. I will give a brief introduction to the language and its Good and Bad parts and then move on to features added in ECMAScript 5th edition, such as &amp;quot;strict mode&amp;quot;, which are by now widely deployed in major browsers. Next, I will look at relevant language features that were introduced recently as part of ECMAScript 6th edition. Finally, I will give a brief introduction to Secure ECMAScript (SES), which is a secure JavaScript dialect that enables the safe embedding of third-party scripts in a webpage, also forming the basis for Google’s Caja compiler.&lt;br /&gt;
:''Bio:'' '''Tom Van Cutsem''' is a senior researcher at Nokia Bell Labs in Antwerp, Belgium. Prior to joining Bell Labs, he was a professor of computer science at Vrije Universiteit Brussel. He sat on the ECMA TC39 committee in charge of standardising JavaScript and actively contributed to the ECMAScript 2015 (a.k.a. “ES6”) standard. Together with Mark S. Miller, he designed and specified ECMAScript’s new reflection API. Tom's broader research interests lie in distributed systems, programming languages, stream processing, concurrency and parallelism. He received his PhD in 2008 from Vrije Universiteit Brussel for his research on AmbientTalk, a distributed scripting language for mobile phones.&lt;br /&gt;
*20h15 - 20h30: '''Break'''&amp;lt;br&amp;gt; &lt;br /&gt;
*20h30 - 21h30: '''[https://www.owasp.org/images/a/a6/Dan-Wallach-internet-censorship.pdf Internet Censorship: Studies from China and Turkey]''' (by prof. Dan Wallach, Rice University)&amp;lt;br&amp;gt;&lt;br /&gt;
:''Abstract:'' TBA&lt;br /&gt;
:''Bio:'' '''Dan Wallach''' is a professor in the systems group at Rice University's Department of Computer Science, He manages Rice's [http://seclab.cs.rice.edu/ computer security lab]. His research interests include mobile code, wireless and smartphone security, and the security of electronic voting systems.&lt;br /&gt;
&lt;br /&gt;
=== REGISTRATION  ===&lt;br /&gt;
Please register via EventBrite: https://owasp-belgium-2016-03-08.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=== Coverage ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
*Events held in [[Belgium Previous Events 2015|2015]]&lt;br /&gt;
*Events held in [[Belgium Previous Events 2014|2014]]&lt;br /&gt;
*Events held in [[Belgium Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Belgium Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Belgium Previous Events 2011|2011]] &lt;br /&gt;
*Events held in [[Belgium Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Belgium Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Belgium Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Belgium Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Belgium Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Belgium Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
= Belgium OWASP Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Belgium Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*Sebastien Deleersnyder, Toreon&lt;br /&gt;
*Erwin Geirnaert, Zion Security &lt;br /&gt;
*Philippe Bogaerts, AviNetworks &lt;br /&gt;
*Lieven Desmet, KU Leuven &lt;br /&gt;
*Bart De Win, PWC&lt;br /&gt;
*David Mathy, Freelance&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>LievenDesmet</name></author>	</entry>

	</feed>